308,128 research outputs found

    A One Health Evaluation of the Southern African Centre for Infectious Disease Surveillance

    Get PDF
    Rooted in the recognition that emerging infectious diseases occur at the interface of human, animal, and ecosystem health, the Southern African Centre for Infectious Disease Surveillance (SACIDS) initiative aims to promote a trans-sectoral approach to address better infectious disease risk management in five countries of the Southern African Development Community. Nine years after SACIDS’ inception, this study aimed to evaluate the program by applying a One Health (OH) evaluation framework developed by the Network for Evaluation of One Health (NEOH). The evaluation included a description of the context and the initiative, illustration of the theory of change, identification of outputs and outcomes, and assessment of the One Healthness. The latter is the sum of characteristics that defines an integrated approach and includes OH thinking, OH planning, OH working, sharing infrastructure, learning infrastructure, and systemic organization. The protocols made available by NEOH were used to develop data collection protocols and identify the study design. The framework relies on a mixed methods approach by combining a descriptive and qualitative assessment with a semi-quantitative evaluation (scoring). Data for the analysis were gathered during a document review, in group and individual interviews and in an online survey. Operational aspects (i.e., OH thinking, planning, and working) were found to be balanced overall with the highest score in the planning dimension, whereas the infrastructure (learning infrastructure, systemic organization, and sharing infrastructure) was high for the first two dimensions, but low for sharing. The OH index calculated was 0.359, and the OH ratio calculated was 1.495. The program was praised for its great innovative energy in a difficult landscape dominated by poor infrastructure and its ability to create awareness for OH and enthuse people for the concept; training of people and networking. Shortcomings were identified regarding the balance of contributions, funds and activities across member countries in the South, lack of data sharing, unequal allocation of resources, top-down management structures, and limited horizontal collaboration. Despite these challenges, SACIDS is perceived to be an effective agent in tackling infectious diseases in an integrated manner

    Deliverable JRA1.1: Evaluation of current network control and management planes for multi-domain network infrastructure

    Get PDF
    This deliverable includes a compilation and evaluation of available control and management architectures and protocols applicable to a multilayer infrastructure in a multi-domain Virtual Network environment.The scope of this deliverable is mainly focused on the virtualisation of the resources within a network and at processing nodes. The virtualization of the FEDERICA infrastructure allows the provisioning of its available resources to users by means of FEDERICA slices. A slice is seen by the user as a real physical network under his/her domain, however it maps to a logical partition (a virtual instance) of the physical FEDERICA resources. A slice is built to exhibit to the highest degree all the principles applicable to a physical network (isolation, reproducibility, manageability, ...). Currently, there are no standard definitions available for network virtualization or its associated architectures. Therefore, this deliverable proposes the Virtual Network layer architecture and evaluates a set of Management- and Control Planes that can be used for the partitioning and virtualization of the FEDERICA network resources. This evaluation has been performed taking into account an initial set of FEDERICA requirements; a possible extension of the selected tools will be evaluated in future deliverables. The studies described in this deliverable define the virtual architecture of the FEDERICA infrastructure. During this activity, the need has been recognised to establish a new set of basic definitions (taxonomy) for the building blocks that compose the so-called slice, i.e. the virtual network instantiation (which is virtual with regard to the abstracted view made of the building blocks of the FEDERICA infrastructure) and its architectural plane representation. These definitions will be established as a common nomenclature for the FEDERICA project. Other important aspects when defining a new architecture are the user requirements. It is crucial that the resulting architecture fits the demands that users may have. Since this deliverable has been produced at the same time as the contact process with users, made by the project activities related to the Use Case definitions, JRA1 has proposed a set of basic Use Cases to be considered as starting point for its internal studies. When researchers want to experiment with their developments, they need not only network resources on their slices, but also a slice of the processing resources. These processing slice resources are understood as virtual machine instances that users can use to make them behave as software routers or end nodes, on which to download the software protocols or applications they have produced and want to assess in a realistic environment. Hence, this deliverable also studies the APIs of several virtual machine management software products in order to identify which best suits FEDERICA’s needs.Postprint (published version

    Fully distributed mobility management scheme for future heterogeneous wireless networks

    Get PDF
    Mobile network operators urgently need to scalable and reliable mobility management solutions to cope with the explosive increase of the mobile users and internet traffic. Although the network-based PMIPv6 protocol is considered the favorable solution to solve the problems of host-based MIP protocol, these protocols are based on centralized mobility management CMM scheme. Current mobility solutions posing several challenges due to heavily centralized architecture. Furthermore, the future 5G networks are based on flat infrastructures to reduce the load in the network core. The distributed mobility management DMM scheme is introduced recently to overcome the problems of CMM. Additionally, to maintain the heterogeneity of future wireless networks, IEEE 802.21 Media Independent Handover (MIH) framework identifies the structure and services to provide seamless handover in heterogeneous networks. In this paper, we develop an efficient network-based fully DMM scheme based on the cross layer design of layer 2 MIH and layer 3 PMIPv6 protocols. The proposed approach removes any central anchor node in the network infrastructure and also eliminates any layer 2 and layer 3 signaling between the mobile node and the access networks. The numerical evaluation shows that the efficient approach gives enhance handover performance in terms of signaling cost, handover latency, and packet loss

    Bio-Inspired Tools for a Distributed Wireless Sensor Network Operating System

    Get PDF
    The problem which I address in this thesis is to find a way to organise and manage a network of wireless sensor nodes using a minimal amount of communication. To find a solution I explore the use of Bio-inspired protocols to enable WSN management while maintaining a low communication overhead. Wireless Sensor Networks (WSNs) are loosely coupled distributed systems comprised of low-resource, battery powered sensor nodes. The largest problem with WSN management is that communication is the largest consumer of a sensor node’s energy. WSN management systems need to use as little communication as possible to prolong their operational lifetimes. This is the Wireless Sensor Network Management Problem. This problem is compounded because current WSN management systems glue together unrelated protocols to provide system services causing inter-protocol interference. Bio-inspired protocols provide a good solution because they enable the nodes to self-organise, use local area communication, and can combine their communication in an intelligent way with minimal increase in communication. I present a combined protocol and MAC scheduler to enable multiple service protocols to function in a WSN at the same time without causing inter-protocol interference. The scheduler is throughput optimal as long as the communication requirements of all of the protocols remain within the communication capacity of the network. I show that the scheduler improves a dissemination protocol’s performance by 35%. A bio-inspired synchronisation service is presented which enables wireless sensor nodes to self organise and provide a time service. Evaluation of the protocol shows an 80% saving in communication over similar bio-inspired synchronisation approaches. I then add an information dissemination protocol, without significantly increasing communication. This is achieved through the ability of our bio-inspired algorithms to combine their communication in an intelligent way so that they are able to offer multiple services without requiring a great deal of inter-node communication.Open Acces

    On Cloud-based multisource Reliable Multicast Transport in Broadband Multimedia Satellite Networks

    Get PDF
    Multimedia synchronization, Software Over the Air, Personal Information Management on Cloud networks require new reliable protocols, which reduce the traffic load in the core and edge network. This work shows via simulations the performance of an efficient multicast file delivery, which advantage of the distributed file storage in Cloud computing. The performance evaluation focuses on the case of a personal satellite equipment with error prone channels

    Standardized monitoring of Rangifer health during International Polar Year

    Get PDF
    Monitoring of individual animal health indices in wildlife populations can be a powerful tool for evaluation of population health, detecting changes, and informing management decisions. Standardized monitoring allows robust comparisons within and across populations, and over time and vast geographic regions. As an International Polar Year Initiative, the CircumArctic Rangifer Monitoring and Assessment network established field protocols for standardized monitoring of caribou and reindeer (Rangifer tarandus) health, which included body condition, contaminants, and pathogen exposure and abundance. To facilitate use of the protocols, training sessions were held, additional resources were developed, and language was translated where needed. From March 2007 to September 2010, at least 1206 animals from 16 circumpolar herds were sampled in the field using the protocols. Four main levels of sampling were done and ranged from basic to comprehensive sampling. Possible sources of sampling error were noted by network members early in the process and protocols were modified or supplemented with additional visual resources to improve clarity when needed. This is the first time that such broad and comprehensive circumpolar sampling of migratory caribou and wild reindeer, using standardized protocols covering both body condition and parasite disease status, has been done

    A managed clinical network for cardiac services: set-up, operation and impact on patient care

    Get PDF
    PURPOSE: To investigate the set up and operation of a Managed Clinical Network for cardiac services and assess its impact on patient care. METHODS: This single case study used process evaluation with observational before and after comparison of indicators of quality of care and costs. The study was conducted in Dumfries and Galloway, Scotland and used a three-level framework. Process evaluation of the network set-up and operation through a documentary review of minutes; guidelines and protocols; transcripts of fourteen semi-structured interviews with health service personnel including senior managers, general practitioners, nurses, cardiologists and members of the public. Outcome evaluation of the impact of the network through interrupted time series analysis of clinical data of 202 patients aged less than 76 years admitted to hospital with a confirmed myocardial infarction one-year pre and one-year post, the establishment of the network. The main outcome measures were differences between indicators of quality of care targeted by network protocols. Economic evaluation of the transaction costs of the set-up and operation of the network and the resource costs of the clinical care of the 202 myocardial infarction patients from the time of hospital admission to 6 months post discharge through interrupted time series analysis. The outcome measure was different in National Health Service resource use. RESULTS: Despite early difficulties, the network was successful in bringing together clinicians, patients and managers to redesign services, exhibiting most features of good network management. The role of the energetic lead clinician was crucial, but the network took time to develop and ‘bed down’. Its primary “modus operand” was the development of a myocardial infarction pathway and associated protocols. Of sixteen clinical care indicators, two improved significantly following the launch of the network and nine showed improvements, which were not statistically significant. There was no difference in resource use. DISCUSSION AND CONCLUSIONS: The Managed Clinical Network made a difference to ways of working, particularly in breaching traditional boundaries and involving the public, and made modest changes in patient care. However, it required a two-year “set-up” period. Managed clinical networks are complex initiatives with an increasing profile in health care policy. This study suggests that they require energetic leadership and improvements are likely to be slow and incremental

    Security for network services delivery of 5G enabled device-to-device communications mobile network

    Get PDF
    The increase in mobile traffic led to the development of Fifth Generation (5G) mobile network. 5G will provide Ultra Reliable Low Latency Communication (URLLC), Massive Machine Type Communication (mMTC), enhanced Mobile Broadband (eMBB). Device-to-Device (D2D) communications will be used as the underlaying technology to offload traffic from 5G Core Network (5GC) and push content closer to User Equipment (UE). It will be supported by a variety of Network Service (NS) such as Content-Centric Networking (CCN) that will provide access to other services and deliver content-based services. However, this raises new security and delivery challenges. Therefore, research was conducted to address the security issues in delivering NS in 5G enabled D2D communications network. To support D2D communications in 5G, this thesis introduces a Network Services Delivery (NSD) framework defining an integrated system model. It incorporates Cloud Radio Access Network (C-RAN) architecture, D2D communications, and CCN to support 5G’s objectives in Home Network (HN), roaming, and proximity scenarios. The research explores the security of 5G enabled D2D communications by conducting a comprehensive investigation on security threats. It analyses threats using Dolev Yao (DY) threat model and evaluates security requirements using a systematic approach based on X.805 security framework. Which aligns security requirements with network connectivity, service delivery, and sharing between entities. This analysis highlights the need for security mechanisms to provide security to NSD in an integrated system, to specify these security mechanisms, a security framework to address the security challenges at different levels of the system model is introduced. To align suitable security mechanisms, the research defines underlying security protocols to provide security at the network, service, and D2D levels. This research also explores 5G authentication protocols specified by the Third Generation Partnership Project (3GPP) for securing communication between UE and HN, checks the security guarantees of two 3GPP specified protocols, 5G-Authentication and Key Agreement (AKA) and 5G Extensive Authentication Protocol (EAP)-AKA’ that provide primary authentication at Network Access Security (NAC). The research addresses Service Level Security (SLS) by proposing Federated Identity Management (FIdM) model to integrate federated security in 5G, it also proposes three security protocols to provide secondary authentication and authorization of UE to Service Provider (SP). It also addresses D2D Service Security (DDS) by proposing two security protocols that secure the caching and sharing of services between two UEs in different D2D communications scenarios. All protocols in this research are verified for functional correctness and security guarantees using a formal method approach and semi-automated protocol verifier. The research conducts security properties and performance evaluation of the protocols for their effectiveness. It also presents how each proposed protocol provides an interface for an integrated, comprehensive security solution to secure communications for NSD in a 5G enabled D2D communications network. The main contributions of this research are the design and formal verification of security protocols. Performance evaluation is supplementary

    Modelling, Dimensioning and Optimization of 5G Communication Networks, Resources and Services

    Get PDF
    This reprint aims to collect state-of-the-art research contributions that address challenges in the emerging 5G networks design, dimensioning and optimization. Designing, dimensioning and optimization of communication networks resources and services have been an inseparable part of telecom network development. The latter must convey a large volume of traffic, providing service to traffic streams with highly differentiated requirements in terms of bit-rate and service time, required quality of service and quality of experience parameters. Such a communication infrastructure presents many important challenges, such as the study of necessary multi-layer cooperation, new protocols, performance evaluation of different network parts, low layer network design, network management and security issues, and new technologies in general, which will be discussed in this book
    corecore