Smart Proxying: an Optimal Strategy for Improving Battery Life of Mobile Devices

Raffaele Bolla, Maurizio Giribaldi, Rafiullah Khan, Matteo Repetto

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)
35 Downloads (Pure)


Improving energy efficiency of mobile devices is one of the main challenges to extend the battery life. The Wireless Network Interface Card (WNIC) or 3G is usually considered as primary source of energy consumption. To reduce the energy consumption, different proxying schemes have been proposed in literature mostly focusing on increasing WNIC idle periods through traffic shaping, reducing number of bits transmitted/received through compression techniques and putting WNIC or even the mobile device itself into sleep mode whenever possible. This paper presents the possible smart proxying schemes for mobile devices and particularly focuses on the Network Connectivity Proxy (NCP) which impersonates the mobile devices during their sleep periods and maintains their network presence. Till now the proxying schemes have only been considered for static networks without taking into account the mobility of mobile devices. This paper proposes possible proxy architectural designs in order to support host's mobility. Further, challenges and issues with each architectural design and possible solutions to tackle with those challenges have also been addressed.
Original languageEnglish
Title of host publicationProceedings of 2013 International Green Computing Conference (IGCC)
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Print)978-1-4799-0622-2
Publication statusPublished - Jun 2013
Externally publishedYes
Event4th International Green Computing Conference - Arlington, United States
Duration: 27 Jun 201329 Jun 2013


Conference4th International Green Computing Conference
Abbreviated titleIEEE IGCC
CountryUnited States

Fingerprint Dive into the research topics of 'Smart Proxying: an Optimal Strategy for Improving Battery Life of Mobile Devices'. Together they form a unique fingerprint.

Cite this