{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:20:58Z","timestamp":1740133258865,"version":"3.37.3"},"reference-count":83,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2021B0101400001"],"award-info":[{"award-number":["2021B0101400001"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21B2022"],"award-info":[{"award-number":["U21B2022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Tsinghua University-China Mobile Communications Group Corporation Ltd. Joint Institute"},{"DOI":"10.13039\/501100004147","name":"Tsinghua University (Department of Computer Science and Technology)-Siemens Ltd.","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004147","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China Joint Research Center for Industrial Intelligence and Internet of Things"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1109\/tnet.2022.3224617","type":"journal-article","created":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T21:43:07Z","timestamp":1673646187000},"page":"1748-1764","source":"Crossref","is-referenced-by-count":0,"title":["Dependable Virtualized Fabric on Programmable Data Plane"],"prefix":"10.1109","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9013-5993","authenticated-orcid":false,"given":"Kaihui","family":"Gao","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7814-240X","authenticated-orcid":false,"given":"Shuai","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9882-9279","authenticated-orcid":false,"given":"Kun","family":"Qian","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7581-8865","authenticated-orcid":false,"given":"Dan","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tsinghua University, Beijing, China"}]},{"given":"Rui","family":"Miao","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Yu","family":"Zhou","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4352-7497","authenticated-orcid":false,"given":"Ennan","family":"Zhai","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Chen","family":"Sun","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Jiaqi","family":"Gao","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Dai","family":"Zhang","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Binzhang","family":"Fu","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7795-6049","authenticated-orcid":false,"given":"Frank","family":"Kelly","sequence":"additional","affiliation":[{"name":"Faculty of Mathematics, University of Cambridge, Cambridge, U.K."}]},{"given":"Dennis","family":"Cai","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Hongqiang Harry","family":"Liu","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Yan","family":"Li","sequence":"additional","affiliation":[{"name":"Siemens Ltd., Beijing, China"}]},{"given":"Hongwei","family":"Yang","sequence":"additional","affiliation":[{"name":"China Mobile Research Institute, Beijing, China"}]},{"given":"Tao","family":"Sun","sequence":"additional","affiliation":[{"name":"China Mobile Research Institute, Beijing, China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/3544216.3544241"},{"volume-title":"Alibaba Cloud EBS Performance","year":"2020","key":"ref2"},{"volume-title":"Google Cloud Block Storage Performance","year":"2020","key":"ref3"},{"volume-title":"Amazon EBS Features","year":"2020","key":"ref4"},{"volume-title":"Microsoft Azure Disk Storage","year":"2020","key":"ref5"},{"key":"ref6","first-page":"519","article-title":"When cloud storage meets RDMA","volume-title":"Proc. USENIX NSDI","author":"Gao"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ISCA45697.2020.00045"},{"key":"ref8","article-title":"DeepSpeed-MoE: Advancing mixture-of-experts inference and training to power next-generation AI scale","author":"Rajbhandari","year":"2022","journal-title":"arXiv:2201.05596"},{"key":"ref9","first-page":"419","article-title":"007: Democratically finding the cause of packet drops","volume-title":"Proc. USENIX NSDI","author":"Arzani"},{"key":"ref10","first-page":"595","article-title":"Passive realtime datacenter fault detection and localization","volume-title":"Proc. USENIX NSDI","author":"Roy"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.17487\/RFC7938"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/2829988.2787508"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/COMST.2017.2722380"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/2043164.2018467"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/2486001.2486027"},{"key":"ref16","first-page":"297","article-title":"EyeQ: Practical network performance isolation at the edge","volume-title":"Proc. USENIX NSDI","author":"Jeyakumar"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3341302.3342093"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/2377677.2377717"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.17487\/rfc2992"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/2619239.2626316"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2890955.2890968"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/3143361.3143401"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.17487\/RFC7811"},{"key":"ref24","first-page":"399","article-title":"F10: A fault-tolerant engineered network","volume-title":"Proc. USENIX NSDI","author":"Liu"},{"key":"ref25","first-page":"113","article-title":"Ensuring connectivity via data plane mechanisms","volume-title":"Proc. USENIX NSDI","author":"Liu"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/3230543.3230577"},{"key":"ref27","first-page":"1","article-title":"Design, implementation and evaluation of congestion control for multipath TCP","volume-title":"Proc. USENIX NSDI","author":"Wischik"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/3143361.3143370"},{"key":"ref29","first-page":"1","article-title":"Queues don\u2019t matter when you can JUMP them!","volume-title":"Proc. USENIX NSDI","author":"Grosvenor"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/3386367.3432879"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/1921168.1921188"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/2018436.2018465"},{"key":"ref33","first-page":"1","article-title":"Cloudmirror: Application-aware bandwidth reservations in the cloud","volume-title":"Proc. USENIX HotCloud","author":"Lee"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/2829988.2787479"},{"key":"ref35","first-page":"1","article-title":"Sharing the data center network","volume-title":"Proc. USENIX NSDI","author":"Shieh"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/2317307.2317309"},{"key":"ref37","first-page":"171","article-title":"Chatty tenants and the cloud network sharing problem","volume-title":"Proc. USENIX NSDI","author":"Ballani"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1145\/2377677.2377718"},{"key":"ref39","first-page":"407","article-title":"HUG: Multi-resource fairness for correlated and elastic demands","volume-title":"Proc. USENIX NSDI","author":"Chowdhury"},{"key":"ref40","first-page":"1","article-title":"Gatekeeper: Supporting bandwidth guarantees for multi-tenant datacenter networks","volume-title":"Proc. WIOV","author":"Rodrigues"},{"key":"ref41","first-page":"855","article-title":"Hashing linearity enables relative path control in data centers","volume-title":"Proc. USENIX ATC","author":"Zhang"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1145\/3387514.3406214"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1145\/2377677.2377759"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/TCC.2018.2890252"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1145\/3341302.3342085"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1145\/3387514.3406591"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1145\/52325.52356"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/ICDCS.2008.98"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1145\/2999572.2999609"},{"volume-title":"In-band Network Telemetry in Broadcom Trident3","year":"2019","key":"ref50"},{"volume-title":"In-band Network Telemetry in Barefoot Tofino","year":"2019","key":"ref51"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1109\/90.251892"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1145\/1064413.1064415"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1007\/11499169_22"},{"volume-title":"Infiniband Architecture Specification Volume 1 Release 1.3","year":"2015","key":"ref55"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1145\/3342280.3342310"},{"key":"ref57","first-page":"1","article-title":"SLOG: Your switch is also your load-generator","volume-title":"Proc. USENIX NSDI Poster","author":"Kogias"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1145\/3265723.3265731"},{"volume-title":"P4 Language Consortium, Portable Switch Architecture","year":"2021","key":"ref59"},{"volume-title":"NS3 Simluator, NS3","year":"2022","key":"ref60"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1145\/1402946.1402967"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1145\/2318857.2254766"},{"doi-asserted-by":"publisher","key":"ref63","DOI":"10.1145\/2377677.2377760"},{"doi-asserted-by":"publisher","key":"ref64","DOI":"10.1145\/1851182.1851192"},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.1145\/3230543.3230564"},{"doi-asserted-by":"publisher","key":"ref66","DOI":"10.1145\/2534169.2486031"},{"doi-asserted-by":"publisher","key":"ref67","DOI":"10.1145\/2377677.2377709"},{"doi-asserted-by":"publisher","key":"ref68","DOI":"10.1145\/2043164.2018443"},{"doi-asserted-by":"publisher","key":"ref69","DOI":"10.1145\/2377677.2377710"},{"key":"ref70","first-page":"829","article-title":"Buffer-based end-to-end request event monitoring in the cloud","volume-title":"Proc. USENIX NSDI","author":"Gao"},{"key":"ref71","first-page":"29","article-title":"Fast and cautious: Leveraging multi-path diversity for transport loss recovery in data centers","volume-title":"Proc. USENIX ATC","author":"Chen"},{"doi-asserted-by":"publisher","key":"ref72","DOI":"10.1145\/3098822.3098839"},{"doi-asserted-by":"publisher","key":"ref73","DOI":"10.1145\/2535372.2535375"},{"key":"ref74","first-page":"407","article-title":"Let it flow: Resilient asymmetric load balancing with flowlet switching","volume-title":"Proc. USENIX NSDI","author":"Vanini"},{"doi-asserted-by":"publisher","key":"ref75","DOI":"10.1145\/2829988.2787507"},{"doi-asserted-by":"publisher","key":"ref76","DOI":"10.1017\/CBO9781139565363"},{"doi-asserted-by":"publisher","key":"ref77","DOI":"10.1109\/90.879343"},{"doi-asserted-by":"publisher","key":"ref78","DOI":"10.1109\/TMC.2004.45"},{"doi-asserted-by":"publisher","key":"ref79","DOI":"10.1109\/LCOMM.2007.070076"},{"doi-asserted-by":"publisher","key":"ref80","DOI":"10.1145\/633025.633035"},{"doi-asserted-by":"publisher","key":"ref81","DOI":"10.1145\/1384609.1384615"},{"doi-asserted-by":"publisher","key":"ref82","DOI":"10.1109\/TAC.2009.2022115"},{"doi-asserted-by":"publisher","key":"ref83","DOI":"10.1109\/GLOCOM.2015.7417124"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/10223306\/10017157.pdf?arnumber=10017157","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T15:05:52Z","timestamp":1709391952000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10017157\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":83,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2022.3224617","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"type":"print","value":"1063-6692"},{"type":"electronic","value":"1558-2566"}],"subject":[],"published":{"date-parts":[[2023,8]]}}}