Presentation is loading. Please wait.

Presentation is loading. Please wait.

Social Area Networks and the Comm.unity Platform Nadav Aharony MIT Media Laboratory: Viral Communications 01/23/2008.

Similar presentations


Presentation on theme: "Social Area Networks and the Comm.unity Platform Nadav Aharony MIT Media Laboratory: Viral Communications 01/23/2008."— Presentation transcript:

1 Social Area Networks and the Comm.unity Platform Nadav Aharony MIT Media Laboratory: Viral Communications 01/23/2008

2 functionality  Networking technology has expanded greatly, nevertheless most advances have been in terms of functionality. usability  There is still a lot that can be done to improve usability of our networks, as they remain very complicated. ©Copyright 2008 Nadav Aharony

3 By modeling communication networks after our innate social skills and relationships, we could improve their performance as well as their usability. If the network is an augmentation of our social interface to other people, shouldn’t it also represent our social affinities? ©Copyright 2008 Nadav Aharony

4 Social Interactions Network Technologies

5  People act differently according to situation, context, identity of counterpart(s), or who else is around.  Communication devices mostly use hard coded protocols and behavior towards other devices, regardless of the relationship between their owners. ©Copyright 2008 Nadav Aharony

6  LANs, WANs, MANs  Physical, geographical hierarchy.  Personal Area Network (PAN): Not just any device, but devices used by one user.  Storage Area Network (SAN): Not just connectivity, but also storage related features. ©Copyright 2008 Nadav Aharony

7

8 Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, 802.11 a/b/g/n, ATM E.g. 802.11 PHY, SONET, ADSL, T1 ©Copyright 2008 Nadav Aharony

9 Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, 802.11 a/b/g/n, ATM E.g. 802.11 PHY, SONET, ADSL, T1 End-User App Email, IM, File Share, etc. ©Copyright 2008 Nadav Aharony

10 Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, 802.11 a/b/g/n, ATM E.g. 802.11 PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App Email, IM, File Share, etc. ©Copyright 2008 Nadav Aharony

11 Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, 802.11 a/b/g/n, ATM E.g. 802.11 PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App Email, IM, File Share, etc. ©Copyright 2008 Nadav Aharony

12 Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, 802.11 a/b/g/n, ATM E.g. 802.11 PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App Email, IM, File Share, etc. Use context and relationship to determine file sharing permissions ©Copyright 2008 Nadav Aharony

13 Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, 802.11 a/b/g/n, ATM E.g. 802.11 PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App Email, IM, File Share, etc. ©Copyright 2008 Nadav Aharony Cognitive / Software Radio: Family devices coordinate a frequency hopping sequence

14 Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, 802.11 a/b/g/n, ATM E.g. 802.11 PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App Email, IM, File Share, etc. ©Copyright 2008 Nadav Aharony Use encryption for communicating with co-workers

15 Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, 802.11 a/b/g/n, ATM E.g. 802.11 PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App Email, IM, File Share, etc. Change Wireless LAN’s “Medium access politeness” according to company hierarchy ©Copyright 2008 Nadav Aharony

16 Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, 802.11 a/b/g/n, ATM E.g. 802.11 PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App Email, IM, File Share, etc. Use social network knowledge to route data (“Friendship Routing”) ©Copyright 2008 Nadav Aharony

17 Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, 802.11 a/b/g/n, ATM E.g. 802.11 PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App Email, IM, File Share, etc. Use different authentication protocols depending on relationships ©Copyright 2008 Nadav Aharony

18 Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, 802.11 a/b/g/n, ATM E.g. 802.11 PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App Email, IM, File Share, etc. ©Copyright 2008 Nadav Aharony “Social Firewall”

19 ©Copyright 2008 Nadav Aharony

20

21 Remote terminals of the big “network cloud” Natural extensions of our body and senses

22 Comm.unity Platform Reality Mining Networking Social Interaction Design ©Copyright 2008 Nadav Aharony

23  Allow devices to talk directly to each other (“Anything with a radio and can do sockets”)  Ad-hoc, wireless, peer-to-peer, one-hop (F2F)  NO: Centralized servers, coordination, or administration  Scalable. Easily deployed by end users.  Implement SocAN ideas ©Copyright 2008 Nadav Aharony

24 BroadcastUnicast UDPTCP 802.11 Ad-Hoc Ethernet Already Implemented Partially Implemented ©Copyright 2008 Nadav Aharony File System Interface Groups/Tags Mechanism Socially Aware, Context Aware, Cross-Layer Networking Engine Data Collection Engine

25 BroadcastUnicast UDPTCP 802.11 Ad-Hoc Ethernet Already Implemented Partially Implemented ©Copyright 2008 Nadav Aharony File System Interface Groups/Tags Mechanism Socially Aware, Context Aware, Cross-Layer Networking Engine Data Collection Engine

26 Socially Aware, Context Aware, Cross-Layer Networking Engine Groups/Tags Mechanism Data Collection Engine BroadcastUnicast UDPTCP 802.11 Ad-Hoc Ethernet File System Interface Already Implemented Partially Implemented ©Copyright 2008 Nadav Aharony

27 Physical Interface API Transmission Modes Transport Protocols Security Tools Identity Tools Socially Aware, Context Aware, Cross-Layer Networking Engine Groups/Tags Mechanism Data Collection Engine BroadcastUnicast UDPTCP 802.11 Ad-Hoc Ethernet File System Interface Already Implemented Partially Implemented ©Copyright 2008 Nadav Aharony

28 Socially Aware, Context Aware, Cross-Layer Networking Engine Relationship Engine Groups/Tags Mechanism Data Collection Engine BroadcastUnicast UDPTCP 802.11 Ad-Hoc Context/State Manager Ethernet Physical Interface API Transmission Modes Transport Protocols Security Tools Identity Tools “Multiple Identity” Engine File System Interface Encrypted Control Already Implemented Partially Implemented Will Implement ©Copyright 2008 Nadav Aharony

29 Socially Aware, Context Aware, Cross-Layer Networking Engine Relationship Engine Groups/Tags Mechanism Data Collection Engine BroadcastUnicast UDP Multicast TCP 802.11 Ad-Hoc Context/State Manager Ethernet Bluetooth IR Physical Interface API Transmission Modes Transport Protocols Security Tools Encrypted Data Identity Tools “Multiple Identity” Engine File System Interface Encrypted Control Already Implemented Partially Implemented Want to Implement Will Implement ©Copyright 2008 Nadav Aharony Gossip Engine

30 Socially Aware, Context Aware, Cross-Layer Networking Engine Relationship Engine Groups/Tags Mechanism Data Collection Engine BroadcastUnicast UDP Multicast TCP Network-Coded Transport … … 802.11 Ad-Hoc Context/State Manager Ethernet Bluetooth IR … Physical Interface API Transmission Modes Transport Protocols Security Tools Encrypted Data Identity Tools “Anonimizer” Mode “Multiple Identity” Engine File System Interface GPS Interface Pseudo Broadcast Encrypted Control Already Implemented Partially Implemented Want to Implement Considering Will Implement ZigBee ©Copyright 2008 Nadav Aharony Gossip Engine

31 ©Copyright 2008 Nadav Aharony

32 Reality Mining [Eagle & Pentland] Sociometric Badge [Olguin] Privacy, Sharing, Interest (PSI) Social Firewal [Miklas] ©Copyright 2008 Nadav Aharony Comm.unity Platform Reality Mining Networking Social Interaction Design

33  Need: Populate device with user relationship / social data.  Use devices as sensors for learning the user. (We already carry them with us) Network layer data (e.g. wireless radio scan) Application usage (we own the app!) Additional sensors (e.g. accelerometer)  Reality Mining - Learn social relationships.  Not totally automatic: Keep user in the loop. ©Copyright 2008 Nadav Aharony

34

35

36

37

38

39  http://community.mit.edu/misc/demo.swf http://community.mit.edu/misc/demo.swf ©Copyright 2008 Nadav Aharony

40

41

42

43

44

45  Mix of online and physical presence  Privacy concerns Controlling Identity Impression management Not exposing private relationship information  Interaction with one/many peers  Understanding and controlling the AI  Notifications/Interruptions from the device ©Copyright 2008 Nadav Aharony

46

47

48 Online presence and social networks applications are going to merge with our real-world presence and relationships.  Location, Location, Location Manual entry (Facebook, Jaiku, Twitter) Base station / Accesspoint calculations (Google “My Location”) GPS (Loopt) Device-to-device sensing (Reality Mining, I’m also dabbling in this area)  Many initiatives are already underway: Dating applications Connecting to online content sharing sites (e.g. Flikr) Connecting to online social network sites (Facebook, MySpace) New social networks (Dodgeball) Many more coming… ©Copyright 2008 Nadav Aharony

49  Risk of exposing identity and other information to undesired parties. Sgt. Slaugter ©Copyright 2008 Nadav Aharony

50  Risk of exposing identity and other information to undesired parties. Army Buddies Sgt. Slaugter ©Copyright 2008 Nadav Aharony

51  Risk of exposing identity and other information to undesired parties. Army Buddies Sgt. Slaugter Gay Dating ©Copyright 2008 Nadav Aharony

52  Physicality aspect increases risk.  Careless design may lead to exposure of undesired relationship and trust information. “On my client you are marked as offline but I see you here chatting with other people!” Things one can get away with in the online world or direct physical interactions. ©Copyright 2008 Nadav Aharony

53  These technologies have potential to be very useful: Meeting new people with shared interests Knowing that our acquaintances are around Access to desired information and content Local context is very powerful in many domains  However, hasty design and implementation could damage trust and privacy, and even expose users to physical dangers. (Or greatly limit the usage scenarios, like what happened to video-conferncing) ©Copyright 2008 Nadav Aharony

54  Allow users to create multiple identities and choose how to expose them.  Defined levels of trust – Granular exposure of profile details.  Different types of user groups: Public: all can see group content and members Private: Invite only. Even group name is not exposed. Open Sign-up: Group name is visible, but sign-up for details.  Correlate between trust levels and presence information E.g. “invisible” to strangers, “busy” for distant acquaintances, etc  Default: Symmetry in information exchange Users can opt-out (expose information to the public, or expose more than their peers) ©Copyright 2008 Nadav Aharony

55


Download ppt "Social Area Networks and the Comm.unity Platform Nadav Aharony MIT Media Laboratory: Viral Communications 01/23/2008."

Similar presentations


Ads by Google