Skip to main content

Basic Operations and Types

  • Chapter
  • First Online:
Modeling Communication Networks and Protocols

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 61))

  • 285 Accesses

Abstract

In this chapter, we discuss the add-ons to the standard collection of types defined by C++ that create what we would call the look and feel of SMURPH programs, and introduce a few basic operations laying out the foundations for developing models in SMURPH.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In the days when SMURPH was programmed, C++ was a much less established tool than it is today.

  2. 2.

    This “variable” is in fact a macro referencing Time, so current time is stored in one place.

  3. 3.

    Thus, for BIG_precision equals 1 and 2, BIG numbers will be represented in the same way, using the standard integer type long.

  4. 4.

    If the size of type LONG is 64 bits, the overflow and error conditions are only checked for precisions higher than 2.

  5. 5.

    Recall that BIG numbers cannot be negative.

  6. 6.

    The original rationale for this feature was entering link distance matrices (Sect. 4.3.3) that, in many cases, consisted of a large number of identical entries.

  7. 7.

    The parser has been adapted from a publicly available (MIT license) code by Aaron Voisine .

  8. 8.

    The minimum guaranteed size of FLAGS is \(32\) bits.

  9. 9.

    Implemented as C macros.

  10. 10.

    A SMURPH program may be contained in several files and the fact that no multiple inheritance is used in one file does not preclude it from being used in another one.

  11. 11.

    The comma following “nickname” is needed (it is not a mistake).

  12. 12.

    This only concerns those mailboxes that are owned by stations. Mailboxes owned by processes can be destroyed (see Sect. 9.2.1).

References

  1. P. Gburzyński, P. Rudnicki, A Better-than-token protocol with bounded packet delay time for Ethernet-type LAN’s, in Proceedings of Symposium on the Simulation of Computer Networks (Colorado Springs, Co., 1987)

    Google Scholar 

  2. P. Gburzyński, P. Rudnicki, Using time to synchronize a token Ethernet, in Proceedings of CIPS Edmonton ’87 (1987)

    Google Scholar 

  3. P. Gburzyński, P. Rudnicki, A note on the performance of ENET II. IEEE J. Sel. Areas Commun. 7(4), 424–427 (1989)

    Google Scholar 

  4. L.G. Birta, G. Arbez, Modelling and Simulation (Springer, 2013)

    Google Scholar 

  5. L.A. Adamic, Zipf, power laws, and Pareto: a ranking tutorial. Xerox Palo Alto Research Center, Palo Alto, CA, http://ginger.hpl.hp.com/shl/papers/ranking/ranking.html (2000)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paweł Gburzyński .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gburzyński, P. (2019). Basic Operations and Types. In: Modeling Communication Networks and Protocols. Lecture Notes in Networks and Systems, vol 61. Springer, Cham. https://doi.org/10.1007/978-3-030-15391-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15391-5_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15390-8

  • Online ISBN: 978-3-030-15391-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics