{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:12:06Z","timestamp":1761401526052},"reference-count":25,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2011,1,25]],"date-time":"2011-01-25T00:00:00Z","timestamp":1295913600000},"content-version":"vor","delay-in-days":24,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Network Mgmt"],"published-print":{"date-parts":[[2011,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Locality awareness is considered as a promising approach to increase the efficiency of content distribution by peer\u2010to\u2010peer (P2P) networks, e.g., BitTorrent. It is intended to reduce the inter\u2010domain traffic, which is costly for Internet service providers (ISPs), and to simultaneously increase the performance from the viewpoint of P2P users, i.e., to shorten download times. This win\u2013win situation should be achieved by a preferred exchange of information between peers which are located close to each other in the underlying network topology. A set of studies shows that these approaches can lead to a win\u2013win situation under certain conditions, and to a win\u2013no lose situation in most cases. However, the scenarios used mostly assume homogeneous peer distributions. This is not the case in practice according to recent measurement studies. Therefore, we extend previous work in this paper by studying scenarios with real\u2010life, skewed peer distributions. We show that even a win\u2013no lose situation is difficult to achieve under those conditions and that the actual impact for a specific peer heavily depends on the used locality\u2010aware peer selection and the specific scenario. This contradicts the principle of economic traffic management (ETM), which aims for a solution where all involved players benefit and consequently have an incentive to adopt locality awareness. Therefore, we propose and evaluate refinements of current proposals, allowing all users of P2P networks to be sure that their application performance is not reduced. This mitigates the unfairness introduced by current proposals which is a key requirement for a broad acceptance of the concept of locality awareness in the user community of P2P networks. Copyright \u00a9 2011 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/nem.772","type":"journal-article","created":{"date-parts":[[2011,1,25]],"date-time":"2011-01-25T10:33:29Z","timestamp":1295951609000},"page":"3-20","source":"Crossref","is-referenced-by-count":15,"title":["Mitigating unfairness in locality\u2010aware peer\u2010to\u2010peer networks"],"prefix":"10.1002","volume":"21","author":[{"given":"Frank","family":"Lehrieder","sequence":"first","affiliation":[]},{"given":"Simon","family":"Oechsner","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Ho\u00dffeld","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Staehle","sequence":"additional","affiliation":[]},{"given":"Zoran","family":"Despotovic","sequence":"additional","affiliation":[]},{"given":"Wolfgang","family":"Kellerer","sequence":"additional","affiliation":[]},{"given":"Maximilian","family":"Michel","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2011,1,25]]},"reference":[{"key":"e_1_2_7_2_2","unstructured":"BindalR CaoP ChanW MedvalJ SuwalaG BatesT ZhangA.Improving traffic locality in BitTorrent via biased neighbor selection. InProceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS) 2006."},{"key":"e_1_2_7_3_2","doi-asserted-by":"crossref","unstructured":"Le BlondS LegoutA DabbousW.Pushing BitTorrent locality to the limit. Computer Networks; in press. doi:10.1016\/j.comnet.2010.09.014.","DOI":"10.1016\/j.comnet.2010.09.014"},{"key":"e_1_2_7_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/1273445.1273449"},{"key":"e_1_2_7_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402999"},{"key":"e_1_2_7_6_2","doi-asserted-by":"crossref","unstructured":"OechsnerS LehriederF Ho\u00dffeldT MetzgerF PussepK StaehleD.Pushing the performance of biased neighbor selection through biased unchoking. InProceedings of the IEEE International Conference on Peer\u2010to\u2010Peer Computing (P2P) Seattle WA 2009.","DOI":"10.1109\/P2P.2009.5284527"},{"key":"e_1_2_7_7_2","unstructured":"Charter of the IETF Working Group on Application\u2010Layer Traffic Optimization (ALTO). Available:http:\/\/www.ietf.org\/html.charters\/alto\u2010charter.html[14 November 2010]."},{"key":"e_1_2_7_8_2","first-page":"24","volume-title":"Towards the Future Internet: A European Research Perspective","author":"Ho\u00dffeld T","year":"2009"},{"key":"e_1_2_7_9_2","doi-asserted-by":"crossref","unstructured":"LehriederF OechsnerS Ho\u00dffeldT DespotovicZ KellererW MichelM.Can P2P users benefit from locality\u2010awareness?InProceedings of the IEEE International Conference on Peer\u2010to\u2010Peer Computing (P2P) Delft 2010.","DOI":"10.1109\/P2P.2010.5569992"},{"key":"e_1_2_7_10_2","unstructured":"WangH LiuJ KeX.On the locality of BitTorrent\u2010based video file swarming. InProceedings of the International Workshop on Peer\u2010to\u2010Peer Systems (IPTPS) 2009."},{"key":"e_1_2_7_11_2","doi-asserted-by":"crossref","unstructured":"Ho\u00dffeldT LehriederF HockD OechsnerS DespotovicZ KellererW MichelM.Characterization of BitTorrent swarms and their distribution in the Internet. Computer Networks; in press. doi:10.1016\/j.comnet.2010.11.011.","DOI":"10.1016\/j.comnet.2010.11.011"},{"key":"e_1_2_7_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1403000"},{"key":"e_1_2_7_13_2","doi-asserted-by":"crossref","unstructured":"RenS TanE LuoT ChenS GuoL ZhangX.TopBT: a topology\u2010aware and infrastructure\u2010independent BitTorrent client. InProceedings of the IEEE International Conference on Computer Communications (INFOCOM) 2010.","DOI":"10.1109\/INFCOM.2010.5461969"},{"key":"e_1_2_7_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2009.2012911"},{"key":"e_1_2_7_15_2","unstructured":"PiatekM MadhyasthaHV JohnJP KrishnamurthyA AndersonT.Pitfalls for ISP friendly P2P design. InProceedings of the ACM Workshop on Hot Topics in Networks (HotNets) 2009."},{"key":"e_1_2_7_16_2","unstructured":"MaroccoE FuscoA RimacI GurbaniVK.Mythbustering peer\u2010to\u2010peer traffic localization. IETF Internet draft (work in progress). Available:http:\/\/tools.ietf.org\/html\/draft\u2010marocco\u2010p2prg\u2010mythbustering\u201001[14 November 2010]."},{"key":"e_1_2_7_17_2","doi-asserted-by":"crossref","unstructured":"LegoutA Urvoy\u2010KellerG MichiardiP.Rarest first and choke algorithms are enough. InProceedings of the ACM Internet Measurement Conference (IMC) New York 2006;203\u2013216.","DOI":"10.1145\/1177080.1177106"},{"key":"e_1_2_7_18_2","unstructured":"BitTorrent specification. Available:http:\/\/wiki.theory.org\/BitTorrentSpecification[14 November 2010]."},{"key":"e_1_2_7_19_2","unstructured":"The SmoothIT project. Available:http:\/\/smoothit.org\/[14 November 2010]."},{"key":"e_1_2_7_20_2","unstructured":"Team cymru. Available:http:\/\/www.team\u2010cymru.org\/[14 November 2010]."},{"key":"e_1_2_7_21_2","doi-asserted-by":"crossref","unstructured":"RaczP OechsnerS LehriederF.BGP\u2010based locality promotion for P2P applications. InInternational Conference on Computer Communication Networks (ICCCN) Zurich August2010.","DOI":"10.1109\/ICCCN.2010.5560090"},{"key":"e_1_2_7_22_2","unstructured":"Protopeer. Available:http:\/\/protopeer.epfl.ch\/index.html[14 November 2010]."},{"key":"e_1_2_7_23_2","doi-asserted-by":"crossref","unstructured":"GalubaW AbererK DespotovicZ KellererW.ProtoPeer: a P2P toolkit bridging the gap between simulation and live deployment. InProceedings of the International Conference on Simulation Tools and Techniques (SIMUTools) 2009.","DOI":"10.4108\/ICST.SIMUTOOLS2009.5681"},{"key":"e_1_2_7_24_2","volume-title":"Data Networks","author":"Bertsekas D","year":"1987"},{"key":"e_1_2_7_25_2","unstructured":"BitTorrent Library for Protopeer. Available:http:\/\/protopeer.epfl.ch\/wiki\/BitTorrent[14 November 2010]."},{"key":"e_1_2_7_26_2","unstructured":"KieselS PopkinL PrevidiS WoundyR YangR.Application\u2010layer traffic optimization (ALTO) requirements. IETF Internet draft (work in progress). Available:http:\/\/datatracker.ietf.org\/doc\/draft\u2010ietf\u2010alto\u2010reqs\/ 2010."}],"container-title":["International Journal of Network Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fnem.772","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fnem.772","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/nem.772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T10:34:10Z","timestamp":1694514850000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/nem.772"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["10.1002\/nem.772"],"URL":"https:\/\/doi.org\/10.1002\/nem.772","archive":["Portico"],"relation":{},"ISSN":["1055-7148","1099-1190"],"issn-type":[{"value":"1055-7148","type":"print"},{"value":"1099-1190","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1]]}}}