
Cloud Continuum, looking for suitable hosts for pro-
cessing the requests along the way to reduce the
applications’ end-to-end delay. Simulated experi-
ments demonstrate that the proposed solution outper-
forms baseline strategies by 24x in terms of served
application requests without sacrificing the applica-
tions’ delay. In future work, we intend to explore
meta-heuristics and other optimization techniques to
find optimal in-transit application schedules within a
bounded time.
ACKNOWLEDGEMENTS
This work was financed in part by the Coordenac¸
˜
ao
de Aperfeic¸oamento de Pessoal de N
´
ıvel Superior
- Brasil (CAPES) – Finance Code 001. Also, this
work was partially funded by National Council for
Scientific and Technological Development (CNPq
404027/2021-0), Foundation for Research of the State
of Sao Paulo (FAPESP 2021/06981-0, 2021/00199-
8, 2020/05183-0), and Foundation for Research of
the State of Rio Grande do Sul (19/2551-0001266-7,
19/2551-0001224-1, 19/2551-0001689-1, 21/2551-
0000688-9).
REFERENCES
Baresi, L., Mendonc¸a, D. F., Garriga, M., Guinea, S., and
Quattrocchi, G. (2019). A unified model for the
mobile-edge-cloud continuum. ACM Transactions on
Internet Technology (TOIT), 19(2):1–21.
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., and
Brandic, I. (2009). Cloud computing and emerging
it platforms: Vision, hype, and reality for delivering
computing as the 5th utility. Future Generation com-
puter systems, 25(6):599–616.
Chiu, T.-C., Chung, W.-H., Pang, A.-C., Yu, Y.-J., and Yen,
P.-H. (2016). Ultra-low latency service provision in
5g fog-radio access networks. In 2016 IEEE 27th
Annual International Symposium on Personal, Indoor,
and Mobile Radio Communications (PIMRC), pages
1–6. IEEE.
Ding, D., Savi, M., Pederzolli, F., Campanella, M., and
Siracusa, D. (2021). In-network volumetric ddos
victim identification using programmable commodity
switches. IEEE Transactions on Network and Service
Management, 18(2):1191–1202.
Fortz, B. and Thorup, M. (2000). Internet traffic engineer-
ing by optimizing ospf weights. In Proceedings IEEE
INFOCOM 2000. Conference on Computer Commu-
nications. Nineteenth Annual Joint Conference of the
IEEE Computer and Communications Societies (Cat.
No.00CH37064), volume 2, pages 519–528 vol.2.
Friday, K., Kfoury, E., Bou-Harb, E., and Crichigno, J.
(2020). Towards a unified in-network ddos detection
and mitigation strategy. In 2020 6th IEEE Conference
on Network Softwarization (NetSoft), pages 218–226.
IEEE.
Gupta, H., Nath, S. B., Chakraborty, S., and Ghosh, S. K.
(2016). Sdfog: A software defined computing archi-
tecture for qos aware service orchestration over edge
devices. arXiv preprint arXiv:1609.01190.
Hohemberger, R., Castro, A. G., Vogt, F. G., Mansilha,
R. B., Lorenzon, A. F., Rossi, F. D., and Luizelli,
M. C. (2019). Orchestrating in-band data plane
telemetry with machine learning. IEEE Communica-
tions Letters, 23(12):2247–2251.
Jin, X., Li, X., Zhang, H., Soul
´
e, R., Lee, J., Foster, N.,
Kim, C., and Stoica, I. (2017). Netcache: Balancing
key-value stores with fast in-network caching. In Pro-
ceedings of the 26th Symposium on Operating Systems
Principles, pages 121–136.
Kannan, P. G., Joshi, R., and Chan, M. C. (2019). Pre-
cise time-synchronization in the data-plane using pro-
grammable switching asics. In Proceedings of the
2019 ACM Symposium on SDN Research, pages 8–20.
Kottur, S. Z., Kadiyala, K., Tammana, P., and Shah, R.
(2022). Implementing chacha based crypto primitives
on programmable smartnics. In Proceedings of the
ACM SIGCOMM Workshop on Formal Foundations
and Security of Programmable Network Infrastruc-
tures, pages 15–23.
Lee, J.-H. and Singh, K. (2020). Switchtree: in-network
computing and traffic analyses with random forests.
Neural Computing and Applications, pages 1–12.
Liao, Q., Marchenko, N., Hu, T., Kulics, P., and Ewe, L.
(2022). Haru: Haptic augmented reality-assisted user-
centric industrial network planning. In 2022 IEEE
Globecom Workshops (GC Wkshps), pages 389–394.
IEEE.
Mai, T., Yao, H., Guo, S., and Liu, Y. (2020). In-network
computing powered mobile edge: Toward high perfor-
mance industrial iot. IEEE network, 35(1):289–295.
Marques, J. A., Luizelli, M. C., Da Costa, R. I. T., and Gas-
pary, L. P. (2019). An optimization-based approach
for efficient network monitoring using in-band net-
work telemetry. Journal of Internet Services and Ap-
plications, (1):16.
Moreschini, S., Pecorelli, F., Li, X., Naz, S., H
¨
astbacka, D.,
and Taibi, D. (2022a). Cloud continuum: the defini-
tion. IEEE Access.
Moreschini, S., Pecorelli, F., Li, X., Naz, S., H
¨
astbacka, D.,
and Taibi, D. (2022b). Cloud continuum: The defini-
tion. IEEE Access, 10:131876–131886.
Panda, S., Feng, Y., Kulkarni, S. G., Ramakrishnan, K.,
Duffield, N., and Bhuyan, L. N. (2021). Smartwatch:
accurate traffic analysis and flow-state tracking for in-
trusion prevention using smartnics. In Proceedings of
the 17th International Conference on emerging Net-
working EXperiments and Technologies, pages 60–75.
Sankaran, G. C., Sivalingam, K. M., and Gondaliya, H.
(2021). P4 and netfpga based secure in-network com-
puting architecture for ai-enabled industrial internet of
things. IEEE Internet of Things Journal.
CLOSER 2023 - 13th International Conference on Cloud Computing and Services Science
98