Analysis of a Scheme for Iterated Identification and Control