{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T19:59:27Z","timestamp":1768334367954,"version":"3.49.0"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2024YFB2900070"],"award-info":[{"award-number":["2024YFB2900070"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Key Program of Natural Science Foundation of Jiangsu","doi-asserted-by":"publisher","award":["BK20243053"],"award-info":[{"award-number":["BK20243053"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62502194"],"award-info":[{"award-number":["62502194"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62325205"],"award-info":[{"award-number":["62325205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental and Interdisciplinary Disciplines Breakthrough Plan of the Ministry of Education of China","award":["JYB2025XDXM103"],"award-info":[{"award-number":["JYB2025XDXM103"]}]},{"DOI":"10.13039\/501100000266","name":"U.K. Research and Innovation (UKRI) - Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/X035085\/1"],"award-info":[{"award-number":["EP\/X035085\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Nanjing University-China Mobile Communications Group Company Ltd. Joint Institute"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/ton.2025.3649183","type":"journal-article","created":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T18:37:41Z","timestamp":1767033461000},"page":"2446-2461","source":"Crossref","is-referenced-by-count":0,"title":["UDMP: Unified Delay-Driven Multipath Protocol for AI Clusters"],"prefix":"10.1109","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6079-6579","authenticated-orcid":false,"given":"Chengyuan","family":"Huang","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"given":"Zhengqi","family":"Cui","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"given":"Jun","family":"Xu","sequence":"additional","affiliation":[{"name":"China, Mobile (Suzhou) Software Technology Company Ltd., Suzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5725-3661","authenticated-orcid":false,"given":"Zhaochen","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1605-6854","authenticated-orcid":false,"given":"Li","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0222-4943","authenticated-orcid":false,"given":"Peirui","family":"Cao","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9732-6338","authenticated-orcid":false,"given":"Zhongming","family":"Ji","sequence":"additional","affiliation":[{"name":"China, Mobile (Suzhou) Software Technology Company Ltd., Suzhou, China"}]},{"given":"Jilei","family":"Chen","sequence":"additional","affiliation":[{"name":"China, Mobile (Suzhou) Software Technology Company Ltd., Suzhou, China"}]},{"given":"Dongxu","family":"Wang","sequence":"additional","affiliation":[{"name":"China, Mobile (Suzhou) Software Technology Company Ltd., Suzhou, China"}]},{"given":"Shengju","family":"Zhang","sequence":"additional","affiliation":[{"name":"China, Mobile (Suzhou) Software Technology Company Ltd., Suzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9905-6328","authenticated-orcid":false,"given":"Lingkun","family":"Meng","sequence":"additional","affiliation":[{"name":"China, Mobile (Suzhou) Software Technology Company Ltd., Suzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1374-1882","authenticated-orcid":false,"given":"Ahmed M.","family":"Abdelmoniem","sequence":"additional","affiliation":[{"name":"Queen Mary University of London, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1815-2793","authenticated-orcid":false,"given":"Fu","family":"Xiao","sequence":"additional","affiliation":[{"name":"Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4833-2023","authenticated-orcid":false,"given":"Wanchun","family":"Dou","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6934-1685","authenticated-orcid":false,"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-7024-9164","authenticated-orcid":false,"given":"Keqiang","family":"He","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2710-7628","authenticated-orcid":false,"given":"Chen","family":"Tian","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402967"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672265"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592576"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787508"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672233"},{"key":"ref6","volume-title":"Supplement to InfiniBand TM Architecture Specification Volume 1 Release 1.2.1 Annex A17: RoCEv2","year":"2014"},{"key":"ref7","first-page":"89","article-title":"Hedera: Dynamic flow scheduling for data center networks","volume-title":"Proc. 7th USENIX Conf. Netw. Syst. Design Implement.","author":"Al-Fares"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626316"},{"key":"ref9","first-page":"407","article-title":"Let it flow: Resilient asymmetric load balancing with flowlet switching","volume-title":"Proc. 14th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Vanini"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787507"},{"key":"ref11","first-page":"357","article-title":"Multi-path transport for RDMA in datacenters","volume-title":"Proc. 15th USENIX Symp. Networked Syst. Design Implement.","author":"Lu"},{"key":"ref12","article-title":"STrack: A reliable multipath transport for AI\/ML clusters","author":"Le","year":"2024","journal-title":"arXiv:2407.15266"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934908"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787484"},{"key":"ref15","first-page":"49","article-title":"Empowering Azure storage with RDMA","volume-title":"Proc. 20th USENIX Symp. Networked Syst. Design Implement. (NSDI)","author":"Bai"},{"key":"ref16","first-page":"1","article-title":"Datacenter RPCs can be general and fast","volume-title":"Proc. 16th USENIX Symp. Networked Syst. Design Implement. (NSDI)","author":"Kalia"},{"key":"ref17","first-page":"1","article-title":"SRNIC: A scalable architecture for RDMA NICs","volume-title":"Proc. 20th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Wang"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1592681.1592693"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2197411"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934923"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672241"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3482898.3483363"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14778\/3415478.3415530"},{"key":"ref24","article-title":"Megatron-LM: Training multi-billion parameter language models using model parallelism","author":"Shoeybi","year":"2019","journal-title":"arXiv:1909.08053"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.48550\/arxiv.1811.06965"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359646"},{"key":"ref27","volume-title":"The New Era Needs a New Network","author":"Consortium","year":"2024"},{"key":"ref28","volume-title":"Nvidia Dgx Superpod","year":"2024"},{"key":"ref29","volume-title":"Nvlink and Nvlink Switch","year":"2024"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589350"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592803"},{"key":"ref32","first-page":"805","article-title":"Hashing design in modern networks: Challenges and mitigation techniques","volume-title":"Proc. USENIX Annu. Tech. Conf. (USENIX ATC)","author":"Xu"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018477"},{"key":"ref34","volume-title":"The Evolution of Data Center Networking for AI Workloads","author":"Gervasi","year":"2025"},{"key":"ref35","first-page":"99","article-title":"Design, implementation and evaluation of congestion control for multipath TCP","volume-title":"Proc. 8th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Wischik"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483576"},{"key":"ref37","first-page":"437","article-title":"Design guidelines for high performance RDMA systems","volume-title":"Proc. USENIX Annu. Tech. Conf. (USENIX ATC)","author":"Kalia"},{"key":"ref38","first-page":"185","article-title":"FaSST: Fast, scalable and simple distributed transactions with two-sided RDMA datagram RPCs","volume-title":"Proc. 12th USENIX Symp. Operating Syst. Design Implement.","author":"Kalia"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131375"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2953793"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406591"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787510"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3232755.3232783"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2020.3016891"},{"key":"ref46","first-page":"93","article-title":"Enabling programmable transport protocols in high-speed NICs","volume-title":"Proc. 17th USENIX Symp. Networked Syst. Design Implement. (NSDI)","author":"Arashloo"},{"key":"ref47","first-page":"403","article-title":"Accurate latency-based congestion feedback for datacenters","volume-title":"Proc. USENIX Annu. Tech. Conf. (USENIX ATC)","author":"Lee"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3663408.3663409"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098839"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544226"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018467"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098825"},{"key":"ref53","first-page":"17","article-title":"Catch the whole lot in an action: Rapid precise packet loss notification in data center","volume-title":"Proc. 11th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Cheng"},{"key":"ref54","first-page":"255","article-title":"Poseidon: Efficient, robust, and practical datacenter CC via deployable INT","volume-title":"Proc. 20th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Wang"}],"container-title":["IEEE Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723154\/11317935\/11318042.pdf?arnumber=11318042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:11:57Z","timestamp":1768291917000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11318042\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/ton.2025.3649183","relation":{},"ISSN":["2998-4157"],"issn-type":[{"value":"2998-4157","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}