Short answer: Yes. As long as you can get a trunk link between your device and the switch.
Long Answer: This attack takes advantage of how the native vlan works with dot1Q packets. A trunk link negotiates the encapsulation protocol of the link, which is usually 802.1Q. If you just send dot1q packets to the switch they are going to be dropped so that is why you need to create that trunk link between the devices, so as long as you can do that then you can replicate the attack. You will have to do some more research on how LAPD works and its default settings. For example, in Cisco's Catalyst family of switches, DTP is set to 'desirable' by default, meaning that it is willing to trunk and all you have to do is tell that port that you want to trunk and it will create that trunk link and negotiate the encapsulation protocol (Usually 802.1Q). I demonstrated this using a tool called Yersinia. So, you will have to see if LAPD does something similar. You will also have to make sure the other correct variables are in place to make this attack work as well but overall, if you can create a trunk between your device and the switch then it is possible to replicate the attack.
Things to think about:
Make sure to research the default configurations of the HP switch and the different modes of LAPD if you are going to make a practical case for this attack. For example, how I outlined above about the default configuration of DTP and why it works.
If you are going to target LAPD then you might have trouble finding a tool that does this as Yersinia attacks DTP because Cisco is much more popular. If you need or have the time to create your own tool, then you can accomplish this with the Scapy library for Python which allows you to create and craft packets at the each layer of the TCP/IP hybrid model and let's you to implement and define specific protocols and parameters.
For this attack to work in demonstration make sure you get a trunk link, you are sitting in the native vlan as an attacker and the target is in a different vlan.
If this is just to demonstrate the VLAN -hopping attack itself and not HP LAPD specifically then I recommend you try to get your hands on a Cisco device even if its virtual through GNS3 or Cisco Packet Tracer. It would be much easier to demonstrate as Yersinia is an already created tool that can attack DTP and craft double-tagged packets.