1 / 96

Davis Social Links Social Network Kernel for Future Internet Design

Davis Social Links Social Network Kernel for Future Internet Design. Lerone Banks, Prantik Bhattachayya, Matt Spear, S. Felix Wu , Computer Science, University of California, Davis http://www.facebook.com/people/sfelixwu/. Internet. SMTP. Routable Identity. SMTP.

Download Presentation

Davis Social Links Social Network Kernel for Future Internet Design

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Davis Social LinksSocial Network Kernel for Future Internet Design Lerone Banks, Prantik Bhattachayya, Matt Spear, S. Felix Wu, Computer Science, University of California, Davis http://www.facebook.com/people/sfelixwu/

  2. Internet SMTP

  3. Routable Identity SMTP • Any identity (email address, IP, url) can communicate with any one else. • Email, web, bittorrent, warcraft, skype…

  4. FROM:MR.CHEUNG PUI Hang Seng Bank Ltd Sai Wan Ho Branch 171 Shaukiwan Road Hong Kong. Please contact me on my personal box [puicheungcheungpui@yahoo.com] Let me start by introducing myself. I am Mr. Cheung Pui, director of operations of the Hang Seng Bank Ltd,Sai Wan Ho Branch. I have a obscured business suggestion for you. Before the U.S and Iraqi war our client Major Fadi Basem who was with the Iraqi forces and also business man made a numbered fixed deposit for 18 calendar months, with a value of Twenty Four millions Five Hundred Thousand United State Dollars only in my branch. Upon maturity several notice was sent to him,…

  5. Cost of False Positives • Spam-filters have to be conservative… • We will have some false negatives in our own inboxes. • We will use our own time to further filter.. • For me, 1~2 seconds per email

  6. The emails I received typically…

  7. You have a few seconds to decide……

  8. To me personally, this is a typical social spam.

  9. Oops…

  10. 11/27 /2007 12/10 /2007 Spammed? “Memoryless” For Felix Wu 11/16 /2007 11/26 /2007 In my office

  11. SMTP

  12. SMTP

  13. SMTP Lerone Felix

  14. Social-Control Routing SMTP Internet Applications 3 2 1

  15. Social-Control Routing SMTP 3 2 1

  16. Social Network has its potential value in communication!!

  17. Value of the “Social Network” • While Social Network has its own unique value in facilitating human communication, • A major concern about losing this “value” • while we are unsure about how to quantify the true value…

  18. Fighter’s Club • A couple millions users • A Coalition game ~ like Warcraft • Team members who are Facebook friends receive higher fighting powers • ~1400 new friendships established daily • ~10% of users with >95% friendships purely based on this game.

  19. Friendship requested BTW, this guy stole 24 millions dollars from me during my DSL demo to Prof. George Kesides from Penn Stat!

  20. Open Issues • What is the “value” of this social network? • How would this “value” be distributed and allocated to each individual peers? • MySpace, Facebook, LinkedIn didn’t define the “game” for network formation and value allocation. • But, it is important to design the game such that the OSN will eventually converge to a state to best support the communities.

  21. Value of OSN • How to leverage the value of Online Social Network in Communication? • How to architect the Social Network itself such that its value can be protected?

  22. In this talk… • We will focus on the centralized architecture based on Facebook as the social context provider.

  23. SMTP Lerone Felix

  24. SMTP Lerone Felix Facebook

  25. SMTP Lerone Felix Social Context DSL Kernel Policy/Reputation-based Route discovery Facebook

  26. SMTP Lerone Felix Social Context DSL Kernel Policy/Reputation-based Route discovery Facebook

  27. SMTP Wrapper Lerone Felix Social Context DSL Kernel Community Oriented Keywords Policy/Reputation-based Route discovery Facebook

  28. SMTP Divert Existing Applications Native DSL Applications and Games Wrapper Lerone Felix Social Context DSL Kernel Name-ID resolution Community Oriented Keywords Policy/Reputation-based Route discovery Facebook DSLoFB

  29. SMTP Divert Wrapper Lerone Felix Social Context DSL Kernel

  30. A couple issues … • How to establish the social route? • How would “A” know about “D” (or “D’s identity”) ? • How to maintain this “reputation network”? • KarmaNet: A Feed-back Trust Control System

  31. Who is Salma?

  32. My message to Salma

  33. The Social Path(s)

  34. Finding ?? B D A C A2D, while D is McDonald’s! D would like “customers” to find the right route. “idea: keyword propagation” e.g., “McDonald’s”

  35. Announcing B D K: “McDonald’s” A C Hop-by-hop keyword propagation

  36. Announcing B D K: “McDonald’s” K: “McDonald’s” A C Hop-by-hop keyword propagation

  37. Announcing B D K: “McDonald’s” K: “McDonald’s” K: “McDonald’s” A C Hop-by-hop keyword propagation

  38. Announcing B D K: “McDonald’s” K: “McDonald’s” K: “McDonald’s” A C Hop-by-hop keyword propagation And, I know I am doing FLOODING!!

  39. Now Finding Q: McDonald’s B D K: “McDonald’s” K: “McDonald’s” K: “McDonald’s” A C Search Keyword: “McDonald’s” A might know D’s keyword via two channels (1) Somebody else (2) From its friends Questions: does D need an identity? Scalable?

  40. Application Tests • Example 1: credential-oriented • “PKI certificate” as the keyword • If you can sign or decrypt the message, you are the ONE! • Example 2: service-oriented • Service/protocol/bandwidth support • Example 3: offer-oriented • Please send me your coupons/promotions!

  41. “Routable Identity” • Application identity=M=> Network identity • Network identity =R=> Network identity • Network identity =M=>Application identity

  42. “App/Route Identity” • Application identity =M=> Network identity • Network identity =R=> Network identity • Network identity =M=> Application identity • Keywords =(MF-R)=> “Multiple Paths” • Application identity selection • Network route selection

  43. Scalability - Avoid the Flooding • As it is, every keyword will need to be propagated to all the nodes/links (but the same keyword will be propagated through the same link once possibly with different policies). • The issue: “who should receive my keywords?”

  44. in Community of Davis ?? B D A C Who should receive the keyword announcement for “McDonald’s”?

More Related