Parameter region for the proper operation of the IEEE 802.2 LLC type 3 protocol: A petri net approach

System Evaluation Using Timed Petri Nets
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1605)


This paper derives the parameter region of the IEEE 802.2 LLC type 3 protocol to guarantee a proper operation. The protocol is modeled by a time Petri net and investigated using reachability analysis. Three necessary conditions on the parameters are derived, and then a reduced reachability graph is obtained by applying the necessary conditions to lessen the combinatorial state explosion. From the reduced reachability graph, a necessary and sufficient condition on the parameters is derived to guarantee the proper operation of the LLC type 3 protocol for a link. By using the condition, a procedure to set the parameters of the LLC type 3 protocol is provided at each station in a network.

Key Words

IEEE 802.2 LLC type 3 protocol proper operation parameter Petri net 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    ISO/IEC 8802-2: Logical Link Control, IEEE, Inc., 1994.Google Scholar
  2. 2.
    A. Valenzano, C. Demartini, and L. Ciminiera, MAP and TOP Communications: Standards and Applications, Addison-Wesley, 1992.Google Scholar
  3. 3.
    Ichiro Suzuki, “Formal Analysis of the Alternating Bit Protocol by Temporal Petri Nets”, IEEE Trans. on Software Engineering, Vol. 16, No. 11, Nov. 1990, pp. 1273–1281.CrossRefGoogle Scholar
  4. 4.
    Ernst W. Biersack, “Performance of the IEEE 802.2 Type-2 Logical Link Protocol with Selective Retransmission”, IEEE Trans. on Comm. Vol. 41, No. 2, Feb. 1993, pp. 291–294.CrossRefGoogle Scholar
  5. 5.
    H. K. Pung, “Effects of window flow control on the 802.2 Type-II logical link performance in ArbNet”, Computer Communications, Vol. 16, No. 7, July 1993, pp. 403–412.CrossRefGoogle Scholar
  6. 6.
    Abd E. Elnakhal and Helmut Rzehak, “Design and Performance Evaluation of Real Time Communication Architectures”, IEEE Trans. on Industrial Electronics, Vol. 40, No. 4, Aug. 1993, pp. 404–411.CrossRefGoogle Scholar
  7. 7.
    P. Merlin and D. J. Faber, “Recoverability of communication protocols”, IEEE Trans. Commun., Vol. COM-24, No. 9, Sept. 1976, pp. 1036–1043.MATHCrossRefGoogle Scholar
  8. 8.
    B. Berthomieu and M. Diaz, “Modeling and Verification of Time Dependent Systems Using Time Petri Nets”, IEEE Transactions on Software Engineering, Vol. 17, No. 3, Mar, 1991, pp. 259–273.MathSciNetCrossRefGoogle Scholar
  9. 9.
    Nancy G. Leveson and Janice L. Stolzy, “Safety Analysis Using Petri Nets”, IEEE Trans. on Software Engineering, Vol. SE-13, No. 3, March 1987, pp. 386–397.Google Scholar
  10. 10.
    Giacomo Bucci and Enrico Vicario, “Compositional Validation of Time-Critical Systems Using Communicating Time Petri Nets”, IEEE Trans. on Software Engineering, Vol. 21, No. 12, December 1995, pp. 969–992.CrossRefGoogle Scholar
  11. 11.
    Rajeev Alur, Thomas A. Henzinger, and Pei-Hsin Ho, “Automatic Symbolic Verification of Embedded Systems”, IEEE Trans. on Software Engineering, Vol. 22, No. 3, March 1996, pp. 181–201.CrossRefGoogle Scholar
  12. 12.
    R. L. Schwartz and P. M. Melliar-Smith, “From State Machines to Temporal Logic: Specification Methods for Protocol Standards”, IEEE Trans. on Commun., Vol. COM-30, No. 12, Dec. 1982, pp. 2486–2496.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • Hong-ju Moon
    • 1
  • Sang Yong Moon
    • 1
  • Wook Hyun Kwon
    • 1
  1. 1.Control Information Systems Laboratory, School of Electrical EngineeringSeoul National UniversitySeoulKorea

Personalised recommendations