Study of E-mail Data Services based on Delay Tolerant Network in The Riau Province Border Region
Keywords:Delay Tolerant Network, bundle, e-bundle, flooding..
Indonesia is an archipelagic country that is geographically unique, where most of the land has uneven land contours because it consists of mountains and valleys. This condition is one of the causes of the inequality of information dissemination even though the ICT infrastructure has supported and internet services are also available. Topographical factors and inequality of information dissemination pose digital deviations in the community, especially border areas in Riau Province which have not been able to enjoy internet services in some of the regions. Even though the process of data transmission to other regions is needed by both government agencies placed in border areas and the general public who need internet services for data transmission (text, audio, and video). Delay Tolerant Network (DTN) technology is a network protocol that allows communication networks to be applied in extreme environments that have long delay characteristics, high loss rates, and low connectivity levels. With DTN, internet services can be implemented and presented cheaply using only DTN Router which will move to areas that are not reachable by the internet and collect email data digitally. Furthermore, DTN Router and processes every transmission request from/to the border regions with extreme topography. By using the Flooding method applied to the DTN protocol, testing of e-mail data packet transmission from simulations at several locations in Riau is considered to have high data loss. Testing modeled by several computers with DTN, doing a bundle of data packages, transmitting to destinations and assessing the efficiency of their success. The test results show that the data transmission process in extreme areas using DTN protocol, Indicates that the larger the size of the file sent. So, the greater the time needed for data transmission. Approximate of time is needed of transmission data of the 95MB file that is 4,1 second..
 F. E. Laumal, E. P. Hattu, and K. B. N. Nope, â€œJurnal Rekayasa Elektrika.,â€ J. Rekayasa Elektr., vol. 13, no. 1, pp. 48â€“56, 2017.
 F. E. Laumal, K. B. N. Nope, and Y. S. Peli, â€œEarthquake Early Warning Management based on Client-Server using Primary Wave data from Vibrating Sensor,â€ J. Phys. Conf. Ser., vol. 953, no. 1, p. 12029, 2018.
 A. C. M. Jerejian, C. Reid, and C. S. Rees, â€œThe contribution of email volume, email management strategies and propensity to worry in predicting email stress among academics,â€ Comput. Human Behav., vol. 29, no. 3, pp. 991â€“996, 2013.
 W. Alge, â€œEmail in the cloud: the challenges and benefits,â€ Comput. Fraud Secur., vol. 2012, no. 7, pp. 10â€“12, 2012.
 S. Uddin, K. Thompson, B. Schwendimann, and M. Piraveenan, â€œThe impact of study load on the dynamics of longitudinal email communications among students,â€ Comput. Educ., vol. 72, pp. 209â€“219, 2014.
 D. Sumecki, M. Chipulu, and U. Ojiako, â€œEmail overload: Exploring the moderating role of the perception of email as a â€˜business criticalâ€™ tool,â€ Int. J. Inf. Manage., vol. 31, no. 5, pp. 407â€“414, 2011.
 K. Reinke and T. Chamorro-premuzic, â€œComputers in Human Behavior When email use gets out of control : Understanding the relationship between personality and email overload and their impact on burnout and work engagement,â€ Comput. Human Behav., 2014.
 F. E. Laumal, â€œJurnal Teknik Komputer Unikom â€“ Komputika â€“ Volume 3, No .2 - 2014,â€ J. Tek. Komput. Unikom â€“ Komputika, vol. 3, no. 2, pp. 23â€“28, 2014.
 S. Kominfo, "Pengguna Internet Di Indonesia 2016," 2016. [Online]. Available: http://statistik.kominfo.go.id/site/data?idtree=424&iddoc=1516. [Accessed: 20-Mar-2017],â€ 2017.
 BIRO HUMAS and K. KOMINFO, â€œSIARAN PERS NO. 53/HM/KOMINFO/02/2018, Jumlah Pengguna Internet 2017 Meningkat, Kominfo Terus Lakukan Percepatan Pembangunan Broadband,â€ 2018.
 K. Fall and S. Farrell, â€œDTN: an architectural retrospective,â€ IEEE J. Sel. Areas Commun., vol. 26, no. 5, pp. 828â€“836, Jun. 2008.
 M. T. Scholar and R. Ujjaniya, â€œA Review on Delay Tolerant Network Security Routing Protocol,â€ vol. 4, no. 3, pp. 580â€“583, 2018.
 E. Husni and A. Wibowo, â€œE-mail System for Delay Tolerant Network,â€ no. 10.
 S. D. Siswanti, â€œPengembangan Sistem Aplikasi Pengiriman Data Daerah Terpencil Berbasis Delay Tolerant Network,â€ J. GENERIC, vol. 8, no. 2, pp. 221â€“271, Sep. 2013.
 R. Suci, F. Jannatin, A. Suharsono, and A. Bhawiyuga, â€œImplementasi Publish-Subscribe Pada Delay Tolerant Network ( DTN ),â€ vol. 1, no. 2, pp. 118â€“124, 2017.
 A. V. Singh, V. Juyal, and R. Saggar, "Trust-based Intelligent Routing Algorithm for Delay Tolerant Network using Artificial Neural Network," Wirel. Networks, vol. 23, no. 3, pp. 693â€“702, Apr. 2017.
 Y. Sobhan Babu and D. Kamesh, â€œLatency and Routing analysis in Throw box based DTN for challenged networks,â€ Int. J. Adv. Trends Eng. Sci. Technol., vol. 26, no. 6, pp. 1â€“5, 2017.
 E. M. Husni and A. R. Sumarmo, â€œDesigning a DTN-based Network for Delivering News Portal and Email Services to Remote Villages by Utilizing Train as a DTN Router,â€ pp. 1â€“6.
 Y. HARRATI and A. ABDALI, â€œMaxHopCount: DTN congestion control algorithm under MaxProp routing,â€ Int. J. Comput. Sci. Inf. Secur., vol. 17, no. 5, pp. 206â€“214, 2017.
 H. Wang, L. Song, G. Zhang, and H. Chen, â€œTimetable-aware opportunistic DTN routing for vehicular communications in battlefield environments,â€ Futur. Gener. Comput. Syst., vol. 83, pp. 95â€“103, 2018.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).