{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T15:02:09Z","timestamp":1758121329833,"version":"3.28.0"},"reference-count":61,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,13]]},"DOI":"10.1109\/icnp49622.2020.9259410","type":"proceedings-article","created":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T20:56:20Z","timestamp":1605905780000},"page":"1-12","source":"Crossref","is-referenced-by-count":4,"title":["HOLNET: A Holistic Traffic Control Framework for Datacenter Networks"],"prefix":"10.1109","author":[{"given":"Zhijun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Akshit","family":"Singhal","sequence":"additional","affiliation":[]},{"given":"Yunxiang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chuwen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Che","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"C.","family":"Lagoa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098841"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674985"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098825"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018467"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018443"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787510"},{"key":"ref37","article-title":"Per-packet Load-balanced , Low-Latency Routing for Clos-based Data Center Networks Categories and Subject Descriptors","author":"cao","year":"2013","journal-title":"Proceedings of ACM CoNext"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787507"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111336"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342389"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110504"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592576"},{"year":"2011","key":"ref28","article-title":"DCB. 802.1Qbb - Priority-based Flow Control"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787484"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934908"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2992"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/90.842137"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098840"},{"key":"ref22","article-title":"Recursively Cautious Congestion Control","author":"mittal","year":"2014","journal-title":"Proceedings of the 14th ACM Workshop on Hot Topics in Networks"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836086"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673871"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633035"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626305"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(74)90053-3"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.893874"},{"key":"ref59","article-title":"Multipath-TCP in ns3","author":"kheirkhah","year":"2014","journal-title":"Proceedings of ACM Workshop on ns-3"},{"key":"ref58","article-title":"Design, implementation and evaluation of congestion control for multipath TCP","author":"wischik","year":"2011","journal-title":"Proceedings of USENIX NSDI"},{"key":"ref57","article-title":"Enabling ECN in Multi-Service Multi-Queue Data Centers","author":"bai","year":"2016","journal-title":"Proceedings of ACM NSDI"},{"year":"0","key":"ref56","article-title":"Lagrange multiplier"},{"year":"0","key":"ref55","article-title":"Center of mass"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/90.879343"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057155"},{"key":"ref52","first-page":"1373","article-title":"A Family of Optimal, Distributed Taffic Control Laws in a Multidomain Environment","volume":"23","author":"su","year":"2015","journal-title":"IEEE Transactions on Control System Technology"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070809"},{"key":"ref11","article-title":"On Relfish Routing in Internet-like Environments","author":"qui","year":"2003","journal-title":"Proceedings of ACM SIGCOMM"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143401"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1064413.1064415"},{"key":"ref13","article-title":"On the interaction between overlay routing and underlay routing","author":"liu","year":"2005","journal-title":"Proceedings of IEEE Infocom"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916625"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080122"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535397"},{"key":"ref17","article-title":"Accurate latency-based congestion feedback for datacenters","author":"lee","year":"2015","journal-title":"Proceedings of USENIX ATC"},{"key":"ref18","article-title":"Less is More: Trading a little Bandwidth for Ultra-Low Latency in the Data Center","author":"alizadeh","year":"2012","journal-title":"Proceedings of USENIX NSDI"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1145\/2534169.2486031","article-title":"pFabric: Minimal NearOptimal Datacenter Transport","author":"alizadeh","year":"2013","journal-title":"Proceedings of ACM SIGCOMM"},{"key":"ref4","article-title":"Deadline-Aware Datacenter TCP (D2TCP)","author":"vamana","year":"2012","journal-title":"Proc ACM Sigcomm"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"ref6","article-title":"NUMFabric: Fast and Flexible Bandwidth Allocation in Datacenters","author":"nagaraj","year":"2014","journal-title":"Proceedings of the 14th ACM SIGCOMM"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486004"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626316"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098839"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.815297"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934888"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/49.414637"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987560"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/90.811451"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1038\/sj.jors.2600523"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567015"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890968"},{"key":"ref44","article-title":"Let It Flow : Resilient Asymmetric Load Balancing with Flowlet Switching","author":"vanini","year":"2017","journal-title":"Proceedings of ACM NSDI"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1232919.1232925"}],"event":{"name":"2020 IEEE 28th International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2020,10,13]]},"location":"Madrid, Spain","end":{"date-parts":[[2020,10,16]]}},"container-title":["2020 IEEE 28th International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9259328\/9259327\/09259410.pdf?arnumber=9259410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:21:55Z","timestamp":1656375715000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9259410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,13]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/icnp49622.2020.9259410","relation":{},"subject":[],"published":{"date-parts":[[2020,10,13]]}}}