{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:31:06Z","timestamp":1753273866616},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,20]]},"DOI":"10.1109\/infocom52122.2024.10621203","type":"proceedings-article","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:25:41Z","timestamp":1723483541000},"page":"1061-1070","source":"Crossref","is-referenced-by-count":1,"title":["INSERT: In-Network Stateful End-to-End RDMA Telemetry"],"prefix":"10.1109","author":[{"given":"Hyunseok","family":"Chang","sequence":"first","affiliation":[{"name":"Nokia Bell Labs,Murray Hill,NJ,USA"}]},{"given":"Walid A.","family":"Hanafy","sequence":"additional","affiliation":[{"name":"Univ. of Massachusetts,Amherst,MA,USA"}]},{"given":"Sarit","family":"Mukherjee","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs,Murray Hill,NJ,USA"}]},{"given":"Limin","family":"Wang","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs,Murray Hill,NJ,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/HiPC.2018.00010"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3514221.3526056"},{"article-title":"Empowering Azure Storage with RDMA","volume-title":"Proc. USENIX NSDI \u201923","author":"Bai","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3098583.3098591"},{"article-title":"ReDMArk: Bypassing RDMA Security Mechanisms","volume-title":"Proc. USENIX Security 2021","author":"Rothenberger","key":"ref5"},{"key":"ref6","article-title":"Intel Tofino"},{"year":"2007","key":"ref7","article-title":"InfiniBand Architecture Specification Volume 1, Release 1.2.1"},{"article-title":"RoCE v2.0 UDP Source Port Entropy","year":"2019","author":"Rosenbaum","key":"ref8"},{"key":"ref9","article-title":"AMD Pensando"},{"key":"ref10","article-title":"Intel IPU E2000"},{"key":"ref11","article-title":"Agilio CX"},{"article-title":"InfiniBand Network Block Device","year":"2017","author":"Kpnis","key":"ref12"},{"key":"ref13","article-title":"NFP-4000 Theory of Operation"},{"article-title":"Design Guidelines for High Performance RDMA Systems","volume-title":"Proc. USENIX ATC \u201916","author":"Kalia","key":"ref14"},{"key":"ref15","article-title":"P4 reference compiler"},{"key":"ref16","article-title":"P4 16 Language Specification"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190558"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431290"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP52444.2021.9651935"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3482898.3483363"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS57198.2023.10188785"},{"article-title":"Infiniband Monitoring of HPC Clusters using LDMS (Lightweight Distributed Monitoring System)","volume-title":"Proc. OpenFabrics Software User Group Workshop","author":"Beggio","key":"ref22"},{"article-title":"Host based InfiniBand Network Fabric Monitoring","volume-title":"Proc. OpenFabrics Aliance (OFA) Workshop","author":"Aguilar","key":"ref23"},{"article-title":"FaRM: Fast Remote Memory","volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Dragojevi\u0107","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483576"},{"article-title":"When Cloud Storage Meets RDMA","volume-title":"Proc. USENIX NSDI \u201921","author":"Gao","key":"ref26"},{"article-title":"Collie: Finding Performance Anomalies in RDMA Subsystems","volume-title":"Proc. USENIX NSDI \u201922","author":"Kong","key":"ref27"},{"article-title":"RDMAtool and Resource Tracking in RDMA Subsystem","volume-title":"Proc. OpenFabrics Aliance (OFA) Workshop","author":"Romanovsky","key":"ref28"},{"key":"ref29","article-title":"Mellanox NEO-Host"},{"key":"ref30","article-title":"CloudEngine Intelligent Traffic Analysis for RoCEv2 Flows"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787483"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626310"},{"article-title":"CSAMP: A System for Network-Wide Flow Monitoring","volume-title":"Proc. USENIX NSDI \u201908","author":"Sekar","key":"ref33"},{"article-title":"I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks","volume-title":"Proc. USENIX NSDI \u201914","author":"Handigol","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406214"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"article-title":"In-band Network Telemetry via Programmable Dataplanes","volume-title":"Proc. ACM SIGCOMM \u201915","author":"Kim","key":"ref37"},{"year":"2020","key":"ref38","article-title":"In-band Network Telemetry (INT) Dataplane Specification"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107763"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405894"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050233"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN49260.2020.9153279"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230555"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2968979"},{"article-title":"Dynamic Scheduling of Approximate Telemetry Queries","volume-title":"Proc. USENIX NSDI \u201922","author":"Misa","key":"ref45"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431298"},{"article-title":"P4NFV: An NFV Architecture with Flexible Data Plane Reconfiguration","volume-title":"Proc. CNSM 2018","author":"He","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3341558.3342202"},{"article-title":"Evolvable Network Telemetry at Facebook","volume-title":"Proc. USENIX NSDI \u201922","author":"Zhou","key":"ref49"},{"article-title":"Runtime programmable switches","volume-title":"Proc. USENIX NSDI \u201922","author":"Xing","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3482898.3483359"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3427796.3427798"},{"article-title":"FlowBlaze: Stateful Packet Processing in Hardware","volume-title":"Proc. USENIX NSDI \u201919","author":"Pontarelli","key":"ref53"},{"article-title":"A High-Speed Load-Balancer Design with Guaranteed Per-Connection-Consistency","volume-title":"Proc. USENIX NSDI \u201920","author":"Barbette","key":"ref54"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3416315.3416322"}],"event":{"name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications","start":{"date-parts":[[2024,5,20]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2024,5,23]]}},"container-title":["IEEE INFOCOM 2024 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10621050\/10621073\/10621203.pdf?arnumber=10621203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,21]],"date-time":"2024-08-21T22:49:32Z","timestamp":1724280572000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10621203\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,20]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/infocom52122.2024.10621203","relation":{},"subject":[],"published":{"date-parts":[[2024,5,20]]}}}