{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:21:37Z","timestamp":1740133297632,"version":"3.37.3"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2022YFB2702800"],"award-info":[{"award-number":["2022YFB2702800"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62325205","62072228","62172204"],"award-info":[{"award-number":["62325205","62072228","62172204"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tnet.2024.3443600","type":"journal-article","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T19:09:22Z","timestamp":1724353762000},"page":"4960-4975","source":"Crossref","is-referenced-by-count":0,"title":["Minimizing Buffer Utilization for Lossless Inter-DC Links"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6079-6579","authenticated-orcid":false,"given":"Chengyuan","family":"Huang","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"given":"Feiyang","family":"Xue","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7643-0179","authenticated-orcid":false,"given":"Peiwen","family":"Yu","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3410-8621","authenticated-orcid":false,"given":"Xiaoliang","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6902-7752","authenticated-orcid":false,"given":"Yanqing","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"given":"Tao","family":"Wu","sequence":"additional","affiliation":[{"name":"Huawei Technologies Company Ltd., Shenzhen, China"}]},{"given":"Lei","family":"Han","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"given":"Zifa","family":"Han","sequence":"additional","affiliation":[{"name":"Huawei Technologies Company Ltd., Shenzhen, China"}]},{"given":"Bingquan","family":"Wang","sequence":"additional","affiliation":[{"name":"Huawei Technologies Company Ltd., Shenzhen, China"}]},{"given":"Xiangyu","family":"Gong","sequence":"additional","affiliation":[{"name":"Huawei Technologies Company Ltd., Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2710-7628","authenticated-orcid":false,"given":"Chen","family":"Tian","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4833-2023","authenticated-orcid":false,"given":"Wanchun","family":"Dou","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6934-1685","authenticated-orcid":false,"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7829-7196","authenticated-orcid":false,"given":"Hao","family":"Yin","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology (BNRist), Tsinghua University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2594235"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487860"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406220"},{"volume-title":"Facebook Rethinks In-region Data Center Interconnection. DataCenter Knowledge","year":"2018","author":"Sverdlik","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2806777.2806780"},{"key":"ref7","first-page":"435","article-title":"CLARINET: WAN-aware optimization for analytics queries","volume-title":"Proc. USENIX OSDI","author":"Viswanathan"},{"key":"ref8","first-page":"507","article-title":"Siphon: Expediting inter-datacenter coflows in wide-area data analytics","volume-title":"Proc. USENIX ATC","author":"Liu"},{"key":"ref9","article-title":"Towards geo-distributed machine learning","author":"Cano","year":"2016","journal-title":"arXiv:1603.09035"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2955494"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00256"},{"volume-title":"A Nationwide Platform for Science Discovery","year":"2018","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2903150.2912887"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14529\/jsfi170207"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14529\/jsfi160204"},{"volume-title":"China Initiates East-Data-West-Computing Project","year":"2022","author":"Dongfang","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2016.35"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303968"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SC41405.2020.00070"},{"key":"ref20","first-page":"1","article-title":"HatRPC: Hint-accelerated thrift RPC over RDMA","volume-title":"Proc. Int. Conf. for High Perform. Comput., Netw., Storage Anal.","author":"Li"},{"volume-title":"Infinibandtm Architecture Specification","year":"2004","key":"ref21"},{"volume-title":"Infiniband Architecture Specification Volume 1 Release 1.2.1 Annex A17: RoCEv2. InfiniBand Trade Association","year":"2014","key":"ref22"},{"key":"ref23","first-page":"401","article-title":"FaRM: Fast remote memory","volume-title":"Proc. USENIX NSDI","author":"Dragojevi\u0107"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934908"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405849"},{"key":"ref26","first-page":"519","article-title":"When cloud storage meets RDMA","volume-title":"Proc. USENIX NSDI","author":"Gao"},{"key":"ref27","first-page":"49","article-title":"Empowering Azure storage with RDMA","volume-title":"Proc. USENIX NSDI","author":"Bai"},{"key":"ref28","first-page":"1","article-title":"Pluggable DWDM: Considerations for campus and metro DCI applications","volume-title":"Proc. Eur. Conf. Opt. Commun.","author":"Zhou"},{"volume-title":"Understanding China\u2019s Eastern Data Western","year":"2022","author":"Fu","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486019"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230545"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190519"},{"issue":"2","key":"ref33","first-page":"24","article-title":"Long distance geographically distributed infiniband based computing","volume":"7","author":"Niedzielewski","year":"2020","journal-title":"ACM Supercomputing Frontiers Innov."},{"volume-title":"What is a Federated Network? VMware","year":"2022","key":"ref34"},{"volume-title":"The Court of Justice Declares That the Commissions Us Safe Harbour Decision is Invalid","year":"2015","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2896894"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.12.004"},{"key":"ref38","first-page":"15","article-title":"CodedBulk: Inter-datacenter bulk transfers using network coding","volume-title":"Proc. USENIX NSDI","author":"Tseng"},{"volume-title":"Monitoring, Managing and Troubleshooting Large Scale Networks","year":"2015","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787484"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787483"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2006.6044678"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3215517"},{"volume-title":"Infiniband Architecture Specification Volume 1","year":"2007","key":"ref44"},{"volume-title":"Infiniband Range Limitation","year":"2022","key":"ref45"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230557"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/photonics9080522"},{"volume-title":"Huawei Cloudengine 8851 Switch Datasheet","year":"2024","key":"ref48"},{"volume-title":"Linux-RDMA\/Perftest: Infiniband Verbs Performance Tests","year":"2022","key":"ref49"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402967"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787472"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230564"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2016.7497228"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.2969182"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3375235.3375239"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494854"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342065"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3447786.3456227"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3161580"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405899"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP52444.2021.9651988"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00093"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/90\/10807683\/10643867.pdf?arnumber=10643867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T20:31:13Z","timestamp":1736973073000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10643867\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":63,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2024.3443600","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"type":"print","value":"1063-6692"},{"type":"electronic","value":"1558-2566"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}