Paper
22 July 2003 Mobile web caching in a hostile environment
Gail Ann Kalbfleisch, Sridevi Movva, Terry Wayne Griffin, Nelson Luiz Passos
Author Affiliations +
Abstract
In the wired Internet, it is common practice to use Web caching to reduce network utilization and improve access time to a Web page. Mobile users introduce new variables in the communication process due to the fact that a user may dynamically change its contact point within the network, accessing the Web server through a different path, which may not have access to cached pages. In hostile environments such as domestic catastrophic emergencies, field units must have a higher priority to significant information available through Web servers, requiring lower response times and reliable access via Internet enabled cell phones. In foreign lands, specific infrastructure must be implemented and activated, which requires extensive work currently being researched by defense contractors. In domestic situations, the infrastructure exists and must be equipped to provide the necessary priority to civil defense personnel. This study discusses mechanisms used in Web caching and suggests features that should be added to current cache management algorithms to provide the necessary priority, including the use of standard protocol commands to identify cacheable information and establishment of priority and aging policies to control the length of time data should be maintained in the cache.
© (2003) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Gail Ann Kalbfleisch, Sridevi Movva, Terry Wayne Griffin, and Nelson Luiz Passos "Mobile web caching in a hostile environment", Proc. SPIE 5101, Battlespace Digitization and Network-Centric Systems III, (22 July 2003); https://doi.org/10.1117/12.486076
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Internet

Computer simulations

Cell phones

Defense and security

Detection and tracking algorithms

Mobile communications

Telecommunications

RELATED CONTENT

The world of the Bluetooth
Proceedings of SPIE (March 07 2022)
Mobile gateway techniques
Proceedings of SPIE (August 29 2001)
MIPv6 seamless handover with light home agent
Proceedings of SPIE (March 29 2004)
Mobile access to the Internet from personal bubble to...
Proceedings of SPIE (October 18 2001)

Back to Top