JACIII Vol.18 No.3 pp. 320-323
doi: 10.20965/jaciii.2014.p0320


The Usage and Behavior Patterns of Mobile BitTorrent Clients

Péter Ekler and Kristóf Csorba

Department of Automation and Applied Informatics, Faculty of Electrical Engineering and Informatics, Budapest University of Technology and Economics, Magyar Tudsok krtja 2., 1117 Budapest, Hungary

February 18, 2013
September 30, 2013
May 20, 2014
feature phone, BitTorrent, peer-to-peer, user behavior
With the many changes in mobile phone use, it is now common for users to connect to the Internet and share social and multimedia data, and peer-to-peer technology remains one of the most efficient solutions to content sharing. We analysed the lifecycle of content shared using the BitTorrent network, focusing on torrents retrieved by mobile phone clients using our MobTorrent application. MobTorrent, a complete Bit-Torrent client for feature phones, enables anonymous usage statistics to be collected. Based on statistics collected over the last three years, we analyze how mobile BitTorrent clients are being used. We discuss the success of individual sessions by additionally measuring peer connection download and success ratio statistics. This research can be considered as a pioneer work in the field of mobile content sharing solutions.
Cite this article as:
P. Ekler and K. Csorba, “The Usage and Behavior Patterns of Mobile BitTorrent Clients,” J. Adv. Comput. Intell. Intell. Inform., Vol.18 No.3, pp. 320-323, 2014.
Data files:
  1. [1] P. Ekler, “MobTorrent P2P mobile application 1.1,” Budapest University of Technology and Economics, Apr. 11, 2011.Available: [Accessed March 16, 2014].
  2. [2] P. Ekler and J. K. Nurminen, “A. Kiss. Experiences of implementing BitTorrent on Java ME platform,” 5th IEEE Consumer Communications & Networking Conf. (CCNC 2008), 2008.
  3. [3] BitTorrent specification, Apr. 11, 2011.
    Available: [Accessed March 18, 2014].
  4. [4] J. Pouwelse, P. Garbacki, D. Epema, and H. Sips, “The BitTorrent p2p file-sharing system: Measurements and analysis,” 4th Int. Workshop on Peer-To-Peer Systems 2006 (IPTPS’05), 2006.
  5. [5] N. Basher, A. Mahanti, A. Mahanti, C. Williamson, and M. Arlitt, “A comparative analysis of web and peer-to-peer traffic,” 17th Int. Conf. on World Wide Web (WWW ’08), pp. 287-296, 2008.
  6. [6] L. Plissonneau, J-L. Costeux, and P. Brown, “Analysis of Peer-to-Peer Traffic on ADSL,” Passive and Active Network Measurement, Vol.3431, pp. 69-82, 2005.
  7. [7] Z. Móczár and S. Molnár, “Comparative Traffic Analysis Study of Popular Applications,” Energy-Aware Communications, pp. 124-133, 2011.
  8. [8] B. Forstner, G. Csúcs, I. Kelényi, and H. Charaf, “Peer-to-Peer Information Retrieval Based on Fields of Interest,” Cognitive Wireless Networks, pp. 235-249, 2007.
  9. [9] Nokia Energy Profiler,
    Available online: Other/Nokia_Energy_Profiler, [Accessed February 4, 2012].
  10. [10] P. Baranyi and A. Csapó, “Definition and Synergies of Cognitive Infocommunications,” Acta Polytechnica Hungarica, Vol.9, No.1, pp. 67-83, 2012.

*This site is desgined based on HTML5 and CSS3 for modern browsers, e.g. Chrome, Firefox, Safari, Edge, Opera.

Last updated on May. 28, 2024