Proceedings of the Second ACM Workshop on Challenged Networks 2007
DOI: 10.1145/1287791.1287811
|View full text |Cite
|
Sign up to set email alerts
|

Opportunistic email distribution and access in challenged heterogeneous environments

Abstract: The communication paradigms for delay-tolerant networking have been modeled after email. Supporting email over DTNs in a backwards compatible manner in a heterogeneous environment has yet to be fully defined. In this paper, we present a set of conventions for and extensions to the DTNRG architecture. We have implemented a system that is able to deliver emails within a DTN network, from a DTN network to the Internet, and from the Internet to the DTN network. Our system architecture includes multiple solutions f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(18 citation statements)
references
References 3 publications
0
18
0
Order By: Relevance
“…It waits for the tested node to perform the anonymisation and for the "friend"/"trusted" node to forward the result of the obfuscation back to it (line 16). After it receives the response it generates a value for the Reputation status of the tested node based on its opinion of the tested node performance, signs it digitally and stores the updated Reputation value onto the tested node (lines [17][18][19][20].…”
Section: Pseudo Code Of Ocot and Mathematical Notationmentioning
confidence: 99%
See 2 more Smart Citations
“…It waits for the tested node to perform the anonymisation and for the "friend"/"trusted" node to forward the result of the obfuscation back to it (line 16). After it receives the response it generates a value for the Reputation status of the tested node based on its opinion of the tested node performance, signs it digitally and stores the updated Reputation value onto the tested node (lines [17][18][19][20].…”
Section: Pseudo Code Of Ocot and Mathematical Notationmentioning
confidence: 99%
“…Underlying networking protocols [20], [14], [17], [33], [10], [16], [19], [30], [28], [27] increasingly provide support for large scale content sharing that utilize both opportunistic networks among mobile devices and connections to cellular network and access points when within their range.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The drawback of this proxybased approach for SMTP protocol is that the proxy has to executes the entire SMTP protocol forwarding the information via the inter-proxy protocol. In [37], the authors describe an architecture to enable mail communication in a heterogeneous environment that combines traditional server-based mail delivery and opportunistic communications for different types of devices. In this architecture, mail messages are sent in bundles into the opportunistic network and carried toward a mail gateway (MWG).…”
Section: Application Layermentioning
confidence: 99%
“…Complementarily to papers addressing the development of communication protocols for disconnected MANETs, a few recent papers also discuss the design of applications capable of exploiting these protocols [12,13,14]. Indeed, the very characteristics of opportunistic, delay-tolerant communication imply that these applications must be able to tolerate asynchronous-and possibly fail-prone-transmissions.…”
Section: Related Workmentioning
confidence: 99%