{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:50:09Z","timestamp":1771699809250,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,13]],"date-time":"2012-08-13T00:00:00Z","timestamp":1344816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,13]]},"DOI":"10.1145\/2342356.2342438","type":"proceedings-article","created":{"date-parts":[[2012,8,14]],"date-time":"2012-08-14T12:18:56Z","timestamp":1344946736000},"page":"419-430","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":71,"title":["NetPilot"],"prefix":"10.1145","author":[{"given":"Xin","family":"Wu","sequence":"first","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Daniel","family":"Turner","sequence":"additional","affiliation":[{"name":"University of California, San Diego, San Diego, CA, USA"}]},{"given":"Chao-Chih","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California, Davis, Davis, USA"}]},{"given":"David A.","family":"Maltz","sequence":"additional","affiliation":[{"name":"Microsoft, Bellevue, WA, USA"}]},{"given":"Xiaowei","family":"Yang","sequence":"additional","affiliation":[{"name":"Duke University, Durham, USA"}]},{"given":"Lihua","family":"Yuan","sequence":"additional","affiliation":[{"name":"Microsoft, Bellevue, WA, USA"}]},{"given":"Ming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,8,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Cut-Through and Store-and-Forward Ethernet Switching for Low-Latency Environments. http: \/\/www.cisco.com\/en\/US\/prod\/collateral\/switches\/ps9441\/ps9670\/white_paper_c11-465436.pdf.  Cut-Through and Store-and-Forward Ethernet Switching for Low-Latency Environments. http: \/\/www.cisco.com\/en\/US\/prod\/collateral\/switches\/ps9441\/ps9670\/white_paper_c11-465436.pdf."},{"key":"e_1_3_2_2_2_1","unstructured":"Virtual PortChannels: Building Networks without Spanning Tree Protocol. http: \/\/www.cisco.com\/en\/US\/prod\/collateral\/switches\/ps9441\/ps9402\/white_paper_c11-516396.html.  Virtual PortChannels: Building Networks without Spanning Tree Protocol. http: \/\/www.cisco.com\/en\/US\/prod\/collateral\/switches\/ps9441\/ps9402\/white_paper_c11-516396.html."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945454"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402967"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282383"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2009.22"},{"key":"e_1_3_2_2_7_1","volume-title":"NSDI '04","author":"Chen M. Y."},{"key":"e_1_3_2_2_8_1","volume-title":"Morgan Kaufmann Publishers Inc.","author":"Dally W.","year":"2003"},{"key":"e_1_3_2_2_9_1","volume-title":"Berkeley Computer Science","author":"D. P.","year":"2002"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592576"},{"key":"e_1_3_2_2_11_1","unstructured":"U. Hoelzle and L. A. Barroso. The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines. Morgan and Claypool Publishers.   U. Hoelzle and L. A. Barroso. The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines. Morgan and Claypool Publishers."},{"key":"e_1_3_2_2_12_1","first-page":"2992","article-title":"Analysis of an Equal-Cost Multi-Path Algorithm","author":"Hopps C.","year":"2000","journal-title":"RFC"},{"key":"e_1_3_2_2_13_1","unstructured":"IEEE. 802.3ad Link Aggregation Standard.  IEEE. 802.3ad Link Aggregation Standard."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1243418.1243426"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080178"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592597"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644918"},{"key":"e_1_3_2_2_18_1","volume-title":"Total Recall: System Support for Automated Availability Management. In NSDI '04","author":"Kiran R. B."},{"key":"e_1_3_2_2_19_1","volume-title":"Alex. IP Fault Localization Via Risk Modeling. In NSDI '05","author":"Yates R.R"},{"key":"e_1_3_2_2_20_1","first-page":"3164","author":"Lonvick C.","year":"2001","journal-title":"The BSD Syslog Protocol. RFC"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592575"},{"key":"e_1_3_2_2_22_1","first-page":"3418","article-title":"Management Information Base (MIB) for the Simple Network Management Protocol (SNMP)","author":"Presuhn R.","year":"2002","journal-title":"RFC"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135830"},{"key":"e_1_3_2_2_24_1","first-page":"5798","article-title":"Virtual Router Redundancy Protocol (VRRP) Version 3 for IPv4 and IPv6","author":"Nadas S.","year":"2010","journal-title":"Internet RFC"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637236"},{"key":"e_1_3_2_2_26_1","volume-title":"NSDI '04","author":"Shen K."},{"key":"e_1_3_2_2_27_1","first-page":"2281","article-title":"Cisco Hot Standby Router Protocol (HSRP)","author":"Li T.","year":"1998","journal-title":"RFC"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402971"},{"key":"e_1_3_2_2_29_1","unstructured":"A. A. Team. Summary of the Amazon EC2 and Amazon RDS Service Disruption in the US East Region. http: \/\/aws.amazon.com\/message\/65648\/.  A. A. Team. Summary of the Amazon EC2 and Amazon RDS Service Disruption in the US East Region. http: \/\/aws.amazon.com\/message\/65648\/."},{"key":"e_1_3_2_2_30_1","volume-title":"INFOCOM '11","author":"Wang Y."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851218"}],"event":{"name":"SIGCOMM '12: ACM SIGCOMM 2012 Conference","location":"Helsinki Finland","acronym":"SIGCOMM '12","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2342356.2342438","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2342356.2342438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:23Z","timestamp":1750238483000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2342356.2342438"}},"subtitle":["automating datacenter network failure mitigation"],"short-title":[],"issued":{"date-parts":[[2012,8,13]]},"references-count":31,"alternative-id":["10.1145\/2342356.2342438","10.1145\/2342356"],"URL":"https:\/\/doi.org\/10.1145\/2342356.2342438","relation":{},"subject":[],"published":{"date-parts":[[2012,8,13]]},"assertion":[{"value":"2012-08-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}