{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T01:24:50Z","timestamp":1769045090581,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,8]]},"DOI":"10.1145\/3718958.3750515","type":"proceedings-article","created":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:54:11Z","timestamp":1756313651000},"page":"541-553","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["ByteTracker: An Agentless and Real-time Path-aware Network Probing System"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0542-8281","authenticated-orcid":false,"given":"Shixian","family":"Guo","sequence":"first","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5874-6610","authenticated-orcid":false,"given":"Kefei","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5981-8742","authenticated-orcid":false,"given":"Yulin","family":"Lai","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1201-3293","authenticated-orcid":false,"given":"Yangyang","family":"Bai","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6860-7929","authenticated-orcid":false,"given":"Ziwei","family":"Zhao","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6814-9829","authenticated-orcid":false,"given":"Songlin","family":"Liu","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2121-5838","authenticated-orcid":false,"given":"Jianghang","family":"Ning","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8656-6462","authenticated-orcid":false,"given":"Gen","family":"Li","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-7267-4316","authenticated-orcid":false,"given":"Jianwei","family":"Hu","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8576-9109","authenticated-orcid":false,"given":"Yongbin","family":"Dong","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2012-4658","authenticated-orcid":false,"given":"Feng","family":"Luo","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6381-7728","authenticated-orcid":false,"given":"Sisi","family":"Wen","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2549-1583","authenticated-orcid":false,"given":"Qi","family":"Zhang","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8149-4441","authenticated-orcid":false,"given":"Yuan","family":"Chen","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1915-4665","authenticated-orcid":false,"given":"Jiale","family":"Feng","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6416-0074","authenticated-orcid":false,"given":"Yang","family":"Bai","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2124-9565","authenticated-orcid":false,"given":"Chengcai","family":"Yao","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4865-229X","authenticated-orcid":false,"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4837-8355","authenticated-orcid":false,"given":"Xin","family":"Hu","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1092-8855","authenticated-orcid":false,"given":"Yang","family":"Lv","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6144-7899","authenticated-orcid":false,"given":"Zhuo","family":"Jiang","sequence":"additional","affiliation":[{"name":"ByteDance China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5614-3420","authenticated-orcid":false,"given":"Jiao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3545-1122","authenticated-orcid":false,"given":"Tao","family":"Huang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2025. Libpcap. http:\/\/www.tcpdump.org\/."},{"key":"e_1_3_2_1_2_1","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Arzani Behnaz","year":"2018","unstructured":"Behnaz Arzani, Selim Ciraci, Luiz Chamon, Yibo Zhu, Hongqiang Harry Liu, Jitu Padhye, Boon Thau Loo, and Geoff Outhred. 2018. 007: Democratically Finding the Cause of Packet Drops. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). 419\u2013435."},{"key":"e_1_3_2_1_3_1","volume-title":"Empowering Azure Storage with RDMA. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Bai Wei","year":"2023","unstructured":"Wei Bai, Shanim Sainul Abdeen, Ankit Agrawal, Krishan Kumar Attre, Paramvir Bahl, Ameya Bhagat, Gowri Bhaskara, Tanya Brokhman, Lei Cao, Ahmad Cheema, et al. 2023. Empowering Azure Storage with RDMA. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). 49\u201367."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405894"},{"key":"e_1_3_2_1_5_1","unstructured":"Broadcom. 2017. Trident 3 Dynamic Load Balancing. https:\/\/www.broadcom.com\/video\/6328983519112."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535375"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644924"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672256"},{"key":"e_1_3_2_1_9_1","volume-title":"Evolution of Aegis: Fault Diagnosis for AI Model Training Service in Production. In 22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25)","author":"Dong Jianbo","year":"2025","unstructured":"Jianbo Dong, Kun Qian, Pengcheng Zhang, Zhilong Zheng, Liang Chen, Fei Feng, Yichi Xu, Yikai Zhu, Gang Lu, Xue Li, et al. 2025. Evolution of Aegis: Fault Diagnosis for AI Model Training Service in Production. In 22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25). 865\u2013881."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.885460"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405851"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026895"},{"key":"e_1_3_2_1_13_1","unstructured":"M Foschiano et al. 2015. Cisco systems' encapsulated remote switch port analyzer (ERSPAN). draft-foschiano-erspan-00. txt Tech. Rep (2015)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672233"},{"key":"e_1_3_2_1_15_1","volume-title":"When Cloud Storage Meets RDMA. In 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21)","author":"Gao Yixiao","year":"2021","unstructured":"Yixiao Gao, Qiang Li, Lingbo Tang, Yongqing Xi, Pengcheng Zhang, Wenwen Peng, Bo Li, Yaohui Wu, Shaozong Liu, Lei Yan, et al. 2021. When Cloud Storage Meets RDMA. In 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21). 519\u2013533."},{"key":"e_1_3_2_1_16_1","volume-title":"Inference and Measurement in Data Center Networks. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Geng Yilong","year":"2019","unstructured":"Yilong Geng, Shiyu Liu, Zi Yin, Ashish Naik, Balaji Prabhakar, Mendel Rosenblum, and Amin Vahdat. 2019. SIMON: A Simple and Scalable Method for Sensing, Inference and Measurement in Data Center Networks. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). 549\u2013564."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934908"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787496"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230555"},{"key":"e_1_3_2_1_20_1","volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Handigol Nikhil","year":"2014","unstructured":"Nikhil Handigol, Brandon Heller, Vimalkumar Jeyakumar, David Mazi\u00e8res, and Nick McKeown. 2014. I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). 71\u201385."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405877"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452335.1452343"},{"key":"e_1_3_2_1_23_1","volume-title":"21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24)","author":"Jiang Ziheng","year":"2024","unstructured":"Ziheng Jiang, Haibin Lin, Yinmin Zhong, Qi Huang, Yangrui Chen, Zhi Zhang, Yanghua Peng, Xiang Li, Cong Xie, Shibiao Nong, et al. 2024. MegaScale: Scaling Large Language Model Training to More Than 10,000 GPUs. In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). 745\u2013760."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604827"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672264"},{"key":"e_1_3_2_1_26_1","volume-title":"X-RDMA: Effective RDMA Middleware in Large-scale Production Environments. In 2019 IEEE International Conference on Cluster Computing (CLUSTER). IEEE, 1\u201312","author":"Ma Teng","year":"2019","unstructured":"Teng Ma, Tao Ma, Zhuo Song, Jingxuan Li, Huaixin Chang, Kang Chen, Hai Jiang, and Yongwei Wu. 2019. X-RDMA: Effective RDMA Middleware in Large-scale Production Environments. In 2019 IEEE International Conference on Cluster Computing (CLUSTER). IEEE, 1\u201312."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Mallik Mahalingam Dinesh Dutt Kenneth Duda Puneet Agarwal Lawrence Kreeger T Sridhar Mike Bursell and Chris Wright. 2014. Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks. Technical Report.","DOI":"10.17487\/rfc7348"},{"key":"e_1_3_2_1_28_1","unstructured":"Meta. 2016. NetNORAD: Troubleshooting Networks via End-to-end Probing. https:\/\/engineering.fb.com\/2016\/02\/18\/core-infra\/netnorad-troubleshooting-networks-via-end-to-end-probing\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934879"},{"key":"e_1_3_2_1_30_1","unstructured":"NVIDIA. 2023. NVIDIA InfiniBand Adaptive Routing Technology\u2014Accelerating HPC and AI Applications. https:\/\/resources.nvidia.com\/en-us-cloud-native-supercomputing-dpus-campaign\/infiniband-white-paper-adaptive-routing."},{"key":"e_1_3_2_1_31_1","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Peng Yanghua","year":"2017","unstructured":"Yanghua Peng, Ji Yang, Chuan Wu, Chuanxiong Guo, Chengchen Hu, and Zongpeng Li. 2017. deTector: a Topology-aware Monitoring System for Data Center Networks. In 2017 USENIX Annual Technical Conference (USENIX ATC 17). 55\u201368."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672265"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626310"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the Internet Measurement Conference","author":"Roy Arjun","year":"2018","unstructured":"Arjun Roy, Deepak Bansal, David Brumley, Harish Kumar Chandrappa, Parag Sharma, Rishabh Tewari, Behnaz Arzani, and Alex C Snoeren. 2018. Cloud Datacenter SDN Monitoring: Experiences and Challenges. In Proceedings of the Internet Measurement Conference 2018. 464\u2013470."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"William Simpson. 1995. IP in IP Tunneling. Technical Report.","DOI":"10.17487\/rfc1853"},{"key":"e_1_3_2_1_36_1","volume-title":"NetBouncer: Active Device and Link Failure Localization in Data Center Networks. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Tan Cheng","year":"2019","unstructured":"Cheng Tan, Ze Jin, Chuanxiong Guo, Tianrong Zhang, Haitao Wu, Karl Deng, Dongming Bi, and Dong Xiang. 2019. NetBouncer: Active Device and Link Failure Localization in Data Center Networks. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). 599\u2013614."},{"key":"e_1_3_2_1_37_1","volume-title":"Closed-loop Network Performance Monitoring and Diagnosis with SpiderMon. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Wang Weitao","year":"2022","unstructured":"Weitao Wang, Xinyu Crystal Wu, Praveen Tammana, Ang Chen, and TS Eugene Ng. 2022. Closed-loop Network Performance Monitoring and Diagnosis with SpiderMon. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). 267\u2013285."},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication. 561\u2013575","author":"Yang Tong","year":"2018","unstructured":"Tong Yang, Jie Jiang, Peng Liu, Qun Huang, Junzhi Gong, Yang Zhou, Rui Miao, Xiaoming Li, and Steve Uhlig. 2018. Elastic Sketch: Adaptive and Fast Networkwide Measurements. In Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication. 561\u2013575."},{"key":"e_1_3_2_1_39_1","volume-title":"16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Yu Da","year":"2019","unstructured":"Da Yu, Yibo Zhu, Behnaz Arzani, Rodrigo Fonseca, Tianrong Zhang, Karl Deng, and Lihua Yuan. 2019. dShark: A General, Easy to Program and Scalable Framework for Analyzing In-network Packet Traces. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). 207\u2013220."},{"key":"e_1_3_2_1_40_1","volume-title":"In-band Telemetry System Using Sketchlets. In 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21)","author":"Zhao Yikai","year":"2021","unstructured":"Yikai Zhao, Kaicheng Yang, Zirui Liu, Tong Yang, Li Chen, Shiyi Liu, Naiqian Zheng, Ruixin Wang, Hanbo Wu, Yi Wang, et al. 2021. LightGuardian: A Full-Visibility, Lightweight, In-band Telemetry System Using Sketchlets. In 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21). 991\u20131010."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672236"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406214"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555050.3569116"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787483"}],"event":{"name":"SIGCOMM '25: ACM SIGCOMM 2025 Conference","location":"S\u00e3o Francisco Convent Coimbra Portugal","acronym":"SIGCOMM '25","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2025 Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3718958.3750515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:57:13Z","timestamp":1756313833000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3718958.3750515"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,27]]},"references-count":44,"alternative-id":["10.1145\/3718958.3750515","10.1145\/3718958"],"URL":"https:\/\/doi.org\/10.1145\/3718958.3750515","relation":{},"subject":[],"published":{"date-parts":[[2025,8,27]]},"assertion":[{"value":"2025-08-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}