Petri Nets Lecturer: Roohollah Abdipour
Jan 14, 2016
Petri Nets
Lecturer: Roohollah Abdipour
2
Agenda
• Introduction • Petri Net• Modelling with Petri Net• Analysis of Petri net
3
Introduction
• Techniques for Evaluating SW / HW:– Simulation– Testing– Deductive Verification– Model Checking
4
Introduction (2)
• Simulation & Testing:– Needs experiments before system deployment– Simulation is performed on an abstraction of a
model of the system– Testing is performed on the real system.– It is very diffucult to evaluate all possible
interactions / faults / behaviors / states–
5
Introduction (3)
• Deductive Verification:– Validate a system’s performance based on
deductive rules– Applicable to infinite-state systems– A time-consuming process– Needs expert people with good experiments– Usually is used for critical systems (e.g., security
protocols)
6
Introduction (4)
• Model Checking:– An automated technique to evaluate finite-state
systems– Perform a thorough search in the state space of
the system in order to determine some properties of the system.
7
Introduction (5)
• The process of Model Checking:
• Modeling: Transform a design to formalism (e.g., a state-transition graph of the system)
• Verification: Perform a thorough search in the state space of the system in order to determine whether some properties of the system are true or not.• Is performed automatically
8
Petri Net
• A ‘Petri Net’ was introduced by a German mathematician and used to model a system– Condition: a Boolean description of the state of the
system – Event: an action that depends on the state of the system
• Petri net is a graphical and mathematical tools for the analysis of discrete event dynamic systems.– The system model is represented by a set of conditions
and a set of events – A condition is represented by a place and an event by
transition.
9
Petri Net: Building Blocks
place
counter
transition
Place for user input
Basic Elements
• PN consists of three types of components: places (circles), transitions (rectangles) and arcs (arrows):– Places represent possible states of the system;– Transitions are events or actions which cause the change of
state; And– Every arc simply connects a place with a transition or a transition
with a place.
arcs
inhibitor
10
Petri Net
• Building Blocks:
• An example:
t2 t3t1
p1 p3
p2
11
Petri Net: Marks (Tokens)
• A marking M is an assignment of tokens (dots) to places of a petri net.
• Dots are placed in the circle to represent place in which its condition is satisfied – e.g. a resource is available or operation in a
process
• The marking can be represented as M = (1,1,0)
12
Petri Net: Marks (Tokens)
• A place can have more than one token and therefore can represent a queue – (e.g. a buffer holding several processes).
t2 t3t1
p1 p3
p2
13
Petri Net : Firing a transition
• Executing a marked Petri net causes the number and positions of the token to change. The rules for the execution are:– A transition is enabled if all its input places contain at least one
token. – Any enabled transition may fire– Firing of a transition results in one token being removed from
each of its input places and being deposited of its output places
– Execution halts when there are no enabled transitions. – Each time a transitions fires, the marking of the petri net will
change.
14
Petri Net : Example
t2 t3 t1
p1 p3
p2
1 1 0
0 0 1
t2t1
0 1 0
t3
M2
M0
M1
15
Petri Net: Formal Definition
A Petri net (PN) is a 5 tuplePN (P,T,IN,OUT,M)where:
P = {p1,p2,....,p~} is a finite set of places, T = {t1, t2, …,tn} is a finite set of transitions
IN:(PxT)S OUT: (TxP)S M: Marking vector
16
Petri Net: Formal Definition (cont’d)
• IN are input functions defining directed arcs from
• places to transitions • OUT are output functions defining directed arcs• from transitions to places• S is a set of all nonnegative integers k such
that:• If k = 1 a directed arc is drawn without a label• If k > 1 a directed arc is drawn with label k. • If k = 0 no arc is drawn.
17
Petri Net: Formal Definition (cont’d)
• An example:
18
Petri Net: Firing Rules for Transitions
• A specific transition ti is said to be firable or enabled if each input place pi is marked with at least w(pi,ti) tokens where w(pi,ti) is the weight of the arc from pi to ti.
• An enabled transition may or may not fire depending on whether or not the event actually takes place .
• The firing of an enabled transition ti removes w(pi,ti) tokens from each input place pi of ti, and adds w(pj,ti) tokens to each output place pj of ti where w(pi,ti) is the weight of the arc from input place pi to ti, and w(pj,ti) is the weight of the arc from ti to output place pj
19
Petri Net: Firing Rules for Transitions
20
Petri Net: Firing Rules for Transitions
• Firing Examples
21
PN: Firing Rules for Transitions
• Firing Examples
22
PN: Firing Rules for Transitions
• Firing of a sequence of transitions:
23
PN: Firing Rules for Transitions
• Firing of a sequence of transitions:
24
PN: Firing Rules for Transitions
• Firing of a sequence of transitions:
25
PN: Firing Rules for Transitions
• Firing of a sequence of transitions:
26
PN: Change of States (1)
• is denoted by a movement of token(s) (black dots) from place(s) to place(s); and is caused by the firing of a transition.
• The firing represents an occurrence of the event or an action taken.
• The firing is subject to the input conditions, denoted by token availability.
27
PN: Change of States (2)• A transition is firable or enabled when
there are sufficient tokens in its input places.
• After firing, tokens will be transferred from the input places (old state) to the output places, denoting the new state.
• Note that the examples are Petri nets representation of a finite state machine (FSM). PNs are much more powerful to model systems beyond FSMs.
28
Modelling with petri net
• Petri net is mainly used for modelling. – Many systems can be modelled by petri net.
• The system may be of many different kinds like computer hardware, computer software, physical system and so on. – Petri net is used to model the occurrence of
various events and activities in the system.
29
Modelling with petri net
• Sequential Execution:
30
Modelling with petri net
– Concurrency: two events could take place in parallel, without interfering with one another.
31
Modelling with petri net
• Synchronisation: By having two places as input conditions to the same transition, these two conditions become synchronised.
32
Modelling with petri net
• Example : Concurrency and Synchronisation
t2
t3
t1
p1
p3
p2 p4
p6
p7
p5
t5
t4
Concurrency Synchronization
33
Modelling with petri net
• Confilincts:• Two transitions t1 and t2 are
said to be conflict if either t1
or t2 can occur but not both of
them, – i.e., when there is one place
that is acting as input condition to a number of transitions.
– Therefore, only one transition can be fire.
tk
Pi
tj
34
Modelling with petri net
• Merging:
35
Modelling with petri net
• Example: Font Selection
Bold on
Bold off
User presses bold
T1 T2
Italic on
User presses italic
T3 T4
User presses italic
36
Modelling with petri net
• Another Example: a finite-state machine – Consider a vending machine • It accepts either nickels or dimes • Sells 15c or 20c candy bars• The vending machine can hold up to 20c• Coin return transitions are omittedthe next slides are the state diagram of this
vending machine which represented by the Petri net Any finite-state machine (or its state diagram) can bemodeled with a state machine.
37
Modelling with petri net
• Another Example: a finite-state machine Get 15c candy
Deposit 5c 5c Deposit 10c
15c
Deposit 5c Deposit 5c
0c
p1 Deposit 5c
Deposit 10c 10c Deposit10c 20c
Get 20c candy
CY2003- Week 7 38© LJMU, 2004
Modelling with petri net
• Mutual exclusion – Recall: Mutual exclusion is a technique of defining
entry and exit code so that at most one process is allowed to access the critical region at the same time.
• The idea is that no process is allowed to enter the critical region, unless it checks that no other process is executing its own critical region.
– Mutual exclusion can be represented in Petri net using conflict.
CY2003- Week 7 39© LJMU, 2004
Mutual exclusion• The place s represents the
permission to enter the critical region and there must be token in p1 and p2. – If both processes want to
enter the critical region simultaneously, then transition t1 and t2 are in conflict
– i.e., only one of them can fire.
t1 t2
p2 p1
s Critical
section
Critical
section
Process 2 Process 1
CY2003- Week 7 40© LJMU, 2004
Producer consumer problem
• bounded buffer
n
Produce
Put in
buffe
B
Consume
Remove
from buffer
ProducerConsumer
CY2003- Week 7 41© LJMU, 2004
Analysis of Petri net
• Petri nets are capable of modelling a large variety of systems and properly representing the interactions between the various actions which can occur. – The strength of Petri net is its capability to model
the system. • However, modelling by itself is of little use and its
necessary to analyse the modelled system. This could lead to important insights into the behaviour of the modelled system.
CY2003- Week 7 42© LJMU, 2004
Reachibility• Given a Petri net, one would like to know
which marking Mr can be reached from an initial marking M0.
• Example: For the Petri net of the bounded buffer consumer producer problem, M0 = (1, 0, 1, 0, 0, n) and M1 = (0, 1, 1, 0, 0, n) – is immediately reachable from the marking of M0.
CY2003- Week 7 43© LJMU, 2004
Analysis of Petri net : Safeness
• A place in a Petri net is safe if the number of tokens in that place never exceeds one.– A petri net is same if all
its places are safe.
what does this Petri net do? Is it safe?
E2
M2
C2 M3
E3
C3
M4
E4
C4
M5
E5 C5
M1
E1
C1
CY2003- Week 7 44© LJMU, 2004
Analysis of Petri net : Boundedness
• A place is k-safe or k-bounded if the number of tokens in that place cannot exceed an integer k.– Therefore a place is 1-bounded is simply a safe place.
• Example: – The Petri net for the producer/consumer problem
with a bounded buffer, is it safe? Bounded?
– The Petri net for the producer/consumer problem with a unbounded buffer, is it bounded? Why?
CY2003- Week 7 45© LJMU, 2004
Analysis of Petri net : Conservation
• A Petri net with an initial marking M0, is strictly conservative, – if for all the reachable marking, the total number of tokens
in each marking is exactly the same as the initial marking. • A Petri net can be used to model resource allocation
systems. In this systems some tokens may represents the resources. – Therefore, in such Petri nets conservation is an important
property such that resources can neither be created nor destroyed.
CY2003- Week 7 46© LJMU, 2004
Analysis of Petri net : Liveness• Another problem that could occur in resource
allocation is deadlock.
– A deadlock in a Petri net is a transition (or a set of transition) which cannot fire.
– A transition is alive if it is not deadlock. – A transition is live in a marking M if it is potentially
fireable in every marking in the Petri net.
CY2003- Week 7 47© LJMU, 2004
Exercises
• For the above Petri net, indicate whether each is bounded, live, and conservative or not and show why?
p1
p2 p4
p3
p1
p2
p3
t1
t2 t3
t1
t2
t3
p1
p2 p3
p4
t1
t2
t3
t4
CY2003- Week 7 48© LJMU, 2004
Summary
• Petri net– concepts– Petri net representation– Firing a transition– Marks (Tokens)
• Modeling with Petri net – Events and condition