Harald Øverby
Spesialrådgiver
Utdanning
Spesialrådgiver
Utdanning
Artikkel Håkon Lønsethagen, Stanislav Lange, Thomas Zinner, Harald Øverby, Luis M. Contreras, Nicola Ciulli, Emmanuel Dotaro (2023)
The visions of 5G and Beyond (B5G) imply unprecedented expectations toward high-performing connectivity services in both public and private networks. Connectivity services that offer performance guarantees along multiple Quality of Service (QoS) dimensions are partially available today, but are confined to (virtual) private network services. However, open and equal access to public and Internet-scale Specialized Connectivity Services (SCS) delivered on-demand does not exist. This is especially true for interconnections across networks and support for mixed traffic modes that go beyond traditional best-effort. In this article, we argue that this is a huge industrial and societal problem that needs a solution. However, this problem is highly complex and multi-faceted, and there are many reasons why we are essentially locked into the status quo. We identify the stumbling blocks and propose a set of solution elements to take us across these hurdles, alongside related research topics. This includes an approach to “Multi-Level Best-Effort (MLBE)” and suggestions for evolving net neutrality regulation. Models and simulations show how a mixed traffic mode approach provides anticipated benefits, and we provide arguments why the context brought by B5G will put us into conditions for change, allowing public SCS eventually at a global scale.
Artikkel Mazaher Kianpour, Stewart James Kowalski, Harald Øverby (2022)
This paper presents an agent-based model of cybersecurity as a participatory public good. Ineffective cybersecurity measures pose serious threats and risks to the development and stability of information societies in the world. Various doctrines and thesis explore how this domain should be treated by the public and private stakeholders. One of these doctrines is cybersecurity as a public good. In this paper, we highlight divergent views about the type of cybersecurity as an economic good. Then, the paper proposes an agent-based simulation model of a repeated public goods game among a set of defenders that are in an uncertain environment with incomplete and imperfect information. In the model, defenders have a probability to choose contribution or being a free-rider, depending on their own preferences and facing with revealed preferences of other defenders. This model implements a utility maximization that applies to each individual, modeling the existence of free-riders, punishments, and interdependency of decisions under a polycentric governance structure. The results of this simulation model show that, over time, defenders update their preferences in reaction to the behavior of other defenders and the experience of cyber-attacks. They indicate a high level of contribution to the provision of cybersecurity as a public good and the effectiveness of decentralized punishment on increasing the contributions. The consistency of the pattern of our results across different empirical studies lends us some reassurance that our model behavior is in quantitative agreement with empirical macro-structures. Furthermore, implementation of a polycentric structure challenges all the relevant agents to take action, and provides more robust environment.
Artikkel Harald Øverby, Jan Arild Audestad, Gabriel Szalkowski (2022)
Compartmental models are widely used in epidemiology, engineering, and physics to describe the temporal behavior of complex systems. This paper presents how compartmental models may be applied to the digital economy—more specifically, how the Bass model can be extended to more complex economics systems such as markets with customer churning, competition, multisided platforms, and online games. It is demonstrated that it is straightforward to establish the equations describing the various economic systems under study, however, the equations are often too complex to be solved analytically in the general case. Though the paper presents simple and idealized cases, the solutions may, nevertheless, uncover important strategic aspects that otherwise may be hidden by complexity in the general case, for example, the reasons for slow initial market growth. The paper also discusses how the developed models may be used to evaluate digital economic market evolution and business policy.
Oversiktsartikkel Mazaher Kianpour, Stewart James Kowalski, Harald Øverby (2021)
Insights in the field of cybersecurity economics empower decision makers to make informed decisions that improve their evaluation and management of situations that may lead to catastrophic consequences and threaten the sustainability of digital ecosystems. By drawing on these insights, cybersecurity practitioners have been able to respond to many complex problems that have emerged within the context of cybersecurity over the last two decades. The academic field of cybersecurity economics is highly interdisciplinary since it combines core findings and tools from disciplines such as sociology, psychology, law, political science, and computer science. This study aims to develop an extensive and consistent survey based on a literature review and publicly available reports. This review contributes by aggregating the available knowledge from 28 studies, out of a collection of 628 scholarly articles, to answer five specific research questions. The focus is how identified topics have been conceptualized and studied variously. This review shows that most of the cybersecurity economics models are transitioning from unrealistic, unverifiable, or highly simplified fundamental premises toward dynamic, stochastic, and generalizable models.
Artikkel Mazaher Kianpour, Stewart James Kowalski, Harald Øverby (2021)
In cybersecurity economics, the selection of a particular methodology is a matter of interest and importance for the researchers. Methodologically sophisticated research forms an essential basis for understanding the challenges and opportunities for the richer descriptions of the behavior of cybersecurity practitioners (i.e., what they are doing and why they are doing it). This requires a broad and self-reflective approach to understand the use of a technique in socio-technical research within cybersecurity economics. Such understanding recognizes that research in this field involves more than just applying a method to create knowledge and diffuse it throughout society, organizations, and governments. This paper argues in favor of a multi-paradigmatic approach to cybersecurity economics research. Rather than adopting a single paradigm, this study suggests that results will be more prosperous and reliable if different methods from different existing paradigms are combined. Hence, it puts forward the desirability and feasibility of the multi-paradigmatic approach in cybersecurity economics research. It also outlines several practical guidelines that help design multi-paradigmatic research studies. These are illustrated with a critical evaluation of three examples of studies.
Kapittel Harald Øverby (2021)
Artikkel Harald Øverby, Jan A. Audestad (2021)
The multisided platform (MSP) is an essential business construct in the digital economy. Some of the largest companies in the world—including Google, Amazon, and eBay—exploit the MSP in their business models. Fundamental insights into the MSP are crucial to understand the business operations of the digital economy and how new innovative digital services are adopted in the market. The MSP ecosystem is complex and dynamic, and involves heterogeneous stakeholders with different business motivations. This paper classifies the various types of MSPs, distinguished by the network effect between user groups. Moreover, this paper shows how the original diffusion model of Frank Bass can be extended to analyze the temporal evolution of multisided platforms. Analytical models using coupled sets of ordinary differential equations are developed for several examples of two-sided platforms. For some of these examples, analytical solutions are found.
Kapittel Ricard Vilalta, Raul Munoz, Ramon Cassellas, Ricardo Martinez, Victor Lopez, Oscar González de Dios, Antonio Pastor, Georgios Katsikas, Felix Klaedtke, Paolo Monti, ... (2021) Alberto Mozo, Thomas Erich Zinner, Harald Øverby, Sergio Gonzalez-Diaz, Håkon Lønsethagen, José-Miguel Pulido, Daniel King (2021) Vis alle forfattere
TeraFlow proposes a new type of secure, cloud-native Software Defined Networking (SDN) controller that will radically advance the state-of-the-art in beyond 5G networks by introducing novel micro-services architecture, and provide revolutionary features for both flow management (service layer) and optical/microwave network equipment integration (infras-tructure layer) by adapting new data models. TeraFlow will also incorporate security using Machine Learning (ML) and forensic evidence for multi-tenancy based on Distributed Ledgers. Finally, this new SDN controller shall be able to integrate with the current Network Function Virtualization (NFV) and Multi-access Edge Computing (MEC) frameworks as well as to other networks. The target pool of TeraFlow stakeholders expands beyond the traditional telecom operators towards edge and hyperscale cloud providers.
Artikkel Mazaher Kianpour, Stewart James Kowalski, Harald Øverby, Erjon Zoto (2020)
Artikkel Harald Øverby (2019)
Artikkel Mazaher Kianpour, Harald Øverby, Stewart James Kowalski, Christopher Frantz (2019)
The most costly cybersecurity incidents for organizations result from the failures of their third parties. This means that organizations should not only invest in their own protection and cybersecurity measures, but also pay attention to that of their business and operational partners. While economic impact and real extent of third parties cybersecurity risks is hard to quantify, decision makers inevitably compare their decisions with other entities in their network. This paper presents a theoretically derived model to analyze the impact of social preferences and other factors on the willingness to cooperate in third party ecosystems. We hypothesize that willingness to cooperate among the organizations in the context of cybersecurity increases following the experience of cybersecurity attacks and increased perceived cybersecurity risks. The effects are mediated by perceived cybersecurity value and moderated by social preferences. These hypotheses are tested using a variance-based structural equation modeling analysis based on feedback from a sample of Norwegian organizations. Our empirical results confirm the strong positive impact of social preferences and cybersecurity attack experience on the willingness to cooperate, and support the reciprocal behavior of cybersecurity decision makers. We further show that more perception of cybersecurity risk and value deter the decision makers to cooperate with other organizations.
Artikkel Shuo Li, Eric W M Wong, Harald Øverby, Moshe Zukerman (2019)
In bufferless optical burst/packet switched (OBS/OPS) networks, data (bursts or packets) may be lost due to contention or equipment failure. Diversity coding-based path protection schemes can be used to protect data from a single-trunk failure with potentially more efficient resource utilization compared to dedicated (e.g., 1 + 1) path protection schemes and help reduce the burst/packet loss ratio. This paper provides a scalable and accurate burst/packet loss ratio approximation based on the Erlang fixed-point approximation for networks that employ protection based on diversity coding and for networks that employ protection based on both diversity coding and 1 + 1 path protection. We use discrete event simulations to assess the accuracy of the approximation based on a wide range of scenarios in a 10-node circular lattice and NSFNet networks. Further, we discuss the effect of parameter settings and the effect of the choice of the wavelength selection method on the accuracy of the approximation. We consider scenarios without wavelength conversion and with full wavelength conversion and two types of users: premium and regular. The premium users, typically of mission critical services, receive protection while the regular users do not. We compare diversity coding and 1 + 1 path protection in a 10-node circular lattice network. The results show that for this example network, for the premium users and under low traffic load, the burst/packet loss ratio in OBS/OPS networks is lower for diversity coding compared to 1 + 1 path protection. However, under heavy traffic load, we observe a lower loss ratio for the case of 1 + 1 path protection.
Kapittel Mazaher Kianpour, Stewart James Kowalski, Erjon Zoto, Christopher Frantz, Harald Øverby (2019)
Appropriate training is an effective solution to tackle the evolving threat landscape and conflicts in the cyber domain and to fulfill security requirements. Serious games demonstrate pedagogic effectiveness in this field, however, they need to comply with national, organizational, and individual strategies and characteristics. These games provide the players, individually or in groups, with an opportunity to develop their adversarial and system thinking skills to set up effective defenses. To this end, in this paper, we propose a framework for designing serious games that raise security awareness. The proposed framework considers the complex nature of the cyber domain, the knowledge and motivation of participants, and the experiential learning using cyber ranges. The framework is based on existing frameworks, and integrates their advantages to form a comprehensive framework. Future research should refine the framework and design serious games to evaluate its effectiveness in producing desired end results.
Artikkel Harald Øverby, Jan Arild Audestad (2019)
Kapittel Harald Øverby (2018)
Network effects are one of the defining properties of the digital economy. It has been shown, both in theory and practice, that network effects contribute to the growth and potential success of businesses in the digital economy. In this paper, we present a quantitative case study of network effects in Facebook for the period 2011 to 2017. We estimate the value of Facebook, and analyse how this value depends on the number of Facebook users. Our results show that there are strong network effects in Facebook, as the value per user increases more than estimations obtained from Metcalfe's law. We also outline a general theory of the strength of network effects, and quantitatively estimate the strength of network effects in Facebook.
Artikkel Katina Kralevska, Danilo Gligoroski, Rune Erlend Jensen, Harald Øverby (2018)
Minimum-Storage Regenerating (MSR) codes have emerged as a viable alternative to Reed-Solomon (RS) codes as they minimize the repair bandwidth while they are still optimal in terms of reliability and storage overhead. Although several MSR constructions exist, so far they have not been practically implemented mainly due to the big number of I/O operations. In this paper, we analyze high-rate MDS codes that are simultaneously optimized in terms of storage, reliability, I/O operations, and repair-bandwidth for single and multiple failures of the systematic nodes. The codes were recently introduced in [1] without any specific name. Due to the resemblance between the hashtag sign # and the procedure of the code construction, we call them in this paper HashTag Erasure Codes (HTECs) . HTECs provide the lowest data-read and data-transfer, and thus the lowest repair time for an arbitrary sub-packetization level α , where α≤r⌈k/r⌉ , among all existing MDS codes for distributed storage including MSR codes. The repair process is linear and highly parallel. Additionally, we show that HTECs are the first high-rate MDS codes that reduce the repair bandwidth for more than one failure. Practical implementations of HTECs in Hadoop release 3.0.0-alpha2 demonstrate their great potentials.
Artikkel Shuo Li, Meiqian Wang, Eric W M Wong, Harald Øverby, Moshe Zukerman (2016)
Artikkel Gergely Biczok, Yanling Chen, Katina Kralevska, Harald Øverby (2016)
Akademisk bok Jarernsri L. Mitrpanont, Abdul Samad Haji Ismail, Harald Øverby, Keiichi Kaneko (2016)
Artikkel Katina Kralevska, Danilo Gligoroski, Harald Øverby (2016)
Kapittel Katina Kralevska, Danilo Gligoroski, Harald Øverby (2016)
We introduce a family of balanced locally repairable codes (BLRCs) [n, k, d] for arbitrary values of n, k and d. Similar to other locally repairable codes (LRCs), the presented codes are suitable for applications that require a low repair locality. The novelty that we introduce in our construction is that we relax the strict requirement the repair locality to be a fixed small number I, and we allow the repair locality to be either I or I + 1. This gives us the flexibility to construct BLRCs for arbitrary values of n and k which partially solves the open problem of finding a general construction of LRCs. Additionally, the relaxed locality criteria gives us an opportunity to search for BLRCs that have a low repair locality even when double failures occur. We use metrics such as a storage overhead, an average repair bandwidth, a Mean Time To Data Loss (MTTDL) and an update complexity to compare the performance of BLRCs with existing LRCs.
Artikkel Elisabeth Idland, Harald Øverby, Jan Arild Audestad (2015)
Artikkel Shuo Li, Meiqian Wang, Harald Øverby, Eric Wong, Moshe Zukerman (2015)
Kapittel Katina Kralevska, Harald Øverby, Danilo Gligoroski (2015)
Kapittel Danilo Gligoroski, Katina Kralevska, Harald Øverby (2015)
Kapittel Katina Kralevska, Harald Øverby, Danilo Gligoroski (2014)
We introduce a method that combines joint balanced source and network coding in optical packet-switched networks. It is an efficient way to combat packet loss that occurs due to contentions, to recover lost data due to link failures and to provide secure data transmission, i.e., secrecy. By using binary erasure codes and adding redundancy the destination is able to decode the source data when packet loss occurs. Coding at the intermediate node offers protection against single link failure. An eavesdropper cannot reconstruct the source data by eavesdropping a single link, since non-systematic coded packets are sent on disjoint paths.We also show that the proposed method has linear coding complexity, small header overhead and it does not require sending a feedback for each packet.
Artikkel Michele Savi, Harald Øverby, Norvald Stol, Carla Raffaelli (2014)
Artikkel Katina Kralevska, Zoran Hadzi-Velkov, Harald Øverby (2014)
Kapittel Shuna Yang, Norvald Stol, Harald Øverby (2013)
Kapittel Michele Savi, Harald Øvreby, Norvald Stol, Carla Raffaelli (2013)
Artikkel Katina Kralevska, Danilo Gligoroski, Harald Øverby (2013)
Artikkel Mauritz Panggabean, Leif Arne Rønningen, Harald Øverby (2013)
Artikkel Peter Babarczi, Gergely Biczok, Harald Øverby, janos tapolcai, P Soproni (2013)
Artikkel Mauritz Panggabean, Maciej Wielgosz, Harald Øverby, Leif Arne Rønningen (2013)
Kapittel Harald Øverby, Gergely Biczok, Jan Arild Audestad (2012)
Kapittel Shuna Yang, Norvald Stol, Harald Øverby (2012)
Kapittel Michele Savi, Norvald Stol, Harald Øverby, Carla Raffaelli (2012)
Kapittel Michele Savi, Norvald Stol, Harald Øverby, Carla Raffaelli (2012)
Kapittel Martin Falck-Ytter, Harald Øverby (2012)
Artikkel Harald Øverby, Gergely Biczok, Peter Babarczi, janos tapolcai (2012)
Artikkel Gergely Biczok, Harald Øverby (2011)
Artikkel Harald Øverby (2011)
Artikkel Andreas Kimsas, Steinar Bjørnstad, Harald Øverby, Norvald Stol (2010)
Kapittel Andreas Kimsas, Harald Øverby, Norvald Stol (2009)
Kapittel Harald Øverby (2009)
Artikkel Harald Øverby (2009)
Artikkel Harald Øverby (2008)
Artikkel Harald Øverby (2007)
Kapittel Andreas Kimsas, Steinar Bjørnstad, Harald Øverby, Norvald Stol (2007)
Artikkel Harald Øverby (2007)
Kapittel Harald Øverby (2006)
Artikkel Harald Øverby (2006)
Kapittel Norvald Stol, Harald Øverby, Steinar Bjørnstad, Andreas Kimsås, Anders Mykkeltveit (2006)
Kapittel Harald Øverby (2006)
Kapittel Harald Øverby (2006)
Kapittel Harald Øverby (2006)
Kapittel Harald Øverby (2006)
Kapittel Andreas Kimsås, Steinar Bjørnstad, Harald Øverby, Norvald Stol (2006)
Kapittel Andreas Kimsås, Harald Øverby, Steinar Bjørnstad, Norvald Stol (2006)
Artikkel Harald Øverby, Norvald Stol, Martin Nord (2006)
Kapittel Andreas Kimsås, Harald Øverby, Steinar Bjørnstad, Vegard Larsen Tuft (2006)
Artikkel Harald Øverby, Norvald Stol (2006)
Kapittel Harald Øverby, Norvald Stol, Steinar Bjørnstad (2005)
Kapittel Harald Øverby (2005)
Artikkel Harald Øverby (2005)
Stochastic processes have been widely employed in order to assess the network layer performance of Optical Packet Switched (OPS) networks. In this paper we consider how the Engset traffic model may be applied to evaluate the blocking probability in asynchronous bufferless OPS networks. We present two types of the Engset traffic model, i.e. the Engset lost calls cleared traffic model and the Engset overflow traffic model. For both traffic models, the time-, call-, and traffic congestion are derived. A numerical study shows that the observed blocking probability is dependent on the choice of traffic model and performance metric.
Artikkel Harald Øverby, Norvald Stol (2005)
Kapittel Steinar Bjørnstad, Harald Øverby (2005)
Artikkel Harald Øverby (2005)
Kapittel Steinar Bjørnstad, Harald Øverby, Norvald Stol, Dag Roar Hjelme (2005)
Artikkel Jon Martin Arnemo, Morten Heim, Egil Ole Øen, Finn Berntsen, Bjarne Kvale, Øystein Os, Harald Øverby (2004)
I perioden 1976-2000 ble det utført i alt 1898 medikamentelle immobiliseringer av viltlevende elg i Norge. Tretten dyr(0,7 ? døde eller måtte avlives i tilslutning til innfangingen. Anbefalt metode for immobilisering av viltlevende elg i Norge er administrasjon av etorfin ved hjelp av injeksjonsvåpenfra helikopter på snødekt mark. Risikoen for mortalitet ved denne metoden er meget liten: kun åtte dyr (0,5 ? døde av i alt 1526 immobiliseringer foretatt fra 1984 til 2004. Dødsårsaker var drukning (én voksen ku og én voksen okse), respirasjonsstans etter intravaskulær injeksjon (én voksen ku), skade iryggmargen forårsaket av injeksjonspilen (én avmagret kalv med beinskjørhet og parasittær lungebetennelse) og respirasjonsstans forårsaket av en relativ overdosering (fire kalver i dårlig kondisjon). Standard dose for etorfin er 7,50 ? 9,00mg/voksen og 3,75 ?4,50 mg/kalv. Dyr som ikke har lagt seg innenti minutter etter første injeksjon, kan påskytes på nyttmed full dose. A total of 1,898 chemical immobilizations of free-rangingmoose (Alces alces) were carried out in Norway from 1976 to 2004. Thirteen animals (0.7 ? died or were euthanized. The recommended method for immobilization of free-ranging moose inNorway is darting from a helicopter with etorphine on snow-covered ground. The risk of mortality with this method is verylow, only eight animals (0.5 ? died during 1,526 captures from 1984 to 2004. Causes of mortality were drowning in one adult female and one adult male, respiratory arrest due to intravascular injection in an adult female, traumatic spinal lesions due to dart impact in the lumbar region in a cachectic calf with osteoporosis and verminous pneumonia, and respiratoryarrest due to relative overdosing in four calves in poor body condition. The standard doses of etorphine are 7.5-9.0 mg/animal in adults and 3.75-4.50 mg/animal in calves. Animals which are not down within ten minutes after initial darting canbe redarted with a full dose.
Artikkel Harald Øverby, Norvald Stol (2004)
Service differentiation is a crucial issue in the next-generation Optical Packet Switched networks. In this paper we examine how bursty traffic influences the performance of a service differentiated Optical Packet Switched network. By using time-continuous Markov chains, we derive explicit results for the packet loss rates in the case of a bursty hyper-exponential arrival process. Results indicate that the performance is degraded as the burstiness of the arrival process increases.
Artikkel Harald Øverby, Norvald Stol (2004)
In this paper we present an analytical model, which considers the effects of the switching time on the network performance in service differentiated Optical Packet/Burst Switched networks (OPS/OBS). Our results indicate that the switching time must be less than 10 % of the packet/burst duration in order to avoid any significant reductions in the network performance. Furthermore, regarding a network with full wavelength conversion, we show that the benefits of statistical resource sharing are almost non-existent for low priority traffic when the switching time is large.
Artikkel Martin Nord, Harald Øverby, Norvald Stol (2004)
Artikkel Harald Øverby, Norvald Stol (2004)
Optical Packet Switching (OPS) is a promising technology for future core networks due to the ability to handle bursty traffic, adaptability to changes in the network infrastructure and good network utilization. In order to provide sufficient Quality of Service (QoS) to the emerging range of real-time and critical business applications, service differentiation should be present in future OPS. This paper presents the Preemptive Drop Policy (PDP), which provides service differentiation in asynchronous bufferless OPS. Based on time-continuous Markov chains, we introduce an analytical model of the PDP for switches with and without wavelength conversion. We extend the PDP into the Adaptive PDP (APDP), which provides absolute QoS guarantees in OPS. Simulations performed validate our analytical model and show that the APDP operates properly in a dynamic changing system load scenario.
Artikkel Harald Øverby (2004)
A crucial issue in optical packet switched (OPS) networks is packet losses at the network layer caused by contentions. This paper presents the network layer packet redundancy scheme (NLPRS), which is a novel approach to reduce the end-to-end data packet loss rate in OPS networks. By introducing redundancy packets in the OPS network, the NLPRS enables a possible reconstruction of data packets that are lost due to contentions. An analytical model of the NLPRS based on reduced load Erlang fix-point analysis is presented. Simulations of an OPS ring network show that the NLPRS is in particular efficient in small networks operating at low system loads. Results also show how the arrival process, packet length distribution, network size and redundancy packet scheduling mechanism influence the NLPRS performance.
Kronikk Geir Egil Øien, Morten Breivik, Ragnar Hergum, Erling Ildstad, Maria Letizia Jaccheri, Einar Rønquist, Harald Øverby (2016)
Bok Harald Øverby, Henrik Dvergsdal (2012)
Internett er et globalt system av datamaskiner, smarttelefoner og andre digitale enheter som er koblet sammen gjennom et kommunikasjonsnett. Internett er en av de viktigste teknologiske innovasjonene og har stor betydning for den moderne økonomien, privatliv og samfunnet generelt.
Lærebok Harald Øverby, Jan Arild Audestad (2021)
Konferanseposter Mazaher Kianpour, Stewart James Kowalski, Harald Øverby, Erjon Zoto (2020)
Lærebok Harald Øverby, Jan Arild Audestad (2018)
Konferanseforedrag Harald Øverby (2018)
Konferanseposter Katina Kralevska, Danilo Gligoroski, Harald Øverby (2016)
Konferanseforedrag Elisabeth Idland, Harald Øverby, audestad Jan Arild (2015)
Konferanseforedrag Shuna Yang, Norvald Stol, Harald Øverby (2013)
Konferanseforedrag Harald Øverby (2012)
Konferanseforedrag Michele Savi, Norvald Stol, Harald Øverby, Carla Raffaelli (2012)
Konferanseforedrag Harald Øverby, Gergely Biczok, Jan Arild Audestad (2012)
Konferanseforedrag Michele Savi, Norvald Stol, Harald Øverby, Carla Raffaelli (2012)
Konferanseforedrag Shuna Yang, Norvald Stol, Harald Øverby (2012)
Konferanseforedrag Harald Øverby (2011)
Konferanseforedrag Gergely Biczok, Harald Øverby (2011)
Konferanseforedrag Harald Øverby (2009)
Konferanseforedrag Harald Øverby (2009)
Konferanseforedrag Harald Øverby (2009)
Konferanseforedrag Andreas Kimsas, Steinar Bjørnstad, Harald Øverby, Norvald Stol (2007)
Konferanseforedrag Norvald Stol, Harald Øverby, Steinar Bjørnstad, Andreas Kimsås, Anders Mykkeltveit (2006)
Konferanseforedrag Harald Øverby (2006)
Konferanseforedrag Andreas Kimsås, Steinar Bjørnstad, Harald Øverby, Norvald Stol (2006)
Rapport Martin Nord, Steinar Bjørnstad, Vegard Tuft, Andreas Kimsås, Dag Roar Hjelme, Lars Erik Eriksen, Torodd Olsen, Harald Øverby, Aasmund Sveinung Sudbø, Norvald Stol, ... (2006) Oddgeir Austad, Anne-Grete Kåråsen, Geir Millstein (2006) Vis alle forfattere
Konferanseforedrag Andreas Kimsås, Harald Øverby, Steinar Bjørnstad, Vegard Larsen Tuft (2006)
Konferanseforedrag Harald Øverby (2006)
Konferanseforedrag Andreas Kimsås, Harald Øverby, Steinar Bjørnstad, Norvald Stol (2006)
Konferanseforedrag Harald Øverby (2006)
Konferanseforedrag Andreas Kimsås, Steinar Bjørnstad, Harald Øverby, Vegard Larsen Tuft (2006)
Konferanseforedrag Harald Øverby (2006)
Konferanseforedrag Harald Øverby (2006)
Konferanseforedrag Harald Øverby (2005)
Konferanseforedrag Steinar Bjørnstad, Harald Øverby (2005)
Konferanseforedrag Harald Øverby, Norvald Stol, Steinar Bjørnstad (2005)
Konferanseforedrag Harald Øverby (2004)
Konferanseforedrag Astrid Undheim, Harald Øverby, Norvald Stol (2004)
Konferanseforedrag Harald Øverby (2004)
Konferanseforedrag Harald Øverby, Norvald Stol (2004)
Konferanseforedrag Harald Øverby, Norvald Stol (2004)
Konferanseforedrag Harald Øverby, Norvald Stol (2004)
Konferanseforedrag Tor K. Moseng, Harald Øverby, Norvald Stol (2004)
Konferanseforedrag Harald Øverby (2004)
Konferanseforedrag Harald Øverby, Norvald Stol (2003)
We present a teletraffic model of service differentiation in Optical Packet Switched networks. Electronic buffering is applied in order to reduce packet loss rate for low priority traffic. Analytical expressions and simulation results are reported.
Konferanseforedrag Harald Øverby (2003)
Konferanseforedrag Harald Øverby, Norvald Stol (2003)
This paper presents a formal teletraffic model for service differentiation in optical packet switched networks by utilizing the wavelength domain. Expressions for the time congestion are derived. Simulation results are also reported.
Konferanseforedrag Harald Øverby (2003)
This paper presents a novel adaptive service differentiation algorithm for Optical Packet Switched (OPS) networks. Previous research has aimed at presenting algorithms that achieves service differentiation in OPS networks by utilizing the wavelength domain. However, simulations show that these algorithms result inn fluctuating packet loss rate as the system load is varied. The adaptive algorithm proposed here measures the packet loss rate for high priority traffic over a time interval and adjusts the number of wavelength converters reserved for high priority traffic accordingly in order to achieve a constant packet loss rate. However, due to the self-similarity of the Internet traffic, special considerations must be taken into account in order to avoid oscillations in the number of wavelength converters reserved for high priority traffic.
Masteroppgave Harald Øverby (2002)
En-til-mange datadistribusjon vil si å distribuere data fra en avsender til flere mottaker. Dette kan realiseres ved bruk av unicast (distribusjon fra en avsender til en mottaker), men i mange tilfeller beslaglegger en slik løsning unødvendig mye båndbredde i nettet. To metoder som er mer besparende på båndbredde er broadcast (distribusjon fra en avsender til alle mottakere) og multicast (distribusjon fra en avsender til et subbsett mottakere). Broadcast og multicast har vært i utstrakt bruk for fastnett i lang tid, mens for mobilnett har vi sett en mindre utstrakt bruk. Broadcast og multicast forventes å bli benyttet mer i fremtiden, både i fastnett og spesielt mobilnett. Fra et teoretisk standpunkt er realiseringen av broadcast og multicast i GSM er relativt lik som for UMTS. I spesifikasjonen for GSM og UMTS eksisterer det ulike metoder for å håndtere broadcast og multicast. Det er hensiktsmessig å differensiere mellom lav og høy bitrate innen multicast og broadcast, for på den måten få metoder som er bedre tilpasset de ulike applikasjonene. For realisering av broadcast for lav bitrate i GSM kan man benytte Cell Broadcast Service (CBS). Denne tjenesten er en del av GSM-spesifikasjon, og er ment for nettopp broadcast av meldinger av lav bitrate. For UMTS eksisterer en tilsvarende tjeneste, Service Area Broadcast. For realisering av multicast for lav bitrate i GSM (og UMTS) kan blant annet Kryptert-CBS (K-CBS) og Dedikert-ID-CBS (DID-CBS) benyttes. K-CBS baserer seg på å kryptere meldinger som kringkastes med CBS. I DID-CBS får de MS som abonnerer på den aktuelle tjenesten spesiell tilgang til å motta CBS-meldinger gjennom predefinerte identifikatorer. For realisering av broadcast og multicast for høy bitrate kan man benytte Multicast / Broadcast Multimedia Service (MBMS) eller Mobil IP Multicast / Broadcast. Mens MBMS er definert i spesifikasjon for UMTS til å håndtere høy bitrate, kan Mobil IP Multicast / Broadcast sees på som en faktisk realisering av MBMS. Når en avsender distribuerer data til mottakere er det nyttig for avsender å få en tilbakemelding fra mottakerene. Denne tilbakemeldingen vil kunne si om dataene kom frem riktig, detektere om systemet virkelig fungerer, realisere taksering samt utføre analyser av nettet. For å realisere en slik tilbakemelding kan ulike kvitteringsmetoder benyttes, blant annet revers-multicast eller unicastbaserte metoder. De ulike metodene vil være tilpasset ulike kvalitetsverdier (QoS) som båndbredde og bitratefeil, slik at hver metode er tilpasset ulike typer nett. I heterogene nettsystemer er det viktig å bruke flere slike metoder for å få en optimal kvitteringsløsning. Wireless Application Protocol (WAP) og Wireless Internet Browser (WIB) er arkitekturer som gir mobilbrukere tilgang til Internettjenester. WIB er en SIM-basert WML-Browser og består av to hoveddeler: WIB-Browser, som ligger lagret lokalt i hver mobiltelefon (MS), og WIG-Server som er plassert i nettet. WIB-Browser er et menysystem som gir mobilbrukere tilgang til et utvalg nye tjenester på mobiltelefonen. WIG Server fungerer som et grensesnitt mellom MS og tjenesteserverne, og er sentral i realiseringen av de nye Inernettjenestene som brukere har tilgang til via sin mobiltelefon.
| År | Akademisk institusjon | Grad |
|---|---|---|
| 2005 | Norwegian University of Science and Technology | PhD |
| 2003 | Norwegian University of Science and Technology | B.Sc. |
| 2002 | Norwegian University of Science and Technology | Master of Technology |
| År | Arbeidsgiver | Tittel |
|---|---|---|
| 2025 - Present | BI Norwegian Business School | Special Advisor AI & Technology |
| 2023 - 2024 | BI Norwegian Business School | Provost for Research, Learning & Impact |
| 2022 - 2023 | BI | Provost for Student Learning |
| 2017 - 2022 | NTNU | Professor |
| 2013 - 2017 | NTNU | Head of Department |
| 2010 - 2013 | NTNU | Associate Professor |
| 2006 - 2010 | NTNU | Research and Education Coordinator |
| 2005 - 2006 | NTNU | Post.Doc |
| 2002 - 2005 | NTNU | PhD Student |