Davis Social Links FIND: Facebook-based INternet Design S. Felix Wu Computer Science Department University of California, Davis

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 6: Meeting People Online.
Advertisements

Virginia Career Network LinkedIn. What is LinkedIn? Overview Creating a profile Growing your contacts Sourcing capability.
Workshop on Online Social Networks Microsoft Research Cambridge December 7, 2007.
1 Davis Social Links Social Network Kernel for Future Internet Design Norm Matloff, Michael Neff, S. Felix Wu, Computer Science Diane Felmlee Sociology.
Architectural issues for network-layer identifiers Stefan Savage Dept of Computer Science & Engineering UC San Diego.
Enabling IPv6 in Corporate Intranet Networks
Comparison of Social Networks by Likhitha Ravi. Outline What is a social network? Elements of social network Previous studies What is missing in previous.
Group #1: Protocols for Wireless Mobile Environments.
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
Bringing people together online – to share, to work, to learn So now I'm connected, now what?
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
Miscreant of Social Networks Paper1: Social Honeypots, Making Friends With A Spammer Near You Paper2: Social phishing Kai and Isaac.
The Internet Ed Lazowska Bill & Melinda Gates Chair in Computer Science & Engineering University of Washington August 2010.
Chapter 1 Read (again) chapter 1.
Ecs289m Spring, 2008 Network Formation S. Felix Wu Computer Science Department University of California, Davis
CPSC 463 Networks and Distributed Processing Willis F. Marti.
04/05/20011 ecs298k: Routing in General... lecture #2 Dr. S. Felix Wu Computer Science Department University of California, Davis
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
Cyber Security Challenges a social informatics touch on old attacks S. Felix Wu University of California, Davis 16/5/2013IEEE Intelligence and Security.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
WELCOME TO A NATIONAL DISABILITY INSTITUTE 30 SECOND TRAINING.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
VLSM and CIDR Last Update Copyright 2008 Kenneth M. Chipps Ph.D.
J. He, G. Kesidis and D.J. Miller – The Pennsylvania State University In collaboration with K. Levitt, J. Rowe, S.F. Wu – The University of California.
Network Kernel Architectures and Implementation ( ) Naming and Addressing Chaiporn Jaikaeo Department of Computer Engineering.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
2008 National UniServ Managers Conference Using Technology in Our Work with Staff Maureen Cronin, NJEA Don Blake, NEA.
Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science.
The Coalition Peering Domain A New Entity in the Routing Landscape Manish Lad, Saleem Bhatti, Peter Kirstein, Steve Hailes Dept. Computer Science, UCL.
Internet Application. understanding Addresses Routing of Instant Messaging Collaborative Computing Grid Social networking Forums Societies.
Social scope: Enabling Information Discovery On Social Content Sites
Social Content ASIDIC, Tampa Fl, March 2009 What is Social Content? How can we use Social Content? What is the future of Social Content?
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Computer Networks (CS 132/EECS148) General Networking Example Karim El Defrawy Donald Bren School of Information and Computer Science University of California.
Sponsored by the National Science Foundation Davis Social Links Spiral 2 Year-end Project Review University of California, Davis PI: S. Felix Wu, Chen-Nee.
P2P SIP Names & Security Cullen Jennings
Distributed Computing COEN 317 DC2: Naming, part 1.
1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis
1 Flow Identification Assume you want to guarantee some type of quality of service (minimum bandwidth, maximum end-to-end delay) to a user Before you do.
Tony McGregor RIPE NCC Visiting Researcher The University of Waikato DAR Active measurement in the large.
TCP/IP Network.
Web Services Based on SOA: Concepts, Technology, Design by Thomas Erl MIS 181.9: Service Oriented Architecture 2 nd Semester,
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
An analysis of Skype protocol Presented by: Abdul Haleem.
CS1001 Lecture 7. Overview Computer Networks Computer Networks The Internet The Internet Internet Services Internet Services Markup Languages Markup Languages.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
CSCI 465 D ata Communications and Networks Lecture 24 Martin van Bommel CSCI 465 Data Communications & Networks 1.
1/14/ :59 PM1/14/ :59 PM1/14/ :59 PM Research overview Koen Victor, 12/2007.
Sy Le CS 147.  Process of transferring information between computers virtually anywhere in the world.
Social Networks and Peer to Peer As Presented by Jeremy Robinson 3/22/2007.
Speaker : 童耀民 MA1G /3/21 1 Authors: Phone Lin and Pai-Chun Chung, National Taiwan University Yuguang Fang, University of Florida.
Most of them are years old (75%). A total of 154 students have been taken part in this survey. The number of boys and girls is very similar (78/76).
User Identification Solutions in Converging Networks Mike Pluke ETSI STF “User Identification in Converging Networks”
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
Threats Relating to Transport Layer Protocols Handling Multiple Addresses Masataka Ohta Tokyo Institute of technology
Davis Social Links Relationship-Oriented Social-Centric Future Internet Architecture S. Felix Wu Computer Science Department University of California,
Creating your online identity
Social-Control Routing
Chapter 6: Transport Layer (Part I)
Understanding the OSI Reference Model
ECE453 – Introduction to Computer Networks
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presentation transcript:

Davis Social Links FIND: Facebook-based INternet Design S. Felix Wu Computer Science Department University of California, Davis

Davis Social Links FIND: Facebook-based INternet Design Disclaimer: I really need 75 minutes MINIMUM!

11/17/2009Davis Social GEC6, Salt Lake City, Utah 3 I had a few seconds to decide……

11/17/2009Davis Social GEC6, Salt Lake City, Utah 4 To me personally, this is a typical social spam.

11/17/2009Davis Social GEC6, Salt Lake City, Utah 5 Oops…

11/17/2009Davis Social GEC6, Salt Lake City, Utah 6

11/17/2009Davis Social GEC6, Salt Lake City, Utah 7 11/16 / /26 /2007 In my office 11/27 /2007 Spammed? 12/10 /2007 “Memoryless” For Felix Wu

11/17/2009Davis Social GEC6, Salt Lake City, Utah 8 SMTP Felix Eric Justin We are trying to make the information of social context and relationship explicit! Dualism

11/17/2009Davis Social GEC6, Salt Lake City, Utah 9 Social-Control Routing SMTP

11/17/2009Davis Social GEC6, Salt Lake City, Utah 10 “Social Control Layer” Application Entity Network Entity AL-BGP Network Route Selection Social Entity Social Entity Dualism Trust & Relationship

11/17/2009Davis Social GEC6, Salt Lake City, Utah 11

11/17/2009Davis Social GEC6, Salt Lake City, Utah 12 Social Network has its potential value in communication!!

11/17/2009Davis Social GEC6, Salt Lake City, Utah 13 The value of the “Social Network” Social Network has its own unique value in facilitating human communication A concern about a network losing its “value” –while we are unsure about how to quantify the true value…

11/17/2009Davis Social GEC6, Salt Lake City, Utah 14 Social Network Games

11/17/2009Davis Social GEC6, Salt Lake City, Utah 15

11/17/2009Davis Social GEC6, Salt Lake City, Utah 16 Fighter’s Club A couple millions users A Coalition game ~ like Warcraft Team members who are Facebook friends receive higher fighting powers ~1400 new friendships established daily ~10% of users with >95% friendships purely based on this game.

11/17/2009Davis Social GEC6, Salt Lake City, Utah 17 http Anybody with an IP address Roughly your friends (or friend 2 s)

11/17/2009Davis Social GEC6, Salt Lake City, Utah 18 http Anybody with an IP address Roughly your friends (or friend 2 s) Quality of the Friendship may have been out of control… A typical politician in Taiwan has about 3K+ FB friends!

11/17/2009Davis Social GEC6, Salt Lake City, Utah 19 Open Issues What is the “value” of this social network? How would this “value” be distributed and allocated to each individual peers? MySpace, Facebook, LinkedIn didn’t define the “game” for network formation and value allocation. –But, it is important to design the game such that the OSN will eventually converge to a state to best support the communities.

11/17/2009Davis Social GEC6, Salt Lake City, Utah 20 http Anybody with an IP address Roughly your friends (or friend 2 s) What we really want:

11/17/2009Davis Social GEC6, Salt Lake City, Utah 21 Value of OSN How to leverage the value of Online Social Network in Computing/Communication? –Privacy/Confidentiality, Social Ranking How to architect the Social Network itself such that its value can be protected? –Trust and Reputation

11/17/2009Davis Social GEC6, Salt Lake City, Utah 22 Just a couple controversial points Both unique routable identity and global network layer connectivity are unnecessary and considered harmful! –Under OSN, identity is all relative. We don’t have globally unique IP addresses and the DNS process itself becomes social. –Less is More! –But, IP addresses and DNS won’t go away any time soon…

11/17/2009Davis Social GEC6, Salt Lake City, Utah 23 “Routable Identity” Application identity =M=> Network identity Network identity =R=> Network identity Network identity =M=> Application identity Application Entity Network Entity BGP DNS

11/17/2009Davis Social GEC6, Salt Lake City, Utah 24 Social Controlled Communication Application Entity Network Entity AL-BGP Network Route Selection Social Entity Social Entity Dualism

11/17/2009Davis Social GEC6, Salt Lake City, Utah 25 Hijackable Routable Identify

11/17/2009Davis Social GEC6, Salt Lake City, Utah 26 Application Test <> “Layer 3”

11/17/2009Davis Social GEC6, Salt Lake City, Utah 27 “App/Route Identity” Application identity =M=> Network identity Network identity =R=> Network identity Network identity =M=> Application identity Keywords =(MF-R)=> “Multiple Paths” Application identity selection Network route selection The end user will have some control via the social layer!

11/17/2009Davis Social GEC6, Salt Lake City, Utah 28 URI versus ADC URI (Unique Routable Identity) –We assume that our destination target is bound to an URI. –We assume that both the MAPPING (e.g., DNS) and ROUTING (e.g., BGP) are correct. ADC (Application Dependent Credential) –The lower layer (like search engine) will give us a few options to click. –The application (or the user) will then choose the one (or ones).

11/17/2009Davis Social GEC6, Salt Lake City, Utah 29 Communication is Mutual IP access is improving, but social resources connecting to the rest of the world is still behind.

11/17/2009Davis Social GEC6, Salt Lake City, Utah 30 Communication is Mutual IP access is improving, but social resources connecting to the rest of the world is still behind. The social missionary communication model

11/17/2009Davis Social GEC6, Salt Lake City, Utah 31 A couple issues … How to establish the social route? –How would “A” know about “D” (or “D’s identity”) ? How to maintain this “reputation network”? –KarmaNet: A Feed-back Trust Control System

11/17/2009Davis Social GEC6, Salt Lake City, Utah 32 Finding Search Keyword: “McDonald’s” Questions: is this the right McDonald’s? A B C D K: “McDonald’s” Q: McDonald’s Application Test

11/17/2009Davis Social GEC6, Salt Lake City, Utah 33 Simulation study of 100K+ nodes…

11/17/2009Davis Social GEC6, Salt Lake City, Utah 34 Facebook DSL Kernel Policy/Reputation-based Route discovery Community Oriented Keywords Name-ID resolution Social Context DSLoFB SMTP Felix Eric Divert Native DSL Applications and Games Existing Applications Wrapper

11/17/2009Davis Social GEC6, Salt Lake City, Utah 35

11/17/2009Davis Social GEC6, Salt Lake City, Utah 36 DSL Kernel Social Context SMTP Felix Lerone Divert Wrapper

11/17/2009Davis Social GEC6, Salt Lake City, Utah 37 SMTP Communication Dualism

11/17/2009Davis Social GEC6, Salt Lake City, Utah 38 OSN Mutual Anonymity Blind OSN date, embarrassment-less friendship establishment, Message in the Bottle, Anonymous Confession –Keywords of Interests –Relative Reputation/Trust –“Content-level” Privacy is out of scope The communication parties don’t know the identifiers of each other, at least initially, and their exact social relationship

11/17/2009Davis Social GEC6, Salt Lake City, Utah 39 Facebook DSL Kernel Policy/Reputation-based Route discovery Community Oriented Keywords Name-ID resolution Social Context DSLoFB Message in the Bottle (MiB)

11/17/2009Davis Social GEC6, Salt Lake City, Utah 40 Three Layers User Access layer –Native & Existing Applications Social Control Layer –The core of DSL Network Control Layer –Network Virtualization

11/17/2009Davis Social GEC6, Salt Lake City, Utah 41 DSL is an old idea! We, as human, have been using similar social communication principles. Maybe it is a good opportunity to re-think about our cyber communication system. Re-consider the current Internet architecture 1.Global Connectivity vs. Mutual Interest 2.Unique Routable Identifier vs. Application Dependent Credential AB AB F F F And, I certainly don’t have the answer yet…

11/17/2009Davis Social GEC6, Salt Lake City, Utah 42 Internet {old/new} Applications SMTP ISP + SCSP(Social Community Service Provider)

11/17/2009Davis Social GEC6, Salt Lake City, Utah 43 GENI Experiment Application Entity Network Entity AL-BGP Network Route Selection Social Entity Social Entity Dualism

11/17/2009Davis Social GEC6, Salt Lake City, Utah 44 GENI Experiment Leverage (and discover) the “features” of ProtoGENI as much as possible for our NSF FIND project. Build something on “DSL” that is attractive and usable by real users –feedback to the FIND/GENI community Share and reuse the experiments (data traces and models, under IRB)

11/17/2009Davis Social GEC6, Salt Lake City, Utah 45