{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:26:37Z","timestamp":1775179597701,"version":"3.50.1"},"reference-count":68,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T00:00:00Z","timestamp":1696896000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T00:00:00Z","timestamp":1696896000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62325205,62072228,62172204"],"award-info":[{"award-number":["62325205,62072228,62172204"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,10]]},"DOI":"10.1109\/icnp59255.2023.10355634","type":"proceedings-article","created":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T19:18:50Z","timestamp":1703099930000},"page":"1-12","source":"Crossref","is-referenced-by-count":11,"title":["Bifrost: Extending RoCE for Long Distance Inter-DC Links"],"prefix":"10.1109","author":[{"given":"Peiwen","family":"Yu","sequence":"first","affiliation":[{"name":"Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China"}]},{"given":"Feiyang","family":"Xue","sequence":"additional","affiliation":[{"name":"Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China"}]},{"given":"Chen","family":"Tian","sequence":"additional","affiliation":[{"name":"Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China"}]},{"given":"Xiaoliang","family":"Wang","sequence":"additional","affiliation":[{"name":"Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China"}]},{"given":"Yanqing","family":"Chen","sequence":"additional","affiliation":[{"name":"Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China"}]},{"given":"Tao","family":"Wu","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd"}]},{"given":"Lei","family":"Han","sequence":"additional","affiliation":[{"name":"Nanjing University of Posts and Telecommunications,Nanjing,China"}]},{"given":"Zifa","family":"Han","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd"}]},{"given":"Bingquan","family":"Wang","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd"}]},{"given":"Xiangyu","family":"Gong","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd"}]},{"given":"Wanchun","family":"Dou","sequence":"additional","affiliation":[{"name":"Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China"}]},{"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[{"name":"Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2016.2594235"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487860"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406220"},{"key":"ref5","article-title":"Facebook rethinks in-region data center interconnection","volume-title":"DataCenter Knowledge","author":"Sverdlik","year":"2018"},{"key":"ref6","volume-title":"Aws re:invent 2016: Enterprise fundamentals: Design your account and vpc architecture for enterprise operating models (ent203)","year":"2016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2806777.2806780"},{"key":"ref8","article-title":"CLARINET: WAN-Aware optimization for analytics queries","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Viswanathan","year":"2016"},{"key":"ref9","article-title":"Siphon: Expediting Inter-Datacenter coflows in Wide-Area data analytics","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC18)","author":"Liu","year":"2018"},{"key":"ref10","article-title":"Towards geo-distributed machine learning","author":"Cano","year":"2016","journal-title":"arXiv preprint"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2955494"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/icde53745.2022.00256"},{"key":"ref13","article-title":"A nationwide platform for science discovery","volume-title":"ESnet","year":"2018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2903150.2912887"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14529\/jsfi170207"},{"key":"ref16","article-title":"Infinicloud 2.0: distributing high performance computing across continents","volume-title":"Supercomputing Frontiers and Innovations","author":"Chrzeszczyk","year":"2016"},{"key":"ref17","article-title":"China initiates east-data-west-computing project","volume-title":"ECNS","author":"Dongfang","year":"2022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2016.35"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303968"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SC41405.2020.00070"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3476191"},{"key":"ref22","volume-title":"Infinibandtm architecture specification","author":"Association","year":"2004"},{"key":"ref23","article-title":"Infiniband architecture specification volume 1 release 1.2.1 annex a17: RoCEv2","volume-title":"InfiniBand Trade Association","year":"2014"},{"key":"ref24","article-title":"FaRM: Fast remote memory","volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Dragojevi\u0107","year":"2014"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934908"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405849"},{"key":"ref27","article-title":"When cloud storage meets RDMA","volume-title":"18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21)","author":"Gao","year":"2021"},{"key":"ref28","article-title":"Empowering azure storage with RDMA","volume-title":"20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Bai","year":"2023"},{"key":"ref29","article-title":"Pluggable dwdm: Considerations for campus and metro dci applications","volume-title":"Proc. Eur. Conf. Opt. Commun","author":"Zhou","year":"2016"},{"key":"ref30","article-title":"Understanding chinas \u201ceastern data western\u201d calculation project","volume-title":"PINGWEST","author":"Fu","year":"2022"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486019"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787478"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230545"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190519"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14529\/jsfi200202"},{"key":"ref36","article-title":"What is a federated network?","volume-title":"VMware","year":"2022"},{"key":"ref37","article-title":"The court of justice declares that the commissions us safe harbour decision is invalid","volume-title":"CURAI","year":"2015"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2896894"},{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.1016\/j.future.2021.12.004","article-title":"Privacy-preserving workflow scheduling in geo-distributed data centers","volume-title":"Future Generation Computer Systems","author":"Xiao","year":"2022"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900632"},{"key":"ref41","article-title":"Cod-edBulk: Inter-Datacenter bulk transfers using network coding","volume-title":"18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21)","author":"Tseng","year":"2021"},{"key":"ref42","article-title":"More than capacity: Performance-oriented evolution of pangu in alibaba","volume-title":"21st USENIX Conference on File and Storage Technologies (FAST 23)","author":"Li","year":"2023"},{"key":"ref43","article-title":"Monitoring, managing and troubleshooting large scale networks","volume-title":"Obsidian Strategies","year":"2015"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787484"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787483"},{"key":"ref46","article-title":"IEEE standard for local and metropolitan area networks-media access control (mac) bridges and virtual bridged local area networks-amendment 17: Priority-based flow control","volume-title":"IEEE Std 802.1Qbb-2011 (Amendment to IEEE Std 802.1Q-2011 as amended by IEEE Std 802.1Qbe-2011 and IEEE Std 802.1Qbc-2011)","year":"2011"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3215517"},{"key":"ref48","article-title":"Infiniband architecture specification volume 1","volume-title":"InfiniBand Trade Association","year":"2007"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230557"},{"key":"ref50","volume-title":"Infiniband range limitation","year":"2022"},{"key":"ref51","volume-title":"Bifrost online appendix","author":"Yu","year":"2022"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/photonics9080522"},{"key":"ref53","volume-title":"Huawei cloudengine 8851 switch datasheet"},{"key":"ref54","article-title":"linux-rdma\/perftest: Infiniband verbs performance tests","volume-title":"linux rdma","year":"2022"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402967"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787472"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230564"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2016.7497228"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.2969182"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3375235.3375239"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494854"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342065"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3447786.3456227"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3161580"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405899"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP52444.2021.9651988"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00093"}],"event":{"name":"2023 IEEE 31st International Conference on Network Protocols (ICNP)","location":"Reykjavik, Iceland","start":{"date-parts":[[2023,10,10]]},"end":{"date-parts":[[2023,10,13]]}},"container-title":["2023 IEEE 31st International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10355566\/10355569\/10355634.pdf?arnumber=10355634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:15:30Z","timestamp":1705090530000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10355634\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,10]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/icnp59255.2023.10355634","relation":{},"subject":[],"published":{"date-parts":[[2023,10,10]]}}}