{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:06:35Z","timestamp":1775837195682,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T00:00:00Z","timestamp":1566172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,19]]},"DOI":"10.1145\/3341302.3342065","type":"proceedings-article","created":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T19:32:36Z","timestamp":1565811156000},"page":"75-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":62,"title":["Gentle flow control"],"prefix":"10.1145","author":[{"given":"Kun","family":"Qian","sequence":"first","affiliation":[{"name":"Tsinghua University"}]},{"given":"Wenxue","family":"Cheng","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Tong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Fengyuan","family":"Ren","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]}],"member":"320","published-online":{"date-parts":[[2019,8,19]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402967"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/223982.224431"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/645606.661017"},{"key":"e_1_3_2_2_4_1","unstructured":"InfiniBand Trade Association. 2015. InfiniBand architecture specification: release 1.3. (2015). https:\/\/www.infinibandta.org\/ibta-specifications-download\/  InfiniBand Trade Association. 2015. InfiniBand architecture specification: release 1.3. (2015). https:\/\/www.infinibandta.org\/ibta-specifications-download\/"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2810640"},{"key":"e_1_3_2_2_6_1","volume-title":"Data networks","author":"Bertsekas Dimitri P","unstructured":"Dimitri P Bertsekas , Robert G Gallager , and Pierre Humblet . 1992. Data networks . Vol. 2 . Prentice-Hall International New Jersey . Dimitri P Bertsekas, Robert G Gallager, and Pierre Humblet. 1992. Data networks. Vol. 2. Prentice-Hall International New Jersey."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.324567"},{"key":"e_1_3_2_2_8_1","unstructured":"BroadCom. 2004. 10GBASE-T Coding and Modulation: 128-DSQ + LDPC. (2004). http:\/\/www.ieee802.org\/3\/an\/public\/sep04\/ungerboeck_2_0904.pdf  BroadCom. 2004. 10GBASE-T Coding and Modulation: 128-DSQ + LDPC. (2004). http:\/\/www.ieee802.org\/3\/an\/public\/sep04\/ungerboeck_2_0904.pdf"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485962"},{"key":"e_1_3_2_2_10_1","unstructured":"Cisco. 2015. Priority Flow Control: Build Reliable Layer 2 Infrastructure. (2015). https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/switches\/nexus-7000-series-switches\/white_paper_c11-542809.pdf  Cisco. 2015. Priority Flow Control: Build Reliable Layer 2 Infrastructure. (2015). https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/switches\/nexus-7000-series-switches\/white_paper_c11-542809.pdf"},{"key":"e_1_3_2_2_11_1","unstructured":"Cisco. 2016. Cisco Nexus 3000 Series Switches. (2016). https:\/\/www.cisco.com\/c\/en\/us\/products\/switches\/nexus-3000-series-switches\/index.html  Cisco. 2016. Cisco Nexus 3000 Series Switches. (2016). https:\/\/www.cisco.com\/c\/en\/us\/products\/switches\/nexus-3000-series-switches\/index.html"},{"key":"e_1_3_2_2_12_1","unstructured":"Cisco. 2019. rate-limit-interface. (2019). https:\/\/www.oreilly.com\/library\/view\/cisco-ios-in\/0596008694\/re712.html  Cisco. 2019. rate-limit-interface. (2019). https:\/\/www.oreilly.com\/library\/view\/cisco-ios-in\/0596008694\/re712.html"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.219761"},{"key":"e_1_3_2_2_14_1","volume-title":"Seitz","author":"Dally William J.","year":"1988","unstructured":"William J. Dally and Charles L . Seitz . 1988 . Deadlock-free message routing in multiprocessor interconnection networks. (1988). William J. Dally and Charles L. Seitz. 1988. Deadlock-free message routing in multiprocessor interconnection networks. (1988)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2011.65"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.250114"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.970556"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.190"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2012.46"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094691"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/139669.140384"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934908"},{"key":"e_1_3_2_2_23_1","unstructured":"Peter Hoose. 2015. Managing monitoring and troubleshooting large scale networks. (2015). http:\/\/ces-nanog64.blogspot.com\/2015\/06\/monitoring-managing-and-troubleshooting.html  Peter Hoose. 2015. Managing monitoring and troubleshooting large scale networks. (2015). http:\/\/ces-nanog64.blogspot.com\/2015\/06\/monitoring-managing-and-troubleshooting.html"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005760"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143382"},{"key":"e_1_3_2_2_26_1","volume-title":"https:\/\/1.ieee802.org\/dcb\/802-1qau\/","author":"Congestion Notification IEEE.","year":"2010","unstructured":"IEEE. 2010. 802.1Qau - Congestion Notification . ( 2010 ). https:\/\/1.ieee802.org\/dcb\/802-1qau\/ IEEE. 2010. 802.1Qau - Congestion Notification. (2010). https:\/\/1.ieee802.org\/dcb\/802-1qau\/"},{"key":"e_1_3_2_2_27_1","volume-title":"https:\/\/1.ieee802.org\/dcb\/802-1qbb\/","author":"Qbb IEEE.","year":"2010","unstructured":"IEEE. 2010. IEEE802.1 Qbb . ( 2010 ). https:\/\/1.ieee802.org\/dcb\/802-1qbb\/ IEEE. 2010. IEEE802.1 Qbb. (2010). https:\/\/1.ieee802.org\/dcb\/802-1qbb\/"},{"key":"e_1_3_2_2_28_1","unstructured":"IEEE. 2013. Data Center Bridging Task Group. (2013). http:\/\/www.ieee802.org\/1\/pages\/dcbridges.html  IEEE. 2013. Data Center Bridging Task Group. (2013). http:\/\/www.ieee802.org\/1\/pages\/dcbridges.html"},{"key":"e_1_3_2_2_29_1","unstructured":"INCITS. 2019. T11 Home Page. (2019). http:\/\/www.t11.org\/index.html  INCITS. 2019. T11 Home Page. (2019). http:\/\/www.t11.org\/index.html"},{"key":"e_1_3_2_2_30_1","unstructured":"Intel. 2019. DPDK. (2019). http:\/\/dpdk.org\/  Intel. 2019. DPDK. (2019). http:\/\/dpdk.org\/"},{"key":"e_1_3_2_2_31_1","volume-title":"https:\/\/github.com\/DPDK\/dpdk\/tree\/master\/app\/test-pipeline","year":"2019","unstructured":"Intel. 2019. Test-pipeline. ( 2019 ). https:\/\/github.com\/DPDK\/dpdk\/tree\/master\/app\/test-pipeline Intel. 2019. Test-pipeline. (2019). https:\/\/github.com\/DPDK\/dpdk\/tree\/master\/app\/test-pipeline"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626307"},{"key":"e_1_3_2_2_33_1","volume-title":"https:\/\/www.juniper.net\/documentation\/en_US\/junos\/topics\/reference\/configuration-statement\/bandwidth-limit-edit-firewall-policer.html","year":"2019","unstructured":"Juniper. 2019. Bandwidth-limit (Policer). ( 2019 ). https:\/\/www.juniper.net\/documentation\/en_US\/junos\/topics\/reference\/configuration-statement\/bandwidth-limit-edit-firewall-policer.html Juniper. 2019. Bandwidth-limit (Policer). (2019). https:\/\/www.juniper.net\/documentation\/en_US\/junos\/topics\/reference\/configuration-statement\/bandwidth-limit-edit-firewall-policer.html"},{"key":"e_1_3_2_2_34_1","unstructured":"Juniper. 2019. Class of Service Feature Guide for EX Series Switches (Except EX4600 and EX9200 Switches). (2019). https:\/\/www.juniper.net\/documentation\/en_US\/junos\/information-products\/pathway-pages\/ex-series\/cos-ex-series.html  Juniper. 2019. Class of Service Feature Guide for EX Series Switches (Except EX4600 and EX9200 Switches). (2019). https:\/\/www.juniper.net\/documentation\/en_US\/junos\/information-products\/pathway-pages\/ex-series\/cos-ex-series.html"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.820434"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/822079.822719"},{"key":"e_1_3_2_2_37_1","unstructured":"David Maltz. 2016. Keeping Cloud-Scale Networks Healthy. (2016). https:\/\/video.mtgsf.com\/video\/4f277939-73f5-4ce8-aba1-3da70ec19345  David Maltz. 2016. Keeping Cloud-Scale Networks Healthy. (2016). https:\/\/video.mtgsf.com\/video\/4f277939-73f5-4ce8-aba1-3da70ec19345"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/645533.656528"},{"key":"e_1_3_2_2_39_1","unstructured":"Mellanox. 2019. 4th Generation Server & Storage Adapter Architecture. (2019). http:\/\/www.mellanox.com\/related-docs\/prod_architecture\/PB_ConnectX_Architecture_Brochure.pdf  Mellanox. 2019. 4th Generation Server & Storage Adapter Architecture. (2019). http:\/\/www.mellanox.com\/related-docs\/prod_architecture\/PB_ConnectX_Architecture_Brochure.pdf"},{"key":"e_1_3_2_2_40_1","unstructured":"Mellanox. 2019. InfiniBand White paper. (2019). http:\/\/www.mellanox.com\/page\/white_papers  Mellanox. 2019. InfiniBand White paper. (2019). http:\/\/www.mellanox.com\/page\/white_papers"},{"key":"e_1_3_2_2_41_1","unstructured":"Mellanox. 2019. Interconnect Your Future. (2019). https:\/\/www.mellanox.com\/related-docs\/solutions\/hpc\/TOP500-January-2019.pdf  Mellanox. 2019. Interconnect Your Future. (2019). https:\/\/www.mellanox.com\/related-docs\/solutions\/hpc\/TOP500-January-2019.pdf"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787510"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230557"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592575"},{"key":"e_1_3_2_2_45_1","volume-title":"https:\/\/www.omnetpp.org\/","year":"2019","unstructured":"OMNET++. 2019. OMNET++ homepage. ( 2019 ). https:\/\/www.omnetpp.org\/ OMNET++. 2019. OMNET++ homepage. (2019). https:\/\/www.omnetpp.org\/"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/850940.852882"},{"key":"e_1_3_2_2_47_1","volume-title":"SENIC: Scalable NIC for End-Host Rate Limiting. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI' 14)","author":"Radhakrishnan Sivasankar","year":"2014","unstructured":"Sivasankar Radhakrishnan , Yilong Geng , Vimalkumar Jeyakumar , Abdul Kabbani , George Porter , and Amin Vahdat . 2014 . SENIC: Scalable NIC for End-Host Rate Limiting. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI' 14) . 475--488. Sivasankar Radhakrishnan, Yilong Geng, Vimalkumar Jeyakumar, Abdul Kabbani, George Porter, and Amin Vahdat. 2014. SENIC: Scalable NIC for End-Host Rate Limiting. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI' 14). 475--488."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00064"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2010.65"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2004.28"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.105178"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005768"},{"key":"e_1_3_2_2_53_1","volume-title":"Peter Baer Galvin, and Greg Gagne","author":"Silberschatz Abraham","year":"2014","unstructured":"Abraham Silberschatz , Peter Baer Galvin, and Greg Gagne . 2014 . Operating system concepts essentials. John Wiley & Sons , Inc. Abraham Silberschatz, Peter Baer Galvin, and Greg Gagne. 2014. Operating system concepts essentials. John Wiley & Sons, Inc."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/645610.661560"},{"key":"e_1_3_2_2_55_1","volume-title":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications (INFOCOM '16)","author":"Stephens Brent","unstructured":"Brent Stephens and Alan L. Cox . 2016. Deadlock-free local fast failover for arbitrary data center networks . In IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications (INFOCOM '16) . IEEE, 1--9. Brent Stephens and Alan L. Cox. 2016. Deadlock-free local fast failover for arbitrary data center networks. In IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications (INFOCOM '16). IEEE, 1--9."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848121"},{"key":"e_1_3_2_2_57_1","volume-title":"Let It Flow: Resilient Asymmetric Load Balancing with Flowlet Switching. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17)","author":"Vanini Erico","year":"2017","unstructured":"Erico Vanini , Rong Pan , Mohammad Alizadeh , Parvin Taheri , and Tom Edsall . 2017 . Let It Flow: Resilient Asymmetric Load Balancing with Flowlet Switching. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17) . USENIX Association, Boston, MA, 407--420. Erico Vanini, Rong Pan, Mohammad Alizadeh, Parvin Taheri, and Tom Edsall. 2017. Let It Flow: Resilient Asymmetric Load Balancing with Flowlet Switching. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). USENIX Association, Boston, MA, 407--420."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1228511"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787484"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787483"}],"event":{"name":"SIGCOMM '19: ACM SIGCOMM 2019 Conference","location":"Beijing China","acronym":"SIGCOMM '19","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM Special Interest Group on Data Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341302.3342065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341302.3342065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:56Z","timestamp":1750201976000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341302.3342065"}},"subtitle":["avoiding deadlock in lossless networks"],"short-title":[],"issued":{"date-parts":[[2019,8,19]]},"references-count":60,"alternative-id":["10.1145\/3341302.3342065","10.1145\/3341302"],"URL":"https:\/\/doi.org\/10.1145\/3341302.3342065","relation":{},"subject":[],"published":{"date-parts":[[2019,8,19]]},"assertion":[{"value":"2019-08-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}