SlideShare a Scribd company logo
1 of 11
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
DOI : 10.5121/ijcnc.2015.7112 167
SECTION BASED HEX-CELL ROUTING ALGORITHM
(SBHCR)
Mohammad Qatawneh, Ahmad Alamoush and Ja'far Alqatawna
King Abdullah II School for Information Technology, The University of Jordan, Amman,
Jordan
ABSTRACT
A Hex-Cell network topology can be constructed using units of hexagon cells. It has been introduced in the
literature as interconnection network suitable for large parallel computers, which can connect large
number of nodes with three links per node. Although this topology exhibits attractive characteristics such
as embeddability, symmetry, regularity, strong resilience, and simple routing, the previously suggested
routing algorithms suffer from the high number of logical operations and the need for readdressing of
nodes every time a new level is add to the network. This negatively impacts the performance of the network
as it increases the execution time of these algorithms. In this paper we propose an improved optimal point
to point routing algorithm for Hex-Cell network. The algorithm is based on dividing the Hex-Cell topology
into six divisions, hence the name Section Based Hex-Cell Routing (SBHCR). The SBHCR algorithm is
simple and preserves the advantage of the addressing scheme proposed for the Hex-Cell network. It does
not depend on the depth of the network topology which leads to overcome the issue of readdressing of
nodes every time a new level is added. Evaluation against two previously suggested routing algorithms has
shown the superiority of SBHCR in term of less logical operations.
KEYWORDS
Hex-Cell topology, Routing Algorithm, Interconnection Topology, Networking.
1.INTRODUCTION
Routing algorithms is a popular topic in the study of computer networks, distributed systems and
their applications [1,2]. The design of routing algorithm plays an important role in determining
the performance of tightly and loosely coupled systems. The efficiency of many applications that
run on tightly and loosely coupled systems depends highly on communication time which is
affected by characteristics of routing algorithm. Routing algorithm should prove correctness,
simplicity, robustness, stability, fairness and optimality [3,4,5,6].
Several static interconnection networks and their related routing algorithms have been reported in
the literature [6,7,8,9,10]. Hex-Cell network is a class of interconnection networks which has
proposed for parallel computing systems [10,11,12,13,14]. Its topology can be constructed using
units of hexagon cells. Sharieh et al. [10] suggested the original routing algorithm in which the
addressing mode was based on the depth of the network and the position of the node in the level.
The routing from one node to another can be done using one or more of the following three
functions: moveUp, moveDown and moveHorizontal. Qatawneh et al. [11] have criticized the
dependency on the depth of Hex-Cell network which mean that the topology must be fixed
otherwise the depth value must be updated to readdress the nodes every time a new level is added.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
168
Therefore, they have proposed an alternative routing algorithm in which the node addressing is
based on the address of the three cells around the node while the cell itself is addressed based on
Cartesian coordinate (X-axis and Y-axis). Their algorithm assumes the central cell is having (0,0)
as coordinate and in order to reach the destination two functions need to be used: Cell Routing
and Node Routing.
Although Hex-Cell topology exhibits attractive characteristics such as embeddability, symmetry,
regularity, strong resilience, and simplicity[10,11,12,13], the previously suggested routing
algorithms[10,11] suffer from the high number of logical operations and the need for readdressing
network nodes every time a new level is added which negatively impact the running time of that
network. Therefore, the aim of this paper is to propose a new routing algorithm for Hex-Cell
network that eliminate these shortcomings.
The rest of the paper is organized as follows. Section 2 provides an overview of Hex-Cell
network. Section 3 presents the proposed routing algorithm. Section 4 compares the algorithm to
its predecessor. Finally conclusion is presented in section 5.
2. HEX–CELL NETWORK TOPOLOGY
A Hex-Cell network [9] with depth d is denoted by HC (d) and can be constructed by using units
of hexagon cells, each of six nodes. A Hex-Cell network with depth d has d levels numbered from
1 to d, where, level 1 represents the innermost level corresponding to one hexagon cell. Level 2
corresponds to the six hexagon cells surrounding the hexagon at level 1. Level 3 corresponds to
the 12 hexagon cells surrounding the six hexagons at level 2 as shown in figure 1. The levels of
the HC (d) network are labeled from 1 to d. Each level i has Ni nodes, representing processing
elements and interconnected in a ring structure [10, 11].
Figure 1. (a) Hex-Cell with 1 level, 2 levels and 3 levels [10]
3.SBHCR ALGORITHM
The routing algorithm which is proposed in [10] depends on the depth of Hex-Cell network which
means that the topology must be fixed or there is a need for updating the depth value and
readdressing which in turns increase the setup time [11]. The number of logical operations may
increase as the depth of Hex-Cell increases which leads to more time in calculating the routing
algorithm to forward the message from one node to another. The SBHCR algorithm eliminates
the above disadvantages by proposing simple and flexible addressing mode. In order to explain
the SBHCR, we propose new addressing scheme for Hex-Cell topology which is based on the
following key assumptions:
1- The Hex-Cell topology is divided into six sections labeled from left to right (clockwise) and
numbered from 1 to 6, as shown in figure 2.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
169
2- The address of each node in the Hex-Cell topology is identified by (S,L,X) where S denotes
the section number, L denotes the level number, and X denotes the node number on that
level labeled from X1,…, Xn; where n = ((2×L) - 1).
Figure 2. Hex-Cell addressing scheme for HC (3) network
A node with the address 1.1.1 is the first node that exists at the section number 1 and level
number 1. A node 1.2.1 refers to first node that exists at the section number 1 and level number 2
and so on. In SBHCR algorithm for HC as shown in Figure 3, the movement from one node to
another can be done using one of the following five cases as shown in figure 3 (a).
Figure 3.(a) The main function for the SBHCR algorithm
As an input to this routing algorithm the address of the source node (which is the first node
address) and the address of the destination node (Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest) is used to
get the output which is the address of the second node and the address of the destination node
(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest). Then the second node apply the routing algorithm using
the address of the source node (which is the second node address in this case) and the address of
the destination node (Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest) to get the address of the third node
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
170
and the address of the destination node (Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest). We continue this
way until we reach the source address equal the destination address.
moveToUpperLevelC1(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest)
Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest) {
If (Lsrc is odd)  return (Ssrc, Lsrc + 1, Xsrc + 1, Sdest, Ldest, Xdest)
Else
If (Xsrc < Xdest)  return (Ssrc, Lsrc, Xsrc + 1, Sdest, Ldest, Xdest)
Else  return (Ssrc, Lsrc, Xsrc - 1, Sdest, Ldest, Xdest) }
---------------------------------------------------------------------------------------------------------------------
moveToLowerLevelC1(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest)
Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest){
If (Lsrc is even)  return (Ssrc, Lsrc - 1, Xsrc - 1, Sdest, Ldest, Xdest)
Else
If (Xsrc ≤ Xdest)  return (Ssrc, Lsrc, Xsrc + 1, Sdest, Ldest, Xdest)
Else  return (Ssrc, Lsrc, Xsrc - 1, Sdest, Ldest, Xdest) }
---------------------------------------------------------------------------------------------------------------------
moveToLowerLevelC2(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest)
Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest){
If (Xsrc is even)  return (Ssrc, Lsrc - 1, Xsrc - 1, Sdest, Ldest, Xdest)
Else
If (Xsrc + 1 > ((2 × Lsrc) – 1))
If (Ssrc = 6)  return(1, Lsrc, 1, Sdest, Ldest, Xdest)
Else  return (Ssrc + 1, Lsrc, 1, Sdest, Ldest, Xdest)
Else  return (Ssrc, Lsrc, Xsrc + 1, Sdest, Ldest, Xdest)}
---------------------------------------------------------------------------------------------------------------------
moveToLowerLevelC3(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest)
Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest){
If (Xsrc is even)  return(Ssrc, Lsrc - 1, Xsrc - 1, Sdest, Ldest, Xdest)
Else
If (Xsrc + 1 > ((2 × Lsrc) – 1))
If (Ssrc = 6)  return(1, Lsrc, 1, Sdest, Ldest, Xdest)
Else  return (Ssrc + 1, Lsrc, 1, Sdest, Ldest, Xdest)
Else  return (Ssrc, Lsrc, Xsrc + 1, Sdest, Ldest, Xdest)}
---------------------------------------------------------------------------------------------------------------------
moveToLowerLevelC4(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest)
Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest){
If (Xsrc is even)  return(Ssrc, Lsrc - 1, Xsrc - 1, Sdest, Ldest, Xdest)
Else
If (Xsrc - 1 < 1)
If (Ssrc = 1)  return (6, Lsrc, ((2 × Lsrc) – 1), Sdest, Ldest, Xdest)
Else  return (Ssrc - 1, Lsrc, ((2 × Lsrc ) – 1), Sdest, Ldest, Xdest)
Else  return (Ssrc, Lsrc, Xsrc - 1, Sdest, Ldest, Xdest) }
---------------------------------------------------------------------------------------------------------------------
moveToLowerLevelC5(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest)
Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest){
If (Xsrc is even)  return(Ssrc, Lsrc - 1, Xsrc - 1, Sdest, Ldest, Xdest)
Else
If (Xsrc - 1 < 1)
If (Ssrc = 1)  return (6, Lsrc, ((2 × Lsrc) – 1), Sdest, Ldest, Xdest)
Else  return (Ssrc - 1, Lsrc, ((2 × Lsrc ) – 1), Sdest, Ldest, Xdest)
Else  return (Ssrc, Lsrc, Xsrc - 1, Sdest, Ldest, Xdest) }
---------------------------------------------------------------------------------------------------------------------
moveSameLevelC1(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest)
Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest){
If (Xsrc < Xdest)  return (Ssrc, Lsrc, Xsrc + 1, Sdest, Ldest, Xdest)
Else  return (Ssrc, Lsrc, Xsrc - 1, Sdest, Ldest, Xdest)}
---------------------------------------------------------------------------------------------------------------------
moveSameLevelC2(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest)
Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest){
If (Xsrc + 1 > ((2 × Lsrc) – 1))
If (Ssrc = 6)  return(1, Lsrc, 1, Sdest, Ldest, Xdest)
Else  return (Ssrc + 1, Lsrc, 1, Sdest, Ldest, Xdest)
Else  return (Ssrc, Lsrc, Xsrc + 1, Sdest, Ldest, Xdest)}
---------------------------------------------------------------------------------------------------------------------
moveSameLevelC5(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest)
Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest){
If (Xsrc - 1 < 1)
If (Ssrc = 1)  return (6, Lsrc, ((2 × Lsrc) – 1), Sdest, Ldest, Xdest)
Else  return (Ssrc - 1, Lsrc, ((2 × Lsrc ) – 1), Sdest, Ldest, Xdest)
Else  return (Ssrc, Lsrc, Xsrc - 1, Sdest, Ldest, Xdest)}
Figure 3.(b) The sub-functions the SBHCR algorithm
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
171
4.SCENARIO BASED DISCUSSION
The following examples explain the above routing cases. For this purposed, we consider a
network of a Hex-cell topology with 4 levels; i.e. HC (4) as shown in Figure 4.
Figure 4. HC (4) topology with labeled nodes and levels
Scenario 1: The source and destination in the same section and level
Let (Ss.Ls.Xs) = (2.4.2) be the source node and (Sd.Ld.Xd) = (2.4.7) be the destination node. When
executing the routing algorithm, CASE 1 will be applied. To reach the destination, the algorithm
goes through five steps; i.e., (2.4.2) → (2.4.3) → (2.4.4) → (2.4.5) → (2.4.6) → (2.4.7) , as
shown in Figure (5).
Figure 5. The source and destination in the same section and level
Scenario 2: source and destination are in the same section and different levels
(destination level less than source level)
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
172
Let (Ss.Ls.Xs) = (5.4.5) be the source node and (Sd.Ld.Xd) = (5.2.1) be the destination node.
When executing the routing algorithm, CASE 1 will be applied. To reach the destination, the
algorithm goes through four steps; i.e., (5.4.5) → (5.4.4) → (5.3.3) → (5.3.2) → (5.2.1), as shown
in Figure (6).
Figure 6: source and destination are in the same section and different levels
(destination level less than source level).
Scenario 3: source and destination are in the same section and different levels
(source level less than destination level)
Let (Ss.Ls.Xs) = (5.3.2) be the source node and (Sd.Ld.Xd) = (5.4.7) be the destination node.
When executing the routing algorithm, CASE 1 will be applied. To reach the destination, the
algorithm goes through five steps; i.e., (5.3.2) → (5.3.3) → (5.4.4) → (5.4.5) → (5.4.6) →
(5.4.7), as shown in Figure (7).
figure 7. Source and destination are in the same section and different levels
(source level less than destination level)
Scenario 4: source and destination are in different sections (Ss = Sd - 1 or Ss = Sd + 5)
(source level less than or equal destination level)
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
173
Let (Ss.Ls.Xs) = (1.3.2) be the source node and (Sd.Ld.Xd) = (2.4.1) be the destination node.
When executing the routing algorithm, CASE 2 will be applied. To reach the destination, the
algorithm goes through six steps; i.e., (1.3.2) → (1.3.3) → (1.3.4) → (1.3.5) → (2.3.1) → (2.4.2)
→ (2.4.1), as shown in Figure (8).
Figure 8. Source and destination are in different sections (Ss = Sd - 1 or Ss = Sd + 5)
(source level less than or equal destination level).
Scenario 5: source and destination are in different sections (Ss = Sd - 1 or Ss = Sd +
5) (destination level less than source level)
Let (Ss.Ls.Xs) = (1.4.4) be the source node and (Sd.Ld.Xd) = (2.2.3) be the destination node.
When executing the routing algorithm, CASE 2 will be applied. To reach the destination, the
algorithm goes through six steps; i.e., (1.4.4) → (1.3.3) → (1.3.4) → (1.2.3) → (2.2.1) → (2.2.2)
→ (2.2.3), as shown in Figure (9).
Figure 9. Source and destination are in different sections (Ss = Sd - 1 or Ss = Sd + 5)
(destination level less than source level)
Scenario 6: source and destination are in different sections (Ss = Sd – 2 or Ss = Sd + 4)
Let (Ss.Ls.Xs) = (4.3.2) be the source node and (Sd.Ld.Xd) = (6.3.3) be the destination node.
When executing the routing algorithm, CASE 3 will be applied. To reach the destination, the
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
174
algorithm goes through nine steps; i.e., (4.3.2) → (4.2.1) → (4.2.2) → (4.1.1) → (5.1.1) → (6.1.1)
→ (6.2.2) → (6.2.3) → (6.3.4) → (6.3.3), as shown in Figure (10).
Figure 10. Source and destination are in the different sections (Ss = Sd - 2 or Ss = Sd + 4)
Scenario 7: source and destination are in different sections (Ss = Sd - 3 or Ss = Sd + 3
or Ss = Sd - 4 or Ss = Sd + 2 )
Let (Ss.Ls.Xs) = (6.3.3) be the source node and (Sd.Ld.Xd) = (3.3.3) be the destination node. When
executing the routing algorithm, CASE 4 will be applied. To reach the destination, the algorithm
goes through eleven steps; i.e., (6.3.3) → (6.3.4) → (6.2.3) → (1.2.1) → (1.2.2) → (1.1.1) →
(2.1.1) → (3.1.1) → (3.2.2) → (3.2.3) → (3.3.4) → (3.3.3), as shown in Figure(11).
Figure 11. Source and destination are in different sections
(Ss = Sd - 3 or Ss = Sd + 3 or Ss = Sd - 4 or Ss = Sd + 2 )
Scenario 8: source and destination are in the different sections (Ss = Sd - 5 or Ss = Sd
+ 1) (source level less than or equal destination level).
Let (Ss.Ls.Xs) = (5.2.3) be the source node and (Sd.Ld.Xd) = (4.4.2) be the destination node. When
executing the routing algorithm, CASE 5 will be applied. To reach the destination, the algorithm
goes through eight steps; i.e., (5.2.3) → (5.2.2) → (5.2.1) → (4.2.3) → (4.3.4) → (4.3.3) →
(4.4.4) → (4.4.3) → (4.4.2), as shown in Figure (12).
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
175
Figure 12. Source and destination are in the different sections (Ss = Sd - 5 or Ss = Sd + 1)
(source level less than or equal destination level).
Scenario 9: source and destination are in different sections (Ss = Sd - 5 or Ss = Sd + 1)
(destination level less than source level)
Let (Ss.Ls.Xs) = (5.4.4) be the source node and (Sd.Ld.Xd) = (4.2.2) be the destination node. When
executing the routing algorithm, CASE 5 will be applied. To reach the destination, the algorithm
goes through five steps; i.e., (5.4.4) → (5.3.3) → (5.3.2) → (5.2.1) → (4.2.3) → (4.2.2), as shown
in Figure (13).
Figure 13. source and destination are in different sections (Ss = Sd - 5 or Ss = Sd + 1)
(destination level less than source level)
5.COMPARISON BETWEEN SBHCR AND OTHERS ALGORITHMS
The original Hex-Cell routing [10] uses a centralized algorithm to find the best path from the
source to the destination. This means that one node do the job, and it is same in the alternative
algorithm proposed in [11]. In the contrary, in the SBHCR each node finds the best next node in
order to get to the final destination. Thus, the total number of required operation to perform
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
176
logical comparison is divided on the nodes, which would give better performance when compared
with a single node performing the same logical operation.
Table 1. Comparison between SBHCR and others algorithms.
For instance, the number of steps and logical comparison between two same nodes:
1) Original routing algorithm [10]:
a) From node (4.8) to (5.8) it takes 3 Steps and need 13 Logical Operations
b) From node (3.7) to (6.7) it takes 5 Steps and need 21 Logical Operations
2) Alternative Routing Algorithm [11]:
a) From node ((1,-1),(0,0),(1,1)) to ((-1,-1),(0,0),(-1,1)) it takes 3 Steps and
need 25 Logical Operations
b) From node ((1,-1),(2,0),(1,1)) to ((-1,-1),(-2,0),(-1,1))it takes 5 Steps and
need 85 Logical Operations
3) SBHCR Algorithm
a) From node (2.1.1) to (5.1.1) it takes 3 Steps and need 22 Logical
Operations
b) From node (2.2.2) to (5.2.2) it takes 5 Steps and need 32 Logical
Operations.
6.CONCLUSION
In this paper we propose a new routing algorithm for Hex-Cell network that eliminates the
weaknesses of the previously suggested algorithms. The algorithm is based on dividing the Hex-
Cell topology into six divisions and called Section Based Hex-Cell Routing (SBHCR). The
SBHCR algorithm is simple and preserves the advantage of the addressing scheme proposed for
the Hex-Cell network. The SBHCR does not depend on the depth like the current addressing
which means that the network can be extended without reconfiguration the whole network.
Moreover, in this algorithm the task of finding the best routing path is performed by more than
one node which implies better performance.
Proposed
Routing
Algorithm
Routing Algorithm in [11]Original Routing
Algorithm [10]First Cell Level
333Number of Steps
232513Number of Logical Operations
sum, sub and
mod
sum and subsum, sub and modArithmetic operation
Second Cell Level
555Number of Steps
328521Number of Logical Operations
sum, sub and
mod
sum and subsum, sub and modArithmetic operation
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
177
REFERENCES
[1] A
[2] Chatterjee, Pushpita. "Trust based
-
[3] Decayeux, Catherine, and David Seme. "3D hexagonal network: Modeling, topological properties,
addressing scheme, and optimal routing algorithm." Parallel and Distributed Systems, IEEE
Transactions on 16.9 (2005): 875-884.
[4] Tse-Yun Feng; Seung-Woo Seo, "A new routing algorithm for a class of rearrangeable networks,"
Computers, IEEE Transactions on , vol.43, no.11, pp.1270,1280, Nov 1994 doi: 10.1109/12.324560.
[5 ]Chen, Chi-Chang, and Jianer Chen. "Nearly optimal one-to-many parallel routing in star networks."
Parallel and Distributed Systems, IEEE Transactions on 8.12 (1997): 1196-1202.
[6] Mohammad, Qatawneh. "Adaptive fault tolerant routing algorithm for Tree-Hypercube
multicomputer." Journal of Computer Science 2, no. 2 (2006): 124.
[7] Li, Keqin. "Parallel processing of divisible loads on partitionable static interconnection networks."
Cluster Computing 6, no. 1 (2003): 47-55.
[8] Dündar, Pinar. "Stability measures of some static interconnection networks." International journal of
computer mathematics 76, no. 4 (2001): 455-462.
[9] Abd-El-Barr, Mostafa, and Fayez Gebali. "Reliability analysis and fault tolerance for hypercube
multi-computer networks." Information Sciences 276 (2014): 295-318.
[10] Ahmad Sharieh, Mohammad Qatawneh, Wesam Almobaideen, Azzam Sleit, Hex-Cell: Modeling,
Topological Properties and Routing Algorithm, European Journal of Scientific Research, 22:2(2008),
457-468.
[11] Mohammad Qatawneh, Hamed Bdour, Shrouq Sabah, Rana Samhan, Azzam sliet, Ja'far Alqatawna,
Wesam al-Mobaideen. An alternative Routing Algorithm for Hex-Cell network. Information: An
International. Information: an international interdisciplinary journal. 14(10). Pp.3499-3514. 2011.
[12] Mohammad Qatawneh, Embedding Binary Tree and Bus into Hex-Cell Interconnection Network.
Journal of American Science, 2011; 7(12).
[13] Mohammad Qatawneh, Bdour Hamed, Wesam AlMobaideen, Azzam Sleit, Amal Oudat, Wala’a
Qutechat, Roba Al-Soub, FTRH: Fault-Tolerance Routing Algorithm for Hex-Cell Network. IJCSNS
International Journal of Computer Science and Network Security, VOL.9 No.12, December 2009.
[14] Mohammad Qatawneh, Multilayer Hex-Cells: A New Class of Hex-Cell Interconnection Networks
for Massively parallel Systems. Int. J. Communications, Network and System Sciences, 4(11) 2011.

More Related Content

What's hot

IMPROVED EXTENDED XY ON-CHIP ROUTING IN DIAMETRICAL 2D MESH NOC
IMPROVED EXTENDED XY ON-CHIP ROUTING IN DIAMETRICAL 2D MESH NOCIMPROVED EXTENDED XY ON-CHIP ROUTING IN DIAMETRICAL 2D MESH NOC
IMPROVED EXTENDED XY ON-CHIP ROUTING IN DIAMETRICAL 2D MESH NOCVLSICS Design
 
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCE
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCEA NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCE
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCEcscpconf
 
Optimizing IP Networks for Uncertain Demands Using Outbound Traffic Constraints
Optimizing IP Networks for Uncertain Demands Using Outbound Traffic ConstraintsOptimizing IP Networks for Uncertain Demands Using Outbound Traffic Constraints
Optimizing IP Networks for Uncertain Demands Using Outbound Traffic ConstraintsEM Legacy
 
IRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing AlgorithmsIRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing AlgorithmsIRJET Journal
 
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...acijjournal
 
Energy Consumption Reduction in Wireless Sensor Network Based on Clustering
Energy Consumption Reduction in Wireless Sensor Network Based on ClusteringEnergy Consumption Reduction in Wireless Sensor Network Based on Clustering
Energy Consumption Reduction in Wireless Sensor Network Based on ClusteringIJCNCJournal
 
A new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsA new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsTELKOMNIKA JOURNAL
 
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...ijwmn
 
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM ijwmn
 
AREA-EFFICIENT DESIGN OF SCHEDULER FOR ROUTING NODE OF NETWORK-ON-CHIP
AREA-EFFICIENT DESIGN OF SCHEDULER FOR ROUTING NODE OF NETWORK-ON-CHIPAREA-EFFICIENT DESIGN OF SCHEDULER FOR ROUTING NODE OF NETWORK-ON-CHIP
AREA-EFFICIENT DESIGN OF SCHEDULER FOR ROUTING NODE OF NETWORK-ON-CHIPVLSICS Design
 
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...ijdpsjournal
 
Optimal scheduling algorithm for throughput maximization in multihop wireless...
Optimal scheduling algorithm for throughput maximization in multihop wireless...Optimal scheduling algorithm for throughput maximization in multihop wireless...
Optimal scheduling algorithm for throughput maximization in multihop wireless...eSAT Publishing House
 
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...CSCJournals
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
 
Fuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingFuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
 

What's hot (17)

IMPROVED EXTENDED XY ON-CHIP ROUTING IN DIAMETRICAL 2D MESH NOC
IMPROVED EXTENDED XY ON-CHIP ROUTING IN DIAMETRICAL 2D MESH NOCIMPROVED EXTENDED XY ON-CHIP ROUTING IN DIAMETRICAL 2D MESH NOC
IMPROVED EXTENDED XY ON-CHIP ROUTING IN DIAMETRICAL 2D MESH NOC
 
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCE
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCEA NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCE
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCE
 
Hb3512341239
Hb3512341239Hb3512341239
Hb3512341239
 
Optimizing IP Networks for Uncertain Demands Using Outbound Traffic Constraints
Optimizing IP Networks for Uncertain Demands Using Outbound Traffic ConstraintsOptimizing IP Networks for Uncertain Demands Using Outbound Traffic Constraints
Optimizing IP Networks for Uncertain Demands Using Outbound Traffic Constraints
 
IRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing AlgorithmsIRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing Algorithms
 
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
 
Energy Consumption Reduction in Wireless Sensor Network Based on Clustering
Energy Consumption Reduction in Wireless Sensor Network Based on ClusteringEnergy Consumption Reduction in Wireless Sensor Network Based on Clustering
Energy Consumption Reduction in Wireless Sensor Network Based on Clustering
 
A new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsA new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocols
 
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
 
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
 
AREA-EFFICIENT DESIGN OF SCHEDULER FOR ROUTING NODE OF NETWORK-ON-CHIP
AREA-EFFICIENT DESIGN OF SCHEDULER FOR ROUTING NODE OF NETWORK-ON-CHIPAREA-EFFICIENT DESIGN OF SCHEDULER FOR ROUTING NODE OF NETWORK-ON-CHIP
AREA-EFFICIENT DESIGN OF SCHEDULER FOR ROUTING NODE OF NETWORK-ON-CHIP
 
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...
 
Optimal scheduling algorithm for throughput maximization in multihop wireless...
Optimal scheduling algorithm for throughput maximization in multihop wireless...Optimal scheduling algorithm for throughput maximization in multihop wireless...
Optimal scheduling algorithm for throughput maximization in multihop wireless...
 
A046020112
A046020112A046020112
A046020112
 
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
 
Fuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingFuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network Routing
 

Viewers also liked

How to find foreclosures in nj
How to find foreclosures in njHow to find foreclosures in nj
How to find foreclosures in njRobert Orfino
 
A Content-First Marketing Roadmap
A Content-First Marketing RoadmapA Content-First Marketing Roadmap
A Content-First Marketing RoadmapDane Sanders
 
classes & objects in cpp overview
classes & objects in cpp overviewclasses & objects in cpp overview
classes & objects in cpp overviewgourav kottawar
 
11 relación-de-docentes-de-la-unsch-registrado-en-el-dina
11 relación-de-docentes-de-la-unsch-registrado-en-el-dina11 relación-de-docentes-de-la-unsch-registrado-en-el-dina
11 relación-de-docentes-de-la-unsch-registrado-en-el-dinaRosmery Morales Montes
 
Colorado Solar Thermal Roadmap
Colorado Solar Thermal RoadmapColorado Solar Thermal Roadmap
Colorado Solar Thermal RoadmapLeslie Martel Baer
 
Behavioral Marketing Strategy
Behavioral Marketing StrategyBehavioral Marketing Strategy
Behavioral Marketing StrategyGoodbuzz Inc.
 
Prima dragoste
Prima dragostePrima dragoste
Prima dragosteantarisz
 
Funding, equity, valuations by Jordan Schlipf
Funding, equity, valuations by Jordan SchlipfFunding, equity, valuations by Jordan Schlipf
Funding, equity, valuations by Jordan SchlipfStartupbootcamp
 
Analytics to Address the Increasingly Complex Global Agricultural Market
Analytics to Address the Increasingly Complex Global Agricultural MarketAnalytics to Address the Increasingly Complex Global Agricultural Market
Analytics to Address the Increasingly Complex Global Agricultural MarketCTRM Center
 

Viewers also liked (12)

How to find foreclosures in nj
How to find foreclosures in njHow to find foreclosures in nj
How to find foreclosures in nj
 
A Content-First Marketing Roadmap
A Content-First Marketing RoadmapA Content-First Marketing Roadmap
A Content-First Marketing Roadmap
 
Gyngestolen.dk
Gyngestolen.dkGyngestolen.dk
Gyngestolen.dk
 
classes & objects in cpp overview
classes & objects in cpp overviewclasses & objects in cpp overview
classes & objects in cpp overview
 
11 relación-de-docentes-de-la-unsch-registrado-en-el-dina
11 relación-de-docentes-de-la-unsch-registrado-en-el-dina11 relación-de-docentes-de-la-unsch-registrado-en-el-dina
11 relación-de-docentes-de-la-unsch-registrado-en-el-dina
 
Colorado Solar Thermal Roadmap
Colorado Solar Thermal RoadmapColorado Solar Thermal Roadmap
Colorado Solar Thermal Roadmap
 
Soal uas tahun 2014 siap
Soal uas tahun 2014 siapSoal uas tahun 2014 siap
Soal uas tahun 2014 siap
 
Behavioral Marketing Strategy
Behavioral Marketing StrategyBehavioral Marketing Strategy
Behavioral Marketing Strategy
 
Prima dragoste
Prima dragostePrima dragoste
Prima dragoste
 
SAK:n luottamusmieskysely 2007
SAK:n luottamusmieskysely 2007SAK:n luottamusmieskysely 2007
SAK:n luottamusmieskysely 2007
 
Funding, equity, valuations by Jordan Schlipf
Funding, equity, valuations by Jordan SchlipfFunding, equity, valuations by Jordan Schlipf
Funding, equity, valuations by Jordan Schlipf
 
Analytics to Address the Increasingly Complex Global Agricultural Market
Analytics to Address the Increasingly Complex Global Agricultural MarketAnalytics to Address the Increasingly Complex Global Agricultural Market
Analytics to Address the Increasingly Complex Global Agricultural Market
 

Similar to Section based hex cell routing algorithm (sbhcr)

Embedding bus and ring into hex cell
Embedding bus and ring into hex cellEmbedding bus and ring into hex cell
Embedding bus and ring into hex cellIJCNCJournal
 
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETS
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETSHAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETS
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETScscpconf
 
Performance evaluation of various routing techniques in wireless multimedia
Performance evaluation of various routing techniques in wireless multimediaPerformance evaluation of various routing techniques in wireless multimedia
Performance evaluation of various routing techniques in wireless multimediaIAEME Publication
 
Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
Performance Comparison and Analysis of Mobile Ad Hoc Routing ProtocolsPerformance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
Performance Comparison and Analysis of Mobile Ad Hoc Routing ProtocolsCSEIJJournal
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
 
A Survey on Routing Protocols in Wireless Sensor Network Using Mobile Sink
A Survey on Routing Protocols in Wireless Sensor Network Using Mobile SinkA Survey on Routing Protocols in Wireless Sensor Network Using Mobile Sink
A Survey on Routing Protocols in Wireless Sensor Network Using Mobile SinkIJEEE
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topologyIAEME Publication
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topologyprjpublications
 
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...IJCSEA Journal
 
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...IDES Editor
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
De31486489
De31486489De31486489
De31486489IJMER
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 

Similar to Section based hex cell routing algorithm (sbhcr) (20)

Embedding bus and ring into hex cell
Embedding bus and ring into hex cellEmbedding bus and ring into hex cell
Embedding bus and ring into hex cell
 
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETS
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETSHAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETS
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETS
 
Performance evaluation of various routing techniques in wireless multimedia
Performance evaluation of various routing techniques in wireless multimediaPerformance evaluation of various routing techniques in wireless multimedia
Performance evaluation of various routing techniques in wireless multimedia
 
Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
Performance Comparison and Analysis of Mobile Ad Hoc Routing ProtocolsPerformance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
 
A Survey on Routing Protocols in Wireless Sensor Network Using Mobile Sink
A Survey on Routing Protocols in Wireless Sensor Network Using Mobile SinkA Survey on Routing Protocols in Wireless Sensor Network Using Mobile Sink
A Survey on Routing Protocols in Wireless Sensor Network Using Mobile Sink
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topology
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topology
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...
 
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
De31486489
De31486489De31486489
De31486489
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 

More from IJCNCJournal

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 

More from IJCNCJournal (20)

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Section based hex cell routing algorithm (sbhcr)

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 DOI : 10.5121/ijcnc.2015.7112 167 SECTION BASED HEX-CELL ROUTING ALGORITHM (SBHCR) Mohammad Qatawneh, Ahmad Alamoush and Ja'far Alqatawna King Abdullah II School for Information Technology, The University of Jordan, Amman, Jordan ABSTRACT A Hex-Cell network topology can be constructed using units of hexagon cells. It has been introduced in the literature as interconnection network suitable for large parallel computers, which can connect large number of nodes with three links per node. Although this topology exhibits attractive characteristics such as embeddability, symmetry, regularity, strong resilience, and simple routing, the previously suggested routing algorithms suffer from the high number of logical operations and the need for readdressing of nodes every time a new level is add to the network. This negatively impacts the performance of the network as it increases the execution time of these algorithms. In this paper we propose an improved optimal point to point routing algorithm for Hex-Cell network. The algorithm is based on dividing the Hex-Cell topology into six divisions, hence the name Section Based Hex-Cell Routing (SBHCR). The SBHCR algorithm is simple and preserves the advantage of the addressing scheme proposed for the Hex-Cell network. It does not depend on the depth of the network topology which leads to overcome the issue of readdressing of nodes every time a new level is added. Evaluation against two previously suggested routing algorithms has shown the superiority of SBHCR in term of less logical operations. KEYWORDS Hex-Cell topology, Routing Algorithm, Interconnection Topology, Networking. 1.INTRODUCTION Routing algorithms is a popular topic in the study of computer networks, distributed systems and their applications [1,2]. The design of routing algorithm plays an important role in determining the performance of tightly and loosely coupled systems. The efficiency of many applications that run on tightly and loosely coupled systems depends highly on communication time which is affected by characteristics of routing algorithm. Routing algorithm should prove correctness, simplicity, robustness, stability, fairness and optimality [3,4,5,6]. Several static interconnection networks and their related routing algorithms have been reported in the literature [6,7,8,9,10]. Hex-Cell network is a class of interconnection networks which has proposed for parallel computing systems [10,11,12,13,14]. Its topology can be constructed using units of hexagon cells. Sharieh et al. [10] suggested the original routing algorithm in which the addressing mode was based on the depth of the network and the position of the node in the level. The routing from one node to another can be done using one or more of the following three functions: moveUp, moveDown and moveHorizontal. Qatawneh et al. [11] have criticized the dependency on the depth of Hex-Cell network which mean that the topology must be fixed otherwise the depth value must be updated to readdress the nodes every time a new level is added.
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 168 Therefore, they have proposed an alternative routing algorithm in which the node addressing is based on the address of the three cells around the node while the cell itself is addressed based on Cartesian coordinate (X-axis and Y-axis). Their algorithm assumes the central cell is having (0,0) as coordinate and in order to reach the destination two functions need to be used: Cell Routing and Node Routing. Although Hex-Cell topology exhibits attractive characteristics such as embeddability, symmetry, regularity, strong resilience, and simplicity[10,11,12,13], the previously suggested routing algorithms[10,11] suffer from the high number of logical operations and the need for readdressing network nodes every time a new level is added which negatively impact the running time of that network. Therefore, the aim of this paper is to propose a new routing algorithm for Hex-Cell network that eliminate these shortcomings. The rest of the paper is organized as follows. Section 2 provides an overview of Hex-Cell network. Section 3 presents the proposed routing algorithm. Section 4 compares the algorithm to its predecessor. Finally conclusion is presented in section 5. 2. HEX–CELL NETWORK TOPOLOGY A Hex-Cell network [9] with depth d is denoted by HC (d) and can be constructed by using units of hexagon cells, each of six nodes. A Hex-Cell network with depth d has d levels numbered from 1 to d, where, level 1 represents the innermost level corresponding to one hexagon cell. Level 2 corresponds to the six hexagon cells surrounding the hexagon at level 1. Level 3 corresponds to the 12 hexagon cells surrounding the six hexagons at level 2 as shown in figure 1. The levels of the HC (d) network are labeled from 1 to d. Each level i has Ni nodes, representing processing elements and interconnected in a ring structure [10, 11]. Figure 1. (a) Hex-Cell with 1 level, 2 levels and 3 levels [10] 3.SBHCR ALGORITHM The routing algorithm which is proposed in [10] depends on the depth of Hex-Cell network which means that the topology must be fixed or there is a need for updating the depth value and readdressing which in turns increase the setup time [11]. The number of logical operations may increase as the depth of Hex-Cell increases which leads to more time in calculating the routing algorithm to forward the message from one node to another. The SBHCR algorithm eliminates the above disadvantages by proposing simple and flexible addressing mode. In order to explain the SBHCR, we propose new addressing scheme for Hex-Cell topology which is based on the following key assumptions: 1- The Hex-Cell topology is divided into six sections labeled from left to right (clockwise) and numbered from 1 to 6, as shown in figure 2.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 169 2- The address of each node in the Hex-Cell topology is identified by (S,L,X) where S denotes the section number, L denotes the level number, and X denotes the node number on that level labeled from X1,…, Xn; where n = ((2×L) - 1). Figure 2. Hex-Cell addressing scheme for HC (3) network A node with the address 1.1.1 is the first node that exists at the section number 1 and level number 1. A node 1.2.1 refers to first node that exists at the section number 1 and level number 2 and so on. In SBHCR algorithm for HC as shown in Figure 3, the movement from one node to another can be done using one of the following five cases as shown in figure 3 (a). Figure 3.(a) The main function for the SBHCR algorithm As an input to this routing algorithm the address of the source node (which is the first node address) and the address of the destination node (Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest) is used to get the output which is the address of the second node and the address of the destination node (Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest). Then the second node apply the routing algorithm using the address of the source node (which is the second node address in this case) and the address of the destination node (Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest) to get the address of the third node
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 170 and the address of the destination node (Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest). We continue this way until we reach the source address equal the destination address. moveToUpperLevelC1(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest) Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest) { If (Lsrc is odd)  return (Ssrc, Lsrc + 1, Xsrc + 1, Sdest, Ldest, Xdest) Else If (Xsrc < Xdest)  return (Ssrc, Lsrc, Xsrc + 1, Sdest, Ldest, Xdest) Else  return (Ssrc, Lsrc, Xsrc - 1, Sdest, Ldest, Xdest) } --------------------------------------------------------------------------------------------------------------------- moveToLowerLevelC1(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest) Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest){ If (Lsrc is even)  return (Ssrc, Lsrc - 1, Xsrc - 1, Sdest, Ldest, Xdest) Else If (Xsrc ≤ Xdest)  return (Ssrc, Lsrc, Xsrc + 1, Sdest, Ldest, Xdest) Else  return (Ssrc, Lsrc, Xsrc - 1, Sdest, Ldest, Xdest) } --------------------------------------------------------------------------------------------------------------------- moveToLowerLevelC2(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest) Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest){ If (Xsrc is even)  return (Ssrc, Lsrc - 1, Xsrc - 1, Sdest, Ldest, Xdest) Else If (Xsrc + 1 > ((2 × Lsrc) – 1)) If (Ssrc = 6)  return(1, Lsrc, 1, Sdest, Ldest, Xdest) Else  return (Ssrc + 1, Lsrc, 1, Sdest, Ldest, Xdest) Else  return (Ssrc, Lsrc, Xsrc + 1, Sdest, Ldest, Xdest)} --------------------------------------------------------------------------------------------------------------------- moveToLowerLevelC3(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest) Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest){ If (Xsrc is even)  return(Ssrc, Lsrc - 1, Xsrc - 1, Sdest, Ldest, Xdest) Else If (Xsrc + 1 > ((2 × Lsrc) – 1)) If (Ssrc = 6)  return(1, Lsrc, 1, Sdest, Ldest, Xdest) Else  return (Ssrc + 1, Lsrc, 1, Sdest, Ldest, Xdest) Else  return (Ssrc, Lsrc, Xsrc + 1, Sdest, Ldest, Xdest)} --------------------------------------------------------------------------------------------------------------------- moveToLowerLevelC4(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest) Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest){ If (Xsrc is even)  return(Ssrc, Lsrc - 1, Xsrc - 1, Sdest, Ldest, Xdest) Else If (Xsrc - 1 < 1) If (Ssrc = 1)  return (6, Lsrc, ((2 × Lsrc) – 1), Sdest, Ldest, Xdest) Else  return (Ssrc - 1, Lsrc, ((2 × Lsrc ) – 1), Sdest, Ldest, Xdest) Else  return (Ssrc, Lsrc, Xsrc - 1, Sdest, Ldest, Xdest) } --------------------------------------------------------------------------------------------------------------------- moveToLowerLevelC5(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest) Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest){ If (Xsrc is even)  return(Ssrc, Lsrc - 1, Xsrc - 1, Sdest, Ldest, Xdest) Else If (Xsrc - 1 < 1) If (Ssrc = 1)  return (6, Lsrc, ((2 × Lsrc) – 1), Sdest, Ldest, Xdest) Else  return (Ssrc - 1, Lsrc, ((2 × Lsrc ) – 1), Sdest, Ldest, Xdest) Else  return (Ssrc, Lsrc, Xsrc - 1, Sdest, Ldest, Xdest) } --------------------------------------------------------------------------------------------------------------------- moveSameLevelC1(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest) Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest){ If (Xsrc < Xdest)  return (Ssrc, Lsrc, Xsrc + 1, Sdest, Ldest, Xdest) Else  return (Ssrc, Lsrc, Xsrc - 1, Sdest, Ldest, Xdest)} --------------------------------------------------------------------------------------------------------------------- moveSameLevelC2(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest) Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest){ If (Xsrc + 1 > ((2 × Lsrc) – 1)) If (Ssrc = 6)  return(1, Lsrc, 1, Sdest, Ldest, Xdest) Else  return (Ssrc + 1, Lsrc, 1, Sdest, Ldest, Xdest) Else  return (Ssrc, Lsrc, Xsrc + 1, Sdest, Ldest, Xdest)} --------------------------------------------------------------------------------------------------------------------- moveSameLevelC5(Ssrc, Lsrc, Xsrc, Sdest, Ldest, Xdest) Output(Snxt, Lnxt, Xnxt, Sdest, Ldest, Xdest){ If (Xsrc - 1 < 1) If (Ssrc = 1)  return (6, Lsrc, ((2 × Lsrc) – 1), Sdest, Ldest, Xdest) Else  return (Ssrc - 1, Lsrc, ((2 × Lsrc ) – 1), Sdest, Ldest, Xdest) Else  return (Ssrc, Lsrc, Xsrc - 1, Sdest, Ldest, Xdest)} Figure 3.(b) The sub-functions the SBHCR algorithm
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 171 4.SCENARIO BASED DISCUSSION The following examples explain the above routing cases. For this purposed, we consider a network of a Hex-cell topology with 4 levels; i.e. HC (4) as shown in Figure 4. Figure 4. HC (4) topology with labeled nodes and levels Scenario 1: The source and destination in the same section and level Let (Ss.Ls.Xs) = (2.4.2) be the source node and (Sd.Ld.Xd) = (2.4.7) be the destination node. When executing the routing algorithm, CASE 1 will be applied. To reach the destination, the algorithm goes through five steps; i.e., (2.4.2) → (2.4.3) → (2.4.4) → (2.4.5) → (2.4.6) → (2.4.7) , as shown in Figure (5). Figure 5. The source and destination in the same section and level Scenario 2: source and destination are in the same section and different levels (destination level less than source level)
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 172 Let (Ss.Ls.Xs) = (5.4.5) be the source node and (Sd.Ld.Xd) = (5.2.1) be the destination node. When executing the routing algorithm, CASE 1 will be applied. To reach the destination, the algorithm goes through four steps; i.e., (5.4.5) → (5.4.4) → (5.3.3) → (5.3.2) → (5.2.1), as shown in Figure (6). Figure 6: source and destination are in the same section and different levels (destination level less than source level). Scenario 3: source and destination are in the same section and different levels (source level less than destination level) Let (Ss.Ls.Xs) = (5.3.2) be the source node and (Sd.Ld.Xd) = (5.4.7) be the destination node. When executing the routing algorithm, CASE 1 will be applied. To reach the destination, the algorithm goes through five steps; i.e., (5.3.2) → (5.3.3) → (5.4.4) → (5.4.5) → (5.4.6) → (5.4.7), as shown in Figure (7). figure 7. Source and destination are in the same section and different levels (source level less than destination level) Scenario 4: source and destination are in different sections (Ss = Sd - 1 or Ss = Sd + 5) (source level less than or equal destination level)
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 173 Let (Ss.Ls.Xs) = (1.3.2) be the source node and (Sd.Ld.Xd) = (2.4.1) be the destination node. When executing the routing algorithm, CASE 2 will be applied. To reach the destination, the algorithm goes through six steps; i.e., (1.3.2) → (1.3.3) → (1.3.4) → (1.3.5) → (2.3.1) → (2.4.2) → (2.4.1), as shown in Figure (8). Figure 8. Source and destination are in different sections (Ss = Sd - 1 or Ss = Sd + 5) (source level less than or equal destination level). Scenario 5: source and destination are in different sections (Ss = Sd - 1 or Ss = Sd + 5) (destination level less than source level) Let (Ss.Ls.Xs) = (1.4.4) be the source node and (Sd.Ld.Xd) = (2.2.3) be the destination node. When executing the routing algorithm, CASE 2 will be applied. To reach the destination, the algorithm goes through six steps; i.e., (1.4.4) → (1.3.3) → (1.3.4) → (1.2.3) → (2.2.1) → (2.2.2) → (2.2.3), as shown in Figure (9). Figure 9. Source and destination are in different sections (Ss = Sd - 1 or Ss = Sd + 5) (destination level less than source level) Scenario 6: source and destination are in different sections (Ss = Sd – 2 or Ss = Sd + 4) Let (Ss.Ls.Xs) = (4.3.2) be the source node and (Sd.Ld.Xd) = (6.3.3) be the destination node. When executing the routing algorithm, CASE 3 will be applied. To reach the destination, the
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 174 algorithm goes through nine steps; i.e., (4.3.2) → (4.2.1) → (4.2.2) → (4.1.1) → (5.1.1) → (6.1.1) → (6.2.2) → (6.2.3) → (6.3.4) → (6.3.3), as shown in Figure (10). Figure 10. Source and destination are in the different sections (Ss = Sd - 2 or Ss = Sd + 4) Scenario 7: source and destination are in different sections (Ss = Sd - 3 or Ss = Sd + 3 or Ss = Sd - 4 or Ss = Sd + 2 ) Let (Ss.Ls.Xs) = (6.3.3) be the source node and (Sd.Ld.Xd) = (3.3.3) be the destination node. When executing the routing algorithm, CASE 4 will be applied. To reach the destination, the algorithm goes through eleven steps; i.e., (6.3.3) → (6.3.4) → (6.2.3) → (1.2.1) → (1.2.2) → (1.1.1) → (2.1.1) → (3.1.1) → (3.2.2) → (3.2.3) → (3.3.4) → (3.3.3), as shown in Figure(11). Figure 11. Source and destination are in different sections (Ss = Sd - 3 or Ss = Sd + 3 or Ss = Sd - 4 or Ss = Sd + 2 ) Scenario 8: source and destination are in the different sections (Ss = Sd - 5 or Ss = Sd + 1) (source level less than or equal destination level). Let (Ss.Ls.Xs) = (5.2.3) be the source node and (Sd.Ld.Xd) = (4.4.2) be the destination node. When executing the routing algorithm, CASE 5 will be applied. To reach the destination, the algorithm goes through eight steps; i.e., (5.2.3) → (5.2.2) → (5.2.1) → (4.2.3) → (4.3.4) → (4.3.3) → (4.4.4) → (4.4.3) → (4.4.2), as shown in Figure (12).
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 175 Figure 12. Source and destination are in the different sections (Ss = Sd - 5 or Ss = Sd + 1) (source level less than or equal destination level). Scenario 9: source and destination are in different sections (Ss = Sd - 5 or Ss = Sd + 1) (destination level less than source level) Let (Ss.Ls.Xs) = (5.4.4) be the source node and (Sd.Ld.Xd) = (4.2.2) be the destination node. When executing the routing algorithm, CASE 5 will be applied. To reach the destination, the algorithm goes through five steps; i.e., (5.4.4) → (5.3.3) → (5.3.2) → (5.2.1) → (4.2.3) → (4.2.2), as shown in Figure (13). Figure 13. source and destination are in different sections (Ss = Sd - 5 or Ss = Sd + 1) (destination level less than source level) 5.COMPARISON BETWEEN SBHCR AND OTHERS ALGORITHMS The original Hex-Cell routing [10] uses a centralized algorithm to find the best path from the source to the destination. This means that one node do the job, and it is same in the alternative algorithm proposed in [11]. In the contrary, in the SBHCR each node finds the best next node in order to get to the final destination. Thus, the total number of required operation to perform
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 176 logical comparison is divided on the nodes, which would give better performance when compared with a single node performing the same logical operation. Table 1. Comparison between SBHCR and others algorithms. For instance, the number of steps and logical comparison between two same nodes: 1) Original routing algorithm [10]: a) From node (4.8) to (5.8) it takes 3 Steps and need 13 Logical Operations b) From node (3.7) to (6.7) it takes 5 Steps and need 21 Logical Operations 2) Alternative Routing Algorithm [11]: a) From node ((1,-1),(0,0),(1,1)) to ((-1,-1),(0,0),(-1,1)) it takes 3 Steps and need 25 Logical Operations b) From node ((1,-1),(2,0),(1,1)) to ((-1,-1),(-2,0),(-1,1))it takes 5 Steps and need 85 Logical Operations 3) SBHCR Algorithm a) From node (2.1.1) to (5.1.1) it takes 3 Steps and need 22 Logical Operations b) From node (2.2.2) to (5.2.2) it takes 5 Steps and need 32 Logical Operations. 6.CONCLUSION In this paper we propose a new routing algorithm for Hex-Cell network that eliminates the weaknesses of the previously suggested algorithms. The algorithm is based on dividing the Hex- Cell topology into six divisions and called Section Based Hex-Cell Routing (SBHCR). The SBHCR algorithm is simple and preserves the advantage of the addressing scheme proposed for the Hex-Cell network. The SBHCR does not depend on the depth like the current addressing which means that the network can be extended without reconfiguration the whole network. Moreover, in this algorithm the task of finding the best routing path is performed by more than one node which implies better performance. Proposed Routing Algorithm Routing Algorithm in [11]Original Routing Algorithm [10]First Cell Level 333Number of Steps 232513Number of Logical Operations sum, sub and mod sum and subsum, sub and modArithmetic operation Second Cell Level 555Number of Steps 328521Number of Logical Operations sum, sub and mod sum and subsum, sub and modArithmetic operation
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 177 REFERENCES [1] A [2] Chatterjee, Pushpita. "Trust based - [3] Decayeux, Catherine, and David Seme. "3D hexagonal network: Modeling, topological properties, addressing scheme, and optimal routing algorithm." Parallel and Distributed Systems, IEEE Transactions on 16.9 (2005): 875-884. [4] Tse-Yun Feng; Seung-Woo Seo, "A new routing algorithm for a class of rearrangeable networks," Computers, IEEE Transactions on , vol.43, no.11, pp.1270,1280, Nov 1994 doi: 10.1109/12.324560. [5 ]Chen, Chi-Chang, and Jianer Chen. "Nearly optimal one-to-many parallel routing in star networks." Parallel and Distributed Systems, IEEE Transactions on 8.12 (1997): 1196-1202. [6] Mohammad, Qatawneh. "Adaptive fault tolerant routing algorithm for Tree-Hypercube multicomputer." Journal of Computer Science 2, no. 2 (2006): 124. [7] Li, Keqin. "Parallel processing of divisible loads on partitionable static interconnection networks." Cluster Computing 6, no. 1 (2003): 47-55. [8] Dündar, Pinar. "Stability measures of some static interconnection networks." International journal of computer mathematics 76, no. 4 (2001): 455-462. [9] Abd-El-Barr, Mostafa, and Fayez Gebali. "Reliability analysis and fault tolerance for hypercube multi-computer networks." Information Sciences 276 (2014): 295-318. [10] Ahmad Sharieh, Mohammad Qatawneh, Wesam Almobaideen, Azzam Sleit, Hex-Cell: Modeling, Topological Properties and Routing Algorithm, European Journal of Scientific Research, 22:2(2008), 457-468. [11] Mohammad Qatawneh, Hamed Bdour, Shrouq Sabah, Rana Samhan, Azzam sliet, Ja'far Alqatawna, Wesam al-Mobaideen. An alternative Routing Algorithm for Hex-Cell network. Information: An International. Information: an international interdisciplinary journal. 14(10). Pp.3499-3514. 2011. [12] Mohammad Qatawneh, Embedding Binary Tree and Bus into Hex-Cell Interconnection Network. Journal of American Science, 2011; 7(12). [13] Mohammad Qatawneh, Bdour Hamed, Wesam AlMobaideen, Azzam Sleit, Amal Oudat, Wala’a Qutechat, Roba Al-Soub, FTRH: Fault-Tolerance Routing Algorithm for Hex-Cell Network. IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.12, December 2009. [14] Mohammad Qatawneh, Multilayer Hex-Cells: A New Class of Hex-Cell Interconnection Networks for Massively parallel Systems. Int. J. Communications, Network and System Sciences, 4(11) 2011.