{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:32:42Z","timestamp":1775068362423,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T00:00:00Z","timestamp":1497484800000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1219028"],"award-info":[{"award-number":["CNS-1219028"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,15]]},"DOI":"10.1145\/2935663.2935669","type":"proceedings-article","created":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T17:50:36Z","timestamp":1465581036000},"page":"21-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Performance Evaluation of TCP Congestion Control Algorithms in Data Center Networks"],"prefix":"10.1145","author":[{"given":"Truc Anh N.","family":"Nguyen","sequence":"first","affiliation":[{"name":"Information and Telecommunication Technology Center, Department of Electrical Engineering and Computer Science, The University of Kansas, Lawrence, USA"}]},{"given":"Siddharth","family":"Gangadhar","sequence":"additional","affiliation":[{"name":"Information and Telecommunication Technology Center, Department of Electrical Engineering and Computer Science, The University of Kansas, Lawrence, USA"}]},{"given":"James P. G.","family":"Sterbenz","sequence":"additional","affiliation":[{"name":"Information and Telecommunication Technology Center, Department of Electrical Engineering and Computer Science, The University of Kansas, Lawrence, USA and School of Computing and Communications (SCC) and InfoLab21, Lancaster University, UK and Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2016,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"July","author":"Network Simulator The","year":"2009","unstructured":"The ns-3 Network Simulator. http:\/\/www.nsnam.org, July 2009."},{"key":"e_1_3_2_1_2_1","volume-title":"SOCIS 2014: TCP versions for satellite communications. https:\/\/www.nsnam.org\/wiki\/SOCIS2014TCP","year":"2014","unstructured":"ns-3 SOCIS 2014: TCP versions for satellite communications. https:\/\/www.nsnam.org\/wiki\/SOCIS2014TCP, 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"http:\/\/ntu-dsi-dcn.github.io\/ntu-dsi-dcn\/","author":"An","year":"2015","unstructured":"An open-source ns-3 simulation framework for data center network architectures. http:\/\/ntu-dsi-dcn.github.io\/ntu-dsi-dcn\/, 2015."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/www.nsnam.org\/docs\/models\/html\/flow-monitor.html","author":"Module Documentation Flow Monitor","year":"2015","unstructured":"ns-3 Flow Monitor Module Documentation. https:\/\/www.nsnam.org\/docs\/models\/html\/flow-monitor.html, 2015."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/github.com\/ntu-dsi-dcn\/ntu-dsi-dcn","author":"Architecture Implementation","year":"2015","unstructured":"ns-3 Implementation of Fat-tree Architecture. https:\/\/github.com\/ntu-dsi-dcn\/ntu-dsi-dcn, 2015."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/www.nsnam.org\/docs\/release\/3.16\/doxygen\/group__nixvectorrouting.html","author":"Nix-Vector","year":"2015","unstructured":"ns-3 Nix-Vector Routing API, Usage, and Implementation. https:\/\/www.nsnam.org\/docs\/release\/3.16\/doxygen\/group__nixvectorrouting.html, 2015."},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/www.nsnam.org\/docs\/manual\/html\/tracing.html","author":"Manual Tracing System","year":"2015","unstructured":"ns-3 Tracing System Manual. https:\/\/www.nsnam.org\/docs\/manual\/html\/tracing.html, 2015."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402967"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"e_1_3_2_1_10_1","volume-title":"Sept.","author":"Allman M.","year":"2009","unstructured":"M. Allman, V. Paxson, and E. Blanton. TCP Congestion Control. RFC 5681 (Draft Standard), Sept. 2009."},{"key":"e_1_3_2_1_11_1","first-page":"37","volume-title":"Proc. PFLDnet","volume":"7","author":"Baiocchi A.","year":"2007","unstructured":"A. Baiocchi, A. P. Castellani, and F. Vacirca. YeAH-TCP: yet another highspeed TCP. In Proc. PFLDnet, volume 7, pages 37--42, 2007."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/190809.190317"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3649"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2512734.2512757"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592576"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592577"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402968"},{"key":"e_1_3_2_1_19_1","volume-title":"Fourth International Workshop on Protocols for Fast Long-Distance Networks (PFLDNet06)","author":"Ha S.","year":"2006","unstructured":"S. Ha, Y. Kim, L. Le, I. Rhee, and L. Xu. A step toward realistic performance evaluation of high-speed tcp variants. In Fourth International Workshop on Protocols for Fast Long-Distance Networks (PFLDNet06), 2006."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400105"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6582"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2009.71"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364079"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1323"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/956981.956989"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342385"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381704"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(03)00098-1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2018"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/144191.144305"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"T. A. N. Nguyen S. Gangadhar M. M. Rahman and J. P. Sterbenz. An Implementation of Scalable Vegas Veno and YeAH Congestion Control Algorithms in ns-3 (extended). ITTC Technical Report ITTC-FY2016-TR-69921-04 The University of Kansas Lawrence KS April 2016.","DOI":"10.1145\/2915371.2915386"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCOS.2012.38"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377709"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1817271.1817510"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831265"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921186"},{"key":"e_1_3_2_1_37_1","first-page":"2514","volume-title":"INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies","volume":"4","author":"Xu L.","year":"2004","unstructured":"L. Xu, K. Harfoush, and I. Rhee. Binary increase congestion control (BIC) for fast long-distance networks. In INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, volume 4, pages 2514--2524, 2004."}],"event":{"name":"CFI '16: The 11th International Conference on Future Internet Technologies","location":"Nanjing China","acronym":"CFI '16","sponsor":["AsiaFI Asia Future Internet"]},"container-title":["Proceedings of the 11th International Conference on Future Internet Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2935663.2935669","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2935663.2935669","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2935663.2935669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:16:07Z","timestamp":1763457367000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2935663.2935669"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,15]]},"references-count":37,"alternative-id":["10.1145\/2935663.2935669","10.1145\/2935663"],"URL":"https:\/\/doi.org\/10.1145\/2935663.2935669","relation":{},"subject":[],"published":{"date-parts":[[2016,6,15]]},"assertion":[{"value":"2016-06-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}