Energy-efficient BitTorrent downloads to mobile phones through memory-limited proxies

Imre Kelényi, Ákos Ludányi, Jukka K. Nurminen

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

8 Citations (Scopus)


Using proxy servers to cache and shape network traffic can significantly improve the energy efficiency of the participating mobile clients. In this paper, we analyze the implications of hosting a BitTorrent proxy on a broadband router, which pushes the content to a mobile phone over wireless radio (WLAN or 3G). The amount of memory in a router is limited and therefore our interest is on how to use efficiently the memory to download the BitTorrent content as fast as possible and at the same time transfer it to the mobile phone in an energy-efficient way. We investigate these aspects via a series of measurements. The results show that the proxy-based solution outperforms the torrent client running on the phone in terms of energy and download time. We also simulate the BitTorrent operation to understand how these memory-limited devices would influence the operation of the whole community.
Original languageEnglish
Title of host publication2011 IEEE Consumer Communications and Networking Conference, CCNC'2011
PublisherIEEE Institute of Electrical and Electronic Engineers
ISBN (Print)978-1-4244-8789-9
Publication statusPublished - 2011
MoE publication typeNot Eligible
EventIEEE Consumer Communications and Networking Conference, CCNC 2011 - Las Vegas, United States
Duration: 9 Jan 201112 Jan 2011

Publication series

SeriesIEEE Consumer Communications and Networking Conference


ConferenceIEEE Consumer Communications and Networking Conference, CCNC 2011
Abbreviated titleCCNC 2011
Country/TerritoryUnited States
CityLas Vegas


  • bittorrent
  • broadband router
  • energy-efficiency
  • mobile
  • peer-to-peer
  • proxy


Dive into the research topics of 'Energy-efficient BitTorrent downloads to mobile phones through memory-limited proxies'. Together they form a unique fingerprint.

Cite this