Study of E-mail Data Services based on Delay Tolerant Network in The Riau Province Border Region


  • Oktaf B. Kharisma
  • Folkes E. Laumal
  • Triawan A. Cahyanto
  • Dwi Ermayanti Susilo
  • Petrisia W. Sudarmadji
  • . .



Delay Tolerant Network, bundle, e-bundle, flooding..


Indonesia is an archipelagic country that is geographically unique, where most of the land has uneven land contours because it consists of mountains and valleys. This condition is one of the causes of the inequality of information dissemination even though the ICT infrastructure has supported and internet services are also available. Topographical factors and inequality of information dissemination pose digital deviations in the community, especially border areas in Riau Province which have not been able to enjoy internet services in some of the regions. Even though the process of data transmission to other regions is needed by both government agencies placed in border areas and the general public who need internet services for data transmission (text, audio, and video). Delay Tolerant Network (DTN) technology is a network protocol that allows communication networks to be applied in extreme environments that have long delay characteristics, high loss rates, and low connectivity levels. With DTN, internet services can be implemented and presented cheaply using only DTN Router which will move to areas that are not reachable by the internet and collect email data digitally. Furthermore, DTN Router and processes every transmission request from/to the border regions with extreme topography. By using the Flooding method applied to the DTN protocol, testing of e-mail data packet transmission from simulations at several locations in Riau is considered to have high data loss. Testing modeled by several computers with DTN, doing a bundle of data packages, transmitting to destinations and assessing the efficiency of their success. The test results show that the data transmission process in extreme areas using DTN protocol, Indicates that the larger the size of the file sent. So, the greater the time needed for data transmission. Approximate of time is needed of transmission data of the 95MB file that is 4,1 second..





[1] F. E. Laumal, E. P. Hattu, and K. B. N. Nope, “Jurnal Rekayasa Elektrika.,†J. Rekayasa Elektr., vol. 13, no. 1, pp. 48–56, 2017.

[2] F. E. Laumal, K. B. N. Nope, and Y. S. Peli, “Earthquake Early Warning Management based on Client-Server using Primary Wave data from Vibrating Sensor,†J. Phys. Conf. Ser., vol. 953, no. 1, p. 12029, 2018.

[3] A. C. M. Jerejian, C. Reid, and C. S. Rees, “The contribution of email volume, email management strategies and propensity to worry in predicting email stress among academics,†Comput. Human Behav., vol. 29, no. 3, pp. 991–996, 2013.

[4] W. Alge, “Email in the cloud: the challenges and benefits,†Comput. Fraud Secur., vol. 2012, no. 7, pp. 10–12, 2012.

[5] S. Uddin, K. Thompson, B. Schwendimann, and M. Piraveenan, “The impact of study load on the dynamics of longitudinal email communications among students,†Comput. Educ., vol. 72, pp. 209–219, 2014.

[6] D. Sumecki, M. Chipulu, and U. Ojiako, “Email overload: Exploring the moderating role of the perception of email as a ‘business critical’ tool,†Int. J. Inf. Manage., vol. 31, no. 5, pp. 407–414, 2011.

[7] K. Reinke and T. Chamorro-premuzic, “Computers in Human Behavior When email use gets out of control : Understanding the relationship between personality and email overload and their impact on burnout and work engagement,†Comput. Human Behav., 2014.

[8] F. E. Laumal, “Jurnal Teknik Komputer Unikom – Komputika – Volume 3, No .2 - 2014,†J. Tek. Komput. Unikom – Komputika, vol. 3, no. 2, pp. 23–28, 2014.

[9] S. Kominfo, "Pengguna Internet Di Indonesia 2016," 2016. [Online]. Available: [Accessed: 20-Mar-2017],†2017.

[10] BIRO HUMAS and K. KOMINFO, “SIARAN PERS NO. 53/HM/KOMINFO/02/2018, Jumlah Pengguna Internet 2017 Meningkat, Kominfo Terus Lakukan Percepatan Pembangunan Broadband,†2018.

[11] K. Fall and S. Farrell, “DTN: an architectural retrospective,†IEEE J. Sel. Areas Commun., vol. 26, no. 5, pp. 828–836, Jun. 2008.

[12] M. T. Scholar and R. Ujjaniya, “A Review on Delay Tolerant Network Security Routing Protocol,†vol. 4, no. 3, pp. 580–583, 2018.

[13] E. Husni and A. Wibowo, “E-mail System for Delay Tolerant Network,†no. 10.

[14] S. D. Siswanti, “Pengembangan Sistem Aplikasi Pengiriman Data Daerah Terpencil Berbasis Delay Tolerant Network,†J. GENERIC, vol. 8, no. 2, pp. 221–271, Sep. 2013.

[15] R. Suci, F. Jannatin, A. Suharsono, and A. Bhawiyuga, “Implementasi Publish-Subscribe Pada Delay Tolerant Network ( DTN ),†vol. 1, no. 2, pp. 118–124, 2017.

[16] A. V. Singh, V. Juyal, and R. Saggar, "Trust-based Intelligent Routing Algorithm for Delay Tolerant Network using Artificial Neural Network," Wirel. Networks, vol. 23, no. 3, pp. 693–702, Apr. 2017.

[17] Y. Sobhan Babu and D. Kamesh, “Latency and Routing analysis in Throw box based DTN for challenged networks,†Int. J. Adv. Trends Eng. Sci. Technol., vol. 26, no. 6, pp. 1–5, 2017.

[18] E. M. Husni and A. R. Sumarmo, “Designing a DTN-based Network for Delivering News Portal and Email Services to Remote Villages by Utilizing Train as a DTN Router,†pp. 1–6.

[19] Y. HARRATI and A. ABDALI, “MaxHopCount: DTN congestion control algorithm under MaxProp routing,†Int. J. Comput. Sci. Inf. Secur., vol. 17, no. 5, pp. 206–214, 2017.

[20] H. Wang, L. Song, G. Zhang, and H. Chen, “Timetable-aware opportunistic DTN routing for vehicular communications in battlefield environments,†Futur. Gener. Comput. Syst., vol. 83, pp. 95–103, 2018.

View Full Article:

How to Cite

B. Kharisma, O., E. Laumal, F., A. Cahyanto, T., Ermayanti Susilo, D., W. Sudarmadji, P., & ., . (2018). Study of E-mail Data Services based on Delay Tolerant Network in The Riau Province Border Region. International Journal of Engineering & Technology, 7(4.36), 1435–1440.
Received 2019-04-26
Accepted 2019-04-26