Eryk Schiller

Eryk Schiller
University of Zurich | UZH · Department of Informatics - IFI

PhD in Computer Science

About

53
Publications
15,394
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
684
Citations
Additional affiliations
December 2010 - August 2014
Université de Neuchâtel
Position
  • PostDoc Position
October 2006 - July 2010
University of Grenoble
Position
  • PhD Student
October 2006 - July 2010
Grenoble Institute of Technology
Position
  • PhD Student
Education
October 2006 - July 2010
University of Grenoble
Field of study
  • Computer Science
October 2002 - September 2007
Jagiellonian University
Field of study
  • Theoretical Physics
October 2001 - July 2006
AGH University of Science and Technology in Kraków
Field of study
  • Electronics and Telecommunications

Publications

Publications (53)
Article
Full-text available
The last two decades have experienced a steady rise in the production and deployment of sensing-and-connectivity-enabled electronic devices, replacing “regular” physical objects. The resulting Internet-of-Things (IoT) will soon become indispensable for many application domains. Smart objects are continuously being integrated within factories, citie...
Article
Full-text available
Cloud Radio Access Networks (Cloud-RANs) have recently emerged as a promising architecture to meet the increasing demands and expectations of future wireless networks. Such an architecture can enable dynamic and flexible network operations to address significant challenges, such as higher mobile traffic volumes and increasing network operation cost...
Article
Full-text available
While wireless sensor networks (WSN) offer potential, their limited programmability and energy limitations determine operational challenges. Thus, a TinyIPFIX-based system was designed such that this application layer protocol is now used to exchange data in WSNs efficiently. The new prototype is based on the Espressif ESP32-WROOM-32D Internet-of-T...
Conference Paper
Full-text available
This work specifies, implements, and evaluates access management based on face recognition. The system developed uses Internet-of-Things (IoT) for video surveillance, Artificial Intelligence (AI) for face recognition, and Blockchains (BC) for immutable permanent storage and provides excellent properties in terms of image quality, end-to-end delay,...
Chapter
Blockchains (BC) serve as a chain of transactions persisted as backward-linked lists, while being created and maintained within a network of distributed nodes. Potential advances with BCs have reached various application areas beyond FinTech-oriented use cases. Since Internet-of-Things (IoT) based use cases being an important part of them, this cha...
Conference Paper
Full-text available
While Wireless Sensor Networks (WSN) offer potentials , their limited programmability and energy-limitations determine operational challenges. Thus, a TinyIPFIX-based system was designed, such that this application layer protocol is now usable to exchange data in WSNs efficiently. The system implementation in MicroPython is simple and efficient in...
Chapter
Full-text available
This chapter classifies communication technologies employed in the Internet-of-Things (IoT) as infrastructure, data, transport, discovery, messaging, and management protocol families as well as semantics and frameworks. Moreover, IoT networks are divided into IP and Constrained Networks with the latter not directly supporting the Transmission Contr...
Conference Paper
Full-text available
This work develops an integration of Blockchains (BC) with the Internet-of-Things (IoT) using a highly constrained TelosB IoT platform based on the MSP430 processor family and CC2420 IEEE 802.15.4-compliant radio interfaces. The system is evaluated in an indoor office environment focusing on overhead and energy efficiency of BC transaction (TX) tra...
Data
This is a pre-recorded presentation of a paper presented by Eryk Schiller at the 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob20). The paper entitled Design and Evaluation of an SDR-based LoRa Cloud Radio Access Network was presented on Day Two of the conference (October 13, 2020) within Sessio...
Conference Paper
Full-text available
Long Range (LoRa) defines a popular modulation scheme based on the chirp spread spectrum technique. It is used in Low Power Wide Area Networks (LP-WANs) for the Internet-of-Things (IoT). Thus, this work here designs, specifies, implements, and evaluates a Cloud Radio Access Network (C-RAN) architecture for LoRa networks, while using (a) Software De...
Conference Paper
In Industry 4.0 (I4), the Industrial Internet of Things (I2oT) data streams are prone to significant data manipulation risks. The integration of Blockchains (BC) with I2oT may become a solution preventing from this problem. This paper provides a blockchain-agnostic Blockchain I2oT (BI2oT) architecture called BIIT that allows developing a broad rang...
Conference Paper
L-SCN is a two-layered Service-Centric Networking (SCN) architecture. The L-SCN design splits the network into domains and specifies communication protocols for service provider information propagation. Nodes in a domain receive substantial knowledge about the available resources (e.g., CPU, RAM) and available services within the domain, while the...
Conference Paper
This paper studies various methods that improve the performance of Blockchain systems integrated with the Internet of Things (BIoT) using the LoRaWAN access method. Duty Cycle Enforcement (DCE) and Listen Before Talk (LBT) mechanisms as the channel access methods, Automatic Repeat reQuest (ARQ) on the Transport Layer, and transaction aggregation on...
Chapter
Full-text available
This paper presents a new video delivery scheme in mobile networks using Multi-Access Edge Computing (MEC). Our goal is to improve the quality of video streaming experienced by the mobile video consumer. Our approach is based upon Dynamic Adaptive Streaming over HTTP. We present a novel algorithm, which uses information obtained from the Radio Netw...
Conference Paper
Full-text available
Proof-of-Work (PoW) in Blockchains (BC), which is a widely used consensus algorithm, suffers from high power consumption of miners and low transaction rates. This work demonstrates a Proof-of-Stake (PoS)-based BC called Bazo, which is specially designed and adapted for Internet of Things (IoT) data streams. Bazo displays enhanced performance in ter...
Conference Paper
Service-Centric Networking (SCN) is a Future In-ternet architecture extending ICN with support for services, in which addressing and routing centers around services. SCN provides session support, however, recovery mechanisms do not exist in SCN session management. Therefore, SCN sessions suffer from link and node failures. In this paper, we present...
Conference Paper
Service-Centric Networking (SCN) is a future Internet paradigm derived from Information-Centric Networking (ICN). SCN extends the ICN paradigm with service support. In SCN, services are the key component of the network. In this paper, we design a novel intra-domain routing architecture by integrating an extended version of the Named-data Link State...
Article
This paper presents and evaluates the first open-source Network Function Virtualization (NFV)/Software Defined Networking (SDN)-based Mobile Edge Computing (MEC) platform. Our platform solves the Mobile Edge (ME) management issues with respect to Application (App) provisioning and traffic management. First, the ME Apps are managed as Virtual Networ...
Chapter
Commoditization and virtualization of wireless networks are changing the economics of mobile networks to help network providers, e.g. Mobile Network Operator (MNO), Mobile Virtual Network Operator (MVNO), move from proprietary and bespoke hardware and software platforms towards an open, cost-effective, and flexible cellular ecosystem. In addition,...
Article
Full-text available
Autonomic Communications aims to provide Quality-of-Service (QoS) in networks using self-management mechanisms. It inherits many characteristics from Autonomic Computing, in particular, when communication systems are running as specialized applications in Software-Defined Networking (SDN) and Network Function Virtualization (NFV) enabled cloud envi...
Article
The upcoming 5G ecosystem is envisioned to build business-driven Network Slices to accommodate the different needs of divergent service types, applications and services in support of vertical industries. In this paper, we describe the Network Slicing concept, by unveiling a novel Network Slicing architecture for integrated 5G communications. Furthe...
Conference Paper
Full-text available
Service-Centric Networking (SCN) is a concept derived from Information-Centric Networks (ICN). In SCN, the service is in the center of the architectural design. Current efforts of SCN focus on design enhancements and the derivation of new components providing new functionality. In this article, we present session support for services in SCN. Our de...
Article
Abstract Online data acquisition, data assimilation and integrated hydrological modelling have become more and more important in hydrological science. In this study, we explore cloud computing for integrating field data acquisition and stochastic, physically-based hydrological modelling in a data assimilation and optimisation framework as a service...
Chapter
Full-text available
Long-Term Evolution (LTE) is a new communication standard developed by the Third Generation Partnership Project (3GPP). Currently, LTE is becoming a 4G reference architecture due to its widespread adoption among leading operators of mobile telecommunications. LTE is therefore foreseen as an important foundation for future 5G networks. In the shift...
Conference Paper
In this paper, we present L-SCN, a new routing architecture for Service-Centric Networking (SCN), which makes use of a two-layer forwarding scheme composed of inter-domain and intra-domain communication. Unlike existing SCN routing architectures relying on a flat organization, our design splits the network into domains. Nodes within a domain posses...
Article
Cloud computing enables the on-demand delivery of resources for a multitude of services and gives the opportunity for small agile companies to compete with large industries. In the telco world, cloud computing is currently mostly used by Mobile Network Operators (MNO) for hosting non-critical support services and selling cloud services such as appl...
Conference Paper
Full-text available
Nous proposons WEAVE, un protocole de routage géographique 2D/3D reposant sur l'utilisation de points d'étapes, waypoints, et de points de passage, checkpoints, pour acheminer le trafic à destination. Les noeuds obtiennent leur information de routage à partir de traces partielles collectées dans les paquets relayés et utilisent un système de points...
Conference Paper
In this work, we present novel Architectural Design Patterns towards open, cloud-based 5G communications. We provide a brief classification of technologies that cannot be ignored in the design process of 5G systems and illustrate how a new technological added value can be created, when current methodologies, design paradigms, as well as design patt...
Conference Paper
Full-text available
We propose WEAVE, a geographical 2D/3D routing protocol that maintains information on a small number of waypoints and checkpoints for forwarding packets to any destination. Nodes obtain the routing information from partial traces gathered in incoming packets and use a system of checkpoints along with the segments of routes to weave end-to-end paths...
Conference Paper
Full-text available
Often, there is a particular type of applications in different scientific domains, i.e. non-interactive long-running computationally intensive applications. Cloud-computing looks as a perfect environment for executing this type of applications. In this paper, we present a system, which exploits advantages of the cloud-computing environment and offe...
Conference Paper
Full-text available
Commoditization and virtualization of wireless networks are changing the economics of mobile networks to help network providers (e.g., MNO, MVNO) move from proprietary and bespoke hardware and software platforms toward an open, cost-effective, and flexible cellular ecosystem. In addition, rich and innovative local services can be efficiently create...
Conference Paper
Full-text available
In this paper, we present a revolutionary vision of 5G networks, in which SDN programs wireless network functions, and where Mobile Network Operators (MNO), Enterprises, and Over-The-Top (OTT) third parties are provided with NFV-ready Network Store. The proposed Network Store serves as a digital distribution platform of programmable Virtualized Net...
Conference Paper
Full-text available
Cloudification of the Centralized-Radio Access Network (C-RAN) in which signal processing runs on general purpose processors inside virtual machines has lately received significant attention. Due to short deadlines in the LTE frequency division duplex access method, processing time fluctuations introduced by the virtualization process have a deep i...
Conference Paper
Full-text available
This paper describes a general architecture of a cloud integrated solution for implementing tailored use-cases of various research communities. A successful implementation of a hydrogeological modeler deployed in the cloud proves the potential of the architecture. The knowledge and experience gathered throughout the hydro-geological use-case allow...
Technical Report
Full-text available
Cloudification of the Centralized-Radio Access Network (C-RAN), in which signal processing runs on general purpose processors inside virtual machines, has lately received significant attention. Due to short deadlines in the LTE Frequency Division Duplex access method, processing time fluctuations introduced by the virtualization process have a deep...
Conference Paper
This paper describes an architecture for real-time environmental modeling. It consists of a wireless mesh network equipped with sensors and a cloud-based infrastructure to perform real-time environmental simulations using a physics-based model combined with an Ensemble Kalman Filter. The purpose of the system is to optimize groundwater abstraction...
Conference Paper
Full-text available
Predicting the influence of drinking water pumping on stream and groundwater levels is essential for sustainable water management. Given the highly dynamic nature of such systems any quantitative analysis must be based on robust and reliable modeling and simulation approaches. The paper presents a wireless mesh-network framework for environmental r...
Article
Full-text available
In this position paper we describe the current status and plans for a Swiss National Research Infrastructure. Swiss academic and research institutions are very autonomous. While being loosely coupled, they do not rely on any centralized management entities. Therefore, a coordinated national research infrastructure can only be established by federat...
Article
Full-text available
Peer-to-peer systems represent a radical shift from the classical client-server paradigm in which a centralized server processes requests from all clients. In a peer-to-peer (P2P) system, every “peer” can play the role of a client and a server at the same time, hence sharing responsibilities among all parties. As in practice some peers or connectin...
Chapter
Predicting the influence of drinking water pumping on stream and groundwater levels is essential for sustainable water management. Given the highly dynamic nature of such systems any quantitative analysis must be based on robust and reliable modeling and simulation approaches. The paper presents a wireless mesh-network framework for environmental r...
Chapter
In this position paper, we describe the current status and plans for a Swiss National Research Infrastructure. Swiss academic and research institutions are very autonomous. While being loosely coupled, they do not rely on any centralized management entities. A coordinated national research infrastructure can only be established by federating the lo...
Conference Paper
Full-text available
JBoss Application Server (AS) uses java.io and the Apache Portable Runtime (APR) project to provide its HTTP connectors. Due to new features of upcoming specifications of the Java Enterprise Edition (Java EE), the existing connectors shall be replaced by modern non blocking Input/Outputs (I/Os). In this study, we review some modern I/O frameworks s...
Conference Paper
In this position paper, we describe the current status and plans for a Swiss National Research Infrastructure. Swiss academic and research institutions are very autonomous. While being loosely coupled, they do not rely on any centralized management entities. A coordinated national research infrastructure can only be established by federating the va...
Article
Full-text available
Developments in A4-Mesh have turned wireless mesh networks into a valuable technology for Swiss institutions of higher education. Large numbers of research projects in different areas, like climate research and geology, will profit from an easily deployable outdoor wireless network that also supports mechanisms for authentication, authorization, a...
Conference Paper
Full-text available
We present the basic architectural elements of the Captive Portal integrating Shibboleth based Authentication, Authorization, Accounting and Auditing into Wireless Mesh Networks. The Captive Portal is built upon the SWITCHaai/Shibboleth architecture especially designed to protect web based services. The architecture is secure, eavesdropping protect...
Article
Full-text available
In this thesis, we investigate new aspects of addressing and routing in Spontaneous Wireless Mesh Networks (WMN). Spontaneous wireless mesh networks promise a completely different architecture of the future Internet in comparison with its current state, but there are still many problems that have to be solved prior to the WMNs deployment. For examp...
Conference Paper
Full-text available
In this paper, we study the problem of designing propagation protocols for network-wide localization based on two-way ranging. At the beginning, a network contains a few localized anchor nodes and a large number unlocalized nodes. Unlocalized nodes in the communication range of anchor nodes perform two-way ranging, estimate their positions, and bec...
Conference Paper
Full-text available
We present a novel geographical routing scheme for spontaneous wireless mesh networks. Greedy geographical routing has many advantages, but suffers from packet losses occurring at the border of voids. In this paper, we propose a flexible greedy routing scheme that can be adapted to any variant of geographical routing and works for any connectivity...
Conference Paper
Full-text available
We propose Binary Waypoint Routing, a novel geographical routing protocol for wireless mesh networks. Its idea is to learn and maintain source routes to a small number of nodes called binary waypoints that are placed in subspaces con- structed as a result of binary space partitioning. A source node sends a packet to a waypoint for a given destinati...
Conference Paper
Full-text available
We analyze greedy geographical routing in spontaneous wireless mesh networks to show several interesting properties. First, we can approximate the dependence of packet loss probability on the mean node rank with a Fermi-Dirac function. When the mesh network grows, it becomes opaque to packets regardless of the average node rank. We also show that p...
Conference Paper
Full-text available
In this paper, we consider spontaneous wireless mesh networks that can provide wide coverage connectivity to mobile nodes. Our mobility scheme builds upon separation between a persistent node identifier and its current address. When joining the mesh, a mobile node associates with a mesh router that updates a location service managed in the mesh as...

Questions

Question (1)
Question
I started playing with NS-3. I created a small simulation setup attached with TCP in WiFi. I ran the simulation, and I realized that the congestion window at the TCP sender is always growing, while the WiFi-mac-queue is always about 42 or 43 packets (for one client station).
Does anyone have an explanation for this?

Network

Cited By

Projects

Projects (3)
Project
Work on Blockchains covers a range of different aspects. Work at the CSG includes the exploitation of various technical, optimization, and application facets, which typically results always in an operational prototype.
Project
Advancing physically-based flow simulations of alluvial systems through the integration of unconventional observations, data assimilation and cloud computing
Project
The main objectives of the project can be summarized in the following: Provide a truly open and highly configurable experimental facility that uses LTE resources. Fully integrate the LTE resources with existing FIRE infrastructure. Create the circumstances for innovation in the field of 4G networks.