553
Views
2
CrossRef citations to date
0
Altmetric
Research Article

Distributed control for bi-connectivity of multi-robot network

ORCID Icon
Pages 1-10 | Received 18 Oct 2021, Accepted 07 Dec 2022, Published online: 28 Dec 2022

ABSTRACT

This paper approaches a bi-connectivity preservation problem for networked multi-robot systems in a distributed control fashion. Since a bi-connected network topology is robust against single node removal, networked multi-robot systems are required to preserve bi-connectedness in cases robots may fail. By employing a perturbed graph Laplacian to find if the network is disconnected after a node is removed, we analyse a sufficient condition that the network is bi-connected. Then we design a distributed control law to preserve the bi-connectedness from the sufficient condition. Moreover, considering cases a robot fails, we propose a control law to let a uni-connected network be bi-connected forcibly. A condition to restore the bi-connectedness by the proposed control is theoretically proved. The effectiveness of the proposed control laws is demonstrated by numerical simulations.

1. Introduction

Multi-robot systems are the systems in which each robot individually makes each decision by communicating with each other. One of the control strategies for such multi-robot systems is a coverage [Citation1] of which the control objective is to cover a given area by the range of sensors equipped by the robots. The coverage control methods are applied for target searching and consisting a mobile ad-hoc network.

To achieve the team objectives through communication or information exchange, it is important that a network modelling the communication topology is connected. The task accomplishment will be hard once the connectedness is lost since the network topology will be divided into two or more components. For this challenge, some autonomous distributed control laws to preserve the connectedness have been proposed [Citation2,Citation3]. Since it is known that the connectedness is equivalent to the second smallest eigenvalue of the graph Laplacian matrix is positive, a lot of the control laws for the connectedness preservation employ the gradient of the second smallest eigenvalue to decide the direction of the robot motion. The second smallest eigenvalue of the graph Laplacian is called algebraic connectivity.

The network connectedness will be violated by the failure of the robots. Bi-connectedness is required to preserve the network connected against a single robot failure and therefore distributed control laws to preserve bi-connectedness have been proposed [Citation4,Citation5]. The work [Citation4] clarified the theoretical fact that the network is bi-connected if and only if the third smallest eigenvalue of the modified Laplacian matrix is positive, and the control method to preserve the third smallest eigenvalue is proposed. However, calculating only the third smallest eigenvalue in a distributed fashion is difficult. Calculating all the eigenvalues is assumed to get the third one, but it requires a lot of computation and communication costs. Apart from connectivity control using the Laplacian eigenvalue, a control algorithm with vertex connectivity of a subgraph is proposed in [Citation5] for connectivity maintenance. A cost function of the vertex connectivity which is calculated in a distributed fashion is designed in that work, but the control algorithm using the cost function does not theoretically guarantee the vertex connectivity under the existence of the task input.

We have proposed a hybrid control method for the bi-connectivity of the multi-robot network using the second smallest eigenvalue of the perturbed Laplacian matrix in the study [Citation6]. Since the second smallest eigenvalue of the Laplacian is efficiently computed by a distributed algorithm [Citation7] unlike the third smallest eigenvalue, overall computation of our control method is accomplished in a distributed fashion. The proposed hybrid control switches two control modes: an improvement control and a preservation control for the bi-connectedness (see Figure ). The improvement control works when the bi-connectedness is violated by a robot failure, and the preservation control enables the multi-robot system to accomplish a team task with preserving the bi-connectedness. The theoretical correctness of the control laws are proved using results of our previous studies [Citation8,Citation9] where we analysed that the second smallest eigenvalue of a perturbed Laplacian is related to the connected components of the network after single robot failure. Additionally, we had claimed that our improvement control method may not resume the bi-connectedness under some conditions.

Figure 1. Preservation and improvement of network bi-connectedness.

Figure 1. Preservation and improvement of network bi-connectedness.

This paper proposes a refined version of the control method for the multi-robot network bi-connectedness. We try to overcome the bi-connectivity improvement difficulty claimed in the study [Citation6] by stopping the preservation control temporarily. The detailed scheme of the control method and results of the numerical simulation are presented here.

The rest of this paper is organized as follows: Section 2 defines a networked multi-robot system we discuss in this work and formulate a bi-connectivity control problem that is designed to robustify the multi-robot network topology against robotic failures. We propose control methods to solve the bi-connectivity problem in Section 3. Perturbed algebraic connectivity is introduced from our previous studies, and control laws are constructed by employing perturbed algebraic connectivity. In Section 4, results of numerical simulations are demonstrated to represent the effectiveness of the proposed method. Section 5 concludes this paper.

2. Problem formulation

In this section, we define a multi-robot system we consider in this study, and the control problem we try to solve. We assume the multi-robot system consisting of N3 autonomous mobile robots, and define the index set of the robots by V={1,2,,N}.

The motion dynamics of each robot is formulated as (1) x˙i(t)=kibcuibc(t)+kitaskuitask(t),(1) where t0 denotes continuous time, xiRd denotes position of robot iV, uibcRd denotes a control input of the improvement/preservation for the bi-connectedness, uitaskRd denotes a task control input such like coverage or target searching. kibc and kitask are control gains, and d{2,3} is a dimension of the configuration space. We assume the task control uitask is repulsive from neighbour robots as a coverage control, so that the task control act as a disturbance of bi-connectedness.

Two robots i and j have a communication link when the distance distij(t)=xi(t)xj(t) is less than the communication radius R and there are no obstacles on the line segment from the point xi to the point xj (hereafter we represent this line segment as seg(xi,xj)). The network topology G(t)=(V,E(t)) is represented by the weighted adjacency matrix A(t), such that E(t)={(i,j)V×V|aij(t)>0} where aij denotes the ijth entry of the adjacency matrix A. We employ definitions of the ijth entry aij from a previous study [Citation10], as (2) aij=γa(distij)kOijγb(distijk),(2) where distijk denotes the distance from the obstacle kO to the line segment seg(xi,xj). Oij denotes the indexes set of the obstacles to which the distance from the segment seg(xi,xj) are less than dmax, that is, Oij={kO|distijk<dmax}. The functions γa(distij) and γb(distijk) are defined by (3) γa(distij)=1(1+exp(αa(distijRβa)))1,(3) if distij<R, otherwise γa(distij)=0, and (4) γb(distijk)=(1+exp(αb(distijkdmaxβb)))1,(4) if distijk<dmax, otherwise γb(distijk)=1, where αa,βa,αb,βb>0 denote positive coefficients. The value γa reflects the proximity between the robots compared to the communication radius R, and the value γb reflects the farness from the obstacle which impedes the line-of-sight between the robot. From the definition Equation (Equation2), the element aij gets closet to 1 only when the distance distij is sufficiently small and the distances distijk are sufficiently large. Figure  shows an example of Equations (Equation2)–(Equation4) if αa=αb=10, βa=0.7, and βb=0.3. By ensuring a line of sight between two robots using the link weight function Equation (Equation2), we try to mitigate troubles ascribed to wireless communication (e.g. interference and fading).

Figure 2. Illustrated description of link weight functions Equations (Equation2)–(Equation4). (a) Definition of distij and distijk. (b) γa with respect to distij and (c) γb with respect to distijk.

Figure 2. Illustrated description of link weight functions Equations (Equation2(2) aij=γa(distij)∏k∈Oijγb(distijk),(2) )–(Equation4(4) γb(distijk)=(1+exp⁡(−αb(distijkdmax−βb)))−1,(4) ). (a) Definition of distij and distijk. (b) γa with respect to distij and (c) γb with respect to distijk.

Using the adjacency matrix A defined above, we define a Laplacian matrix L = DA where D denotes the degree matrix of which the iith entry is dii=jaij. The second smallest eigenvalue λ2 of the Laplacian matrix L is called the algebraic connectivity, and it is well known that the fact the graph G is connected if and only if λ2>0.

We call the graph G(t) is bi-connected if a graph Gi=(V{i},E) stands connected for all iV. When the graph Gi is disconnected, the node i is called an articulation node. Clearly, we can see a bi-connected graph has no articulation node.

In this paper, we tackle two problems;

  1. find a control input uibc and control gains kibc,kitask to preserve the graph G(t) is bi-connected for all time t0 if the initial graph G(0) is bi-connected,

  2. and find a control input uibc and control gains kibc,kitask to resume the graph G(t) to be bi-connected in finite time t>0 if the initial graph G(0) is not bi-connected but uni-connected.

The first one relates to a subject before a single robot fails and the second one relates to a subject after the failure. The failure in this study means that the robot can not communicate with its neighbours whether temporarily or permanently. Later sections describe the control law to solve these problems.

3. Proposed method

We propose distributed control laws to solve the problems defined in Section 2. First, we introduce a concept of perturbed algebraic connectivity which reflects the importance of a node for the connectivity. The detailed definition and theoretical properties are written in our previous study [Citation9]. We design the control laws using the perturbed algebraic connectivity in this study.

3.1. Perturbed algebraic connectivity

To represent the network topology after the robot i fails, using a sufficiently small positive parameter ϵ>0, we introduce a perturbed adjacency matrix A(i)(ϵ) of which the mnth element is defined by (5) apq(i)={ϵapq,if p=i or q=i,apq,otherwise,(5) Clearly, the perturbed adjacency matrix A(i)(ϵ) represents the graph topology such that the links eij incident to the node i are removed from the graph G. The perturbed Laplacian matrix L(i)(ϵ)=(D(i)A(i))/dii and the second smallest eigenvalue λ2(i)(ϵ) of the matrix L(i)(ϵ) are defined in a similar way, but note the perturbed Laplacian is normalized by the weighted degree dii=jaij. Assuming the graph G is connected, we can see λ2(i)(ϵ)>0 for all ϵ>0, and λ2(i)(0)=0 since the graph which all links incident to the node i is removed is disconnected. Recalling the definition of the second smallest eigenvalue λ2(i)(ϵ) of the Laplacian matrix L(i)(ϵ), (6) λ2(i)(ϵ)=minvvL(i)(ϵ)vvv,s.t. v1=0,(6) we can see the corresponding eigenvector v(i)(0) has a characteristic property; for arbitrary nodes p and q, the pth element vp(i) of the eigenvector is equal to the qth element vq(i) if the nodes p and q are connected in the graph Gi. This property is directly proved from λ2(i)(0)=0. From the eigenvalue definition λ2(i)(ϵ)v(i)(ϵ)=L(i)(ϵ)v(i)(ϵ), we get (7) λ2(i)(ϵ)vi(i)(ϵ)=ϵj(aij/dii)(vi(i)vj(i)),(7) where vj(i) denotes the jth element of the eigenvector v(i).

Assuming the graph Gi is composed of M>0 connected components, we discuss the gradient of the eigenvalue λ2(i)(ϵ) at ϵ=0, defined by (8) λˆ(i)=limϵ0+λ2(i)(ϵ)ϵ.(8) The node i is not an articulation when M = 1 and it is an articulation when M>1. So here we analyse the value λˆ(i) as a function of the component number M. First, from the relations of the eigenvalue like Equation (Equation7), we get equations (9a) λˆ(i)vi=m=1MDm(viv[m]),(9a) (9b) λˆ(i)v[m]=DmCm(v[m]vi),m{1,,M},(9b) where Dm denotes the summation of the value aij/dii of which node j belongs to mth connected component, and Cm denotes the number of nodes in the mth component. vi denotes the ith element of the eigenvector v(i)(0), and v[m] denotes an element of the eigenvector with respect to the mth component. As we discussed in the above paragraph, the elements vp and vq are the same if both nodes p and q are in the same connected component. Note that mCm=N1 since it is equal to the number of nodes in the graph Gi, and mDm=1 since the elements of the perturbed Laplacian matrix are normalized. From the relations Equation (Equation9a), we get an algebraic equation of the value λˆ(i), as (10) mDmCmDmCmλˆ(i)+1=0,(10) with assuming vi0. If vi=0 and there exists a connected component m such that vm0, obviously λˆ(i)=Dm/Cm from Equation (Equation9b). The case vm=0 for all m{1,,M} does not occur, since jvj(i)=0 and v(i)>0. The value λˆ(i) is dependent on the component sizes Cm and weights Dm, so we call it the perturbed algebraic connectivity. The perturbed algebraic connectivity λˆ(i) is monotonically non-decreasing with respect to the link weight aij, since the algebraic connectivity λ2 is also monotonically non-decreasing.

To analyse a condition if the node i is not an articulation one, we find the maximum value of the perturbed algebraic connectivity λˆ(i) when the node i is an articulation.

Theorem 3.1

Corollary of [Citation9]

Assume a graph G is connected, and the node i has 2 or more communication links. If the perturbed algebraic connectivity λˆ(i) satisfies (11) λˆ(i)>N5N9,(11) then the node i is not an articulation node.

Proof.

See Appendix.

From the above theorem, our objectives will be achieved by satisfying the condition (Equation11), if the perturbed algebraic connectivities are estimated in a distributed fashion. Since the algorithm proposed in the reference [Citation7] can estimate the second smallest eigenvalue of the Laplacian matrix in a distributed fashion using, the eigenvalue λ2(i)(ϵ) is also able to be estimated if ϵ>0. Thus, a value λ~(i)=λ2(i)/ϵ is employed as the approximation of the perturbed algebraic connectivity λˆ(i) in this study. Note the approximated value is smaller than the strict value, that is, (12) 0<λ~(i)(ϵ)<λˆ(i),(12) for all ϵ>0. This means λ~(i)(ϵ)N/(5N9) is a sufficient condition for the node i not to be an articulation node.

Here we demonstrate numerical examples of the condition Equation (Equation11). Figure (a) shows the perturbed algebraic connectivity λˆ(i) of randomly generated graph with N = 20. The random graphs are generated by Erdo s–Rényi model [Citation11] with link probability 0.15, and link weights aij are randomly chosen in the interval (0,1). From Figure (a), we confirm that the computed perturbed algebraic connectivity λˆ(i) (shown by the blue + marker) does not exceed 20/(5×209)0.22 (black line) if the node i is an articulation node. Additionally, we can see the inequality Equation (Equation11) is the sufficient condition, not a necessary condition for non-articulation nodes. Figure (b) shows numerical maximum of the perturbed algebraic connectivity λˆ(i) when the node i is an articulation node. The red x markers indicate the numerical maximums and the black solid line shows the theoretical maximum N/(5N9). In each case, the theoretical maximum is approximately identical to the numerical maximum.

Figure 3. Numerical demonstration of sufficient condition Equation (Equation11). (a) λˆ(i) v.s. # of connected component in Gi and (b) Numerical maximum of λˆ(i).

Figure 3. Numerical demonstration of sufficient condition Equation (Equation11(11) λˆ(i)>N5N−9,(11) ). (a) λˆ(i) v.s. # of connected component in G−i and (b) Numerical maximum of λˆ(i).

The control method we detail below switches two control modes: bi-connectivity preservation and bi-connectivity restoration. The preservation launches if all the perturbed algebraic connectivity λˆ(i) satisfies the condition Equation (Equation11), and the restoration launches if one of the perturbed algebraic connectivity does not satisfy that condition. Note that the system does not detect whether a robot has failed but checks the perturbed algebraic connectivity of the non-failed robots. The bi-connectivity restoration could start even if the network is bi-connected since the inequality Equation (Equation11) is a sufficient condition. The restoration also could start if communication stops temporarily due to radio wave attenuation (e.g. fading). We can say that the system takes a safer policy.

3.2. Bi-connectivity preservation

Since the bi-connectedness is equivalent to the state that all the robot i are not articulation nodes, our control objective will be accomplished if we satisfy the condition Equation (Equation11) for all iV. Here we propose two control methods: the robots preserve the condition Equation (Equation11) for all time if the condition is initially satisfied.

Inspired by a connectivity preserving control law proposed in the study [Citation3], we define an artificial potential function V(λ~(i)) by (13) V(λ~(i))=coth(λ~(i)N/(5N9)),(13) where coth() denotes the hyperbolic cotangent function (see Figure ). Then we can ensure the condition Equation (Equation11) if the robots move in the gradient-decreasing direction.

Figure 4. Artificial potential function V(λ~(i)).

Figure 4. Artificial potential function V(λ~(i)).

Theorem 3.2

Corollary of [Citation3]

Assume the initial network G(0) consist of the initial robot positions xi(0) is bi-connected. If the bi-connectivity input uibc is given by (14) uibc=jVV(λ~(j))xi,(14) kibc>0, kitask0, and the task input is bounded uitaskumax, then the network G(t) is bi-connected for all time t>0.

Proof.

This theorem is proved by showing the energy function E(x)=jV(λ~(j)(x)) is bounded for all time t, where x denotes the positions of all robots x=[x1T,,xNT]T. First, the time derivative of the energy function E is given by (15) E˙=(Ex)Tx˙=(Ex)T(Ex+ktaskutask)Ex2+ExuM,(15) where utask denotes the task input, ktask denotes the corresponding gain, and uM=maxktaskutask. Then, the energy E may increase only when the inequality holds: (16) Ex<uM.(16) Here, the gradient E/x=[(E/x1)T,,(E/xN)T]T is given by (17) Exi=jV(λ~(j))xi=jV(λ~(j))λ~(j)λ~(j)xi=jcsch2(λ~(j)λ¯)λ~(j)xi,(17) where csch() denotes the hyperbolic cosecant function, λ¯=N/(5N9), and (18) λ~(j)xi=1ϵ(v(j))TL(j)v(j)xi=1ϵ(v(j))TL(j)xiv(j)=1ϵk(vi(j)vk(j))2(aik(j)/djj)xi,(18) from λ~(j)=λ2(j)/ϵ. Note that λ~(j)/xj0. From above, there exists a positive value c such that (19) csch2(λ~(j)λ¯)<c, jV,(19) when E˙>0, and clearly this is also hold when E˙0. Thus λ~(j)>λ¯ for all node j and for all time t.

Using the expression Equation (Equation18), the control input Equation (Equation14) is rewritten by (20) uibc=jVcsch2(λ~(j)N/(5N9))×kNi(vi(j)vk(j))2ϵ(aik(j)/djj)xi,(20) where (21) (aik(j)/djj)xi={ϵdjjaikdjj2aikxi,if i=j or k=j,1djjaikxi,otherwise.(21) The control input Equation (Equation20) requires the local information aik and aik/xi, the perturbed eigenpair λ~(j) and v(j) which is estimated by the distributed algorithm [Citation7], and the degree djj for the normalization. Although the degree djj is not the local information, all the robots j can modify the elements of the perturbed Laplacian matrix L(j) to be djj=1 in a distributed manner.

3.3. Bi-connectivity restoration

Similarly, the robots will resume the condition Equation (Equation11) by moving in the gradient increasing direction if the condition is not satisfied initially. We analysed a condition to resume the network bi-connected.

Theorem 3.3

Assume the initial network G(0) consist of the initial robot positions xi(0) is uni-connected, all distances distijk from obstacles kO to segments seg(xi,xj) are greater than dmax, and the convex hull C consist of the initial robot positions xi(0) does not contain any obstacles kO. If the bi-connectivity input uibc is given by (22) uibc=krestorejVaλ~(j)xijVVaV(λ~(j))xi,(22) where Va={jV|λ~(j)<N/(5N9)jhas2links}, and gains are krestore>0, kibc>0, kitask=0, then the network G(t) becomes bi-connected in finite time t>0.

Proof.

Under the assumption, the robotic system Equation (Equation1) can be rewritten as (23) x˙i=jVgjkNi(vi(j)vk(j))2ϵaik(j)xi=kNi(jVgj(vi(j)vk(j))2ϵdik(j))aikxi,(23) where vi(j) denotes the ith element of the eigenvector v(j) w.r.t. the eigenvalue λ2(j)(ϵ), and (24) gj={krestore,if jVa,csch2(λ~(j)N/(5N9)),otherwise,(24) (25) dik(j)={ϵdjjaikdjj2,if i=j or k=j,1djj,otherwise.(25) Here we can see (26) jVgj(vi(j)vk(j))2ϵdik(j)gidiiaikdii(vi(i)vk(i))2+gkdkkaikdkk(vi(k)vk(k))2>0.(26) Next, the gradient aik/xi is expressed by (27) aikxi=αexp(α(distik/Rβ))R(1+exp(α(distik/Rβ)))xkxidistik,(27) from the definition Equation (Equation3). Thus we can rewrite Equation (Equation23) as (28) x˙i=kNibik(xkxi),(28) by defining an appropriate strictly positive variable bik>0. Note this dynamics is a consensus algorithm [Citation12]. Therefore, we can see all the points xi are in the convex hull C and move towards the consensus set X={xRdN|xi=xj,  i,j}. Figure  illustrates this behaviour. The system state x(t) approaches to the consensus set X and the bi-connectedness is resumed at finite time t.

Figure 5. Robots on boundary of convex hull C move into C.

Figure 5. Robots on boundary of convex hull C move into C.

The above theorem ensures the achievement of the bi-connectivity restoration only under some initial configurations of the robots. Unfortunately in cases that the convex hull C contains some obstacles, the multi-robot system falls into a local optimum and the bi-connectedness may not be restored. For instance, the robots which move from the initial positions described in Figure  cannot resume the bi-conectedness of the network while preserving all other non-articulation nodes. The local optimum set to be avoided for the bi-connectivity restoration is expressed by (29) L={xRdN|right hand of Equation (22)=0,  i,and  j s.t. λ~(j)N/(5N9)}.(29) In other words, the restoration control Equation (Equation22) will make the network bi-connected if the system state x(t) is not in the local optimum set L for all time t.

Figure 6. Difficult situation to resume bi-connectivity while keeping other non-articulation nodes.

Figure 6. Difficult situation to resume bi-connectivity while keeping other non-articulation nodes.

3.3.1. Avoiding local optimum

To avoid such local minima and to encourage resuming the bi-connectivity, we propose a heuristic technique that temporally stops the preserving control (second term of Equation (Equation22)) considering that the preservation term disturbs the bi-connectivity restoration. The restoration control input Equation (Equation22) is modified as (30) uibc={krestorejVaλ~(j)xijVVaV(λ~(j))xi,if maxjtj<t¯,krestorejVλ~(j)xi,otherwise,(30) where t¯ denotes the time threshold to preserve non-articulation nodes and ti denotes the preserving time count. The parameter ti changes as below: (31) {t˙i=1,if λ~(i)N/(5N9)+δ,ti=0,otherwise,(31) where δ>0 denotes a small margin not to let λ~(i) be too large. The time threshold t¯ is set to be sufficiently large so that maxjtj becomes larger than t¯ only when the system state x is close to the local optimum set L.

A rough outline of this control law Equation (Equation30) is given as below. The non-articulation preserving mode (the first line of Equation (Equation30)) is stopped when the state x is trapped by the local optima L, and the local optima avoiding mode (the second line of Equation (Equation30)) will be executed until the node becomes non-articulation. Since it is difficult to observe that the state x is close to the local optimal set L in a distributed fashion, instead we employ the length of time the bi-connectivity has not been restored. By stopping the non-articulation node preservation condition (Equation11), we try to force the state x to escape from the set L.

The state trajectory x(t) of the system Equation (Equation1) with the control law Equation (Equation30) and uitask=0 does not converge any closed cycles, under the assumption: (32) krestore(μν)(V(μ)V(ν)), μ,νN/(5N9)+δ.(32) This fact is confirmed by showing that the summation of the perturbed algebraic connectivity Λ=iλ~(i) does not decrease over time t. Defining the energy function E(t)=krestorejVaλ~(j)(t)jVVaV(λ~(j)(t)), the non-articulation preservation mode does not reduce the energy E(t), that is, E(t)E(0)0 for all t>0. From a simple deformation: (33) E(t)E(0)=krestorejVa(λ~(j)(t)λ~(j)(0))jVVa(V(λ~(j)(t))V(λ~(j)(0))),(33) we get Λ(t)Λ(0)0 for all t>0. Thus, the system trajectory x(t) results in either achievement of the bi-connectivity restoration or convergence towards the alternative local optimum set (34) L={xRdN|Λ/xi=0,  i,and  j s.t. λ~(j)N/(5N9)},(34) to be avoided. We may be able to avoid this local optimal set L by switching the control mode if LL=. Further analysis and improving the control law remain future works.

4. Numerical simulations

In this section, numerical simulations are demonstrated to describe the usefulness of the proposed method. The task control input uitask is given by (35) uitask=jNixixjxixj,(35) considering a coverage control. The perturbation parameter ε is ϵ=0.01, and the control gains are kibc=1,kitask=1, and krestore=105. The control input ui is saturated as 0.2ui/ui if ui>0.2. The number of robotic-nodes is N = 20. The parameters of the link weight aij are defined in Equations (Equation3) and (Equation4) are set by α=40 and β=0.75.

We show a simulation result of the restoration control Equation (Equation22). Figure  represents snapshots of the initial configuration t = 0 (Figure (a)), at time t = 1.9 when the bi-connectivity is restored (Figure (b)), and at time t = 10 when the multi-robot system converges a stable state (Figure (c)). Figure  represents the approximated perturbed algebraic connectivity λ~(20) where the node 20 is initially an articulation one (x20(0)=(0,0)on Figure (a)). We can confirm that the algebraic connectivity λ~(20) increases and is greater than N/(5N9)0.22 after t = 1.9. This indicates the proposed control law Equation (Equation22) restores the bi-connectivity of the network and Equation (Equation14) preserves it.

Figure 7. Snapshots of simulation 1. (a) Initial configuration (t = 0). (b) Node 20 is restored at t = 1.9 and (c) Final configuration at t = 10.

Figure 7. Snapshots of simulation 1. (a) Initial configuration (t = 0). (b) Node 20 is restored at t = 1.9 and (c) Final configuration at t = 10.

Figure 8. Perturbed algebraic connectivity λ~(20) versus time t.

Figure 8. Perturbed algebraic connectivity λ~(20) versus time t.

Next, we examine the effects of the modified restoration algorithm Equation (Equation30). The time threshold t¯ is set as t¯=10. Figure  represents snapshots of the initial configuration t = 0 (Figure (a)), at time t = 20 when the robots move to restore the bi-connectivity (Figure (b)), and at time t = 80 when the bi-connectivity is restored (Figure (c)). Figure  represents the approximated perturbed algebraic connectivity λ~(20) and λ~(1), where node 20 is an articulation and node 1 is not an articulation initially. We can confirm that the algebraic connectivity λ~(20) increases and greater than N/(5N9)0.22 after t = 30. The algebraic connectivity λ~(1) once becomes less than N/(5N9)0.22 at t = 10 and becomes greater than N/(5N9)0.22 after t = 30. It indicates that node 1 becomes an articulation node once to robustify the network structure around node 20, and it resumes itself after node 20 becomes a non-articulation one.

Figure 9. Snapshots of simulation 2. (a) Initial configuration (t = 0). (b) t = 20 and (c) t = 80.

Figure 9. Snapshots of simulation 2. (a) Initial configuration (t = 0). (b) t = 20 and (c) t = 80.

Figure 10. Perturbed algebraic connectivities λ~(20) (blue line) and λ~(1) (red line) versus time t. Node 1 is initially non-articulation but becomes an articulation node to restore the bi-connectivity of the entire network.

Figure 10. Perturbed algebraic connectivities λ~(20) (blue line) and λ~(1) (red line) versus time t. Node 1 is initially non-articulation but becomes an articulation node to restore the bi-connectivity of the entire network.

5. Conclusion

In this paper, we proposed control methods to preserve and restore the bi-connectivity of the multi-robot network, in preparation for a failure of the robot. We introduced the concept of perturbed algebraic connectivity which reflects the connectivity of the graph after a node is removed, and we considered an artificial potential control to preserve the bi-connectivity holding the sufficient condition we derived. To restore the bi-connectivity when the network becomes uni-connected, heuristic control methods were proposed and possibilities and limitations of the methods were discussed. Results of numerical simulations illustrated the effectiveness of the proposed control method.

Future works are as follows. A sufficient condition to achieve the bi-connectivity restoration has not been analysed yet. Theoretical analysis and improvements for the bi-connectivity restoration control remain as future works. Wireless communication quality has not been discussed in this study, in spite of the fact that network connectedness is threatened by poor signal quality due to interference and fading. Evaluations of signal quality via experiments or electromagnetic simulations will be helpful to demonstrate and improve the effectiveness of the proposed control method.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Funding

This work was partially supported by JSPS KAKENHI [grant number 20K19902].

Notes on contributors

T. Murayama

T. Murayama received the Ph.D. degree in engineering from Kobe University in 2012. In 2023, he joined National Institute of Technology, Wakayama College as an assistant professor. Since 2016, he is an associate professor. From 2019 to 2020, he was a visiting researcher at Department of Sciences and Methods for Engineering, University of Modena and Reggio Emilia. He is a member of IEEE and SICE.

References

  • Cortes J, Martinez S, Karatas T, et al. Coverage control for mobile sensing networks. IEEE Trans Rob Autom. 2004;20(2):243–255.
  • Zavlanos M, Pappas G. Distributed connectivity control of mobile networks. IEEE Trans Rob. 2008;24(6):1416–1428.
  • Sabattini L, Chopra N, Secchi C. Decentralized connectivity maintenance for cooperative control of mobile robotic systems. Int J Rob Res. 2013;32(12):1411–1423.
  • Zareh M, Sabattini L, Secchi C. Decentralized biconnectivity conditions in multi-robot systems. In: 2016 IEEE 55th Conference on Decision and Control; Las Vegas (NV); 2016. p. 99–104.
  • Kata H, Ueno S. Connectivity maintenance with application to target search. SICE JCMSI. 2021;14(2):22–29.
  • Murayama T. Bi-connectivity improvement and preservation for multi-robot network using perturbed algebraic connectivity. In: SICE Annual Conference (SICE2021); 2021. p. 394–399.
  • Yang P, Freeman R, Gordon G, et al. Decentralized estimation and control of graph connectivity in mobile sensor networks. In: American Control Conference; Seattle; 2008. p. 2678–2683.
  • Murayama T, Sabattini L. Robustness of multi-robot systems controlling the size of the connected component after robot failure. In: Proceeding on 21st IFAC World Congress; Online; 2020. p. 3199–3205.
  • Murayama T, Sabattini L. Preservation of giant component size after robot failure for robustness of multi-robot network. In: The 15th International Symposium on Distributed Autonomous Robotic Systems (DARS); 2021.
  • Giordano PR, Franchi A, Secchi C, et al. A passivity-based decentralized strategy for generalized connectivity maintenance. Int J Robot Res. 2013;32(3):299–323.
  • Bollobás B. Random graphs. 2nd ed. Cambridge: Cambridge University Press; 2001.
  • Moreau L. Stability of continuous-time distributed consensus algorithms. In: 2004 43rd IEEE Conference on Decision and Control, Paradise Island, Bahamas; 2004. p. 3998–4003.

Appendix. Proof of Theorem 3.1

For simplicity, we assume the number of the connected components M = 2 from the monotonicity of the perturbed algebraic connectivity, and we write the perturbed algebraic connectivity as λˆ since it is obvious that we discuss the articulation node i in this proof. Defining D1=α and C1=β(N1) where 0<α<1 and 0<β<1, we get (A1) αβ(N1)αβ(N1)λˆ+(1α)(1β)(N1)(1α)(1β)(N1)λˆ+1=0,(A1) if vi0, from Equation (Equation10). Note the parameter β is in the finite set: (A2) β{1N1,2N1,,N2N1},(A2) since C1=β(N1) should be an integer. The perturbed algebraic connectivity λˆ is in the interval (A3) (αβ(N1),1α(1β)(N1)),(A3) with assuming α/β<(1α)/(1β), since λˆ is the minimum solution of the algebraic Equation (EquationA1). Note that the function f(λˆ) which denotes the left side of Equation (EquationA1) is monotonically increasing in the interval Equation (EquationA3).

To find the maximum of the perturbed algebraic connectivity λˆ(α,β) as a function of the valuables α and β, we analyse the gradients λˆ/α and λˆ/β. Considering the implicit function theorem, we get (A4) λˆα=f/αf/λˆ,λˆβ=f/βf/λˆ.(A4) With some calculations substituting the function f(λˆ,α,β), we get f/λˆ>0 and (A5a) fα=(αβ)(N1)2λˆ((α+β2αβ)2β(1β)(N1)λˆ)(αβ(N1)λˆ)2((1α)(1β)(N1)λˆ),(A5a) (A5b) fβ=(αβ)(N1)2λˆ((α+β2αβ)(N1)λˆ2α(1α))(αβ(N1)λˆ)2((1α)(1β)(N1)λˆ).(A5b)

Thus, the stationary points satisfy the relations, as (A6a) λˆα=0,if α=β or λˆ=α+β2αβ2β(1β)(N1),(A6a) (A6b) λˆβ=0,if α=β or λˆ=2α(1α)(α+β2αβ)(N1).(A6b)

Here, the candidates of the stationary points imply (A7) α+β2αβ2β(1β)(N1)=2α(1α)(α+β2αβ)(N1) (αβ)2=0,(A7) this shows the fact that (A8) λˆα=λˆβ=0only if α=β.(A8) Next, we discuss the stationary set S={(α,β)|α=β} is whether the extremum or the saddle with respect to the function λˆ(α,β). If the set S is the maximum, then the maximum perturbed algebraic connectivity is λˆ=1/(N1) from Equation (EquationA6a). If the set S is the minimum, then the maximum perturbed algebraic connectivity is λˆ(α,β) with (α,β){0,1}×{1/(N1),(N2)/(N1)}. This conflicts with the fact that α=0 implies the corresponding connected component is disconnected from the node i. If the set S is the saddle, then the maximum perturbed algebraic connectivity is λˆ(α,β) with λˆ/α=0 and β{1/(N1),(N2)/(N1)}. Substituting β=(N2)/(N1) into the second condition of Equation (EquationA6a), we get (A9) α=(N2)(12λˆ)N3,(A9) and substituting this into Equation (EquationA1), we get (A10) λˆ=N5N9.(A10) Since N/(5N9) is greater than 1/(N1) for all N2, Equation (EquationA10) is the maximum perturbed algebraic connectivity when the node i is not an articulation.