Social Area Networks and the Comm.unity Platform Nadav Aharony MIT Media Laboratory: Viral Communications 01/23/2008.

Slides:



Advertisements
Similar presentations
How does a network identify computers and transmissions?
Advertisements

Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
Chapter 1 Read (again) chapter 1.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
Data Communications I & II Project Sequence Tom Costello.
1 Version 3.0 Module 9 TCP/IP Protocol and IP Addressing.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Internet Protocol Security (IPSec)
The OSI Model FTP API 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical HTTP Software.
Some Thoughts and Ideas Nadav Aharony MIT Media Laboratory: Viral Communications 02/06/2008.
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
CS 356 Systems Security Spring Dr. Indrajit Ray
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Data Communications and Networks
LAN Review. What is a Network? A group of computers and devices connected together for the purpose of sharing resources and services.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
WXES2106 Network Technology Semester /2005 Chapter 4 TCP/IP CCNA1: Module 9, 10.3 and 11.
CHAPTER Protocols and IEEE Standards. Chapter Objectives Discuss different protocols pertaining to communications and networking.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Throughput: Internet scenario
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Layered Protocol. 2 Types of Networks by Logical Connectivity Peer to Peer and Client-Server Peer-to-peer Networks  Every computer can communicate directly.
1 Computer Networks DA Chapter 1-3 Introduction.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
COMP1321 Digital Infrastructure Richard Henson February 2014.
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Cisco – Semester 1 – Chapter 2 Network Fundamentals And The OSI Model.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Link Layer5-1 Synthesis: a day in the life of a web request  journey down protocol stack complete!  application, transport, network, link  putting-it-all-together:
CSCI 3335: C OMPUTER N ETWORKS A DAY IN THE LIFE OF A WEB REQUEST Vamsi Paruchuri University of Central Arkansas
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Data Communications and Networks
Rehab AlFallaj.  OSI Model : Open system Interconnection.  is a conceptual model that characterizes and standardizes the internal functions of a communication.
TCP/IP MODEL   Short overview for OSI model;  What is TCP/IP model?;  How is divided;  The TCP/IP structure;  The Application Layer;  The Transport.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
نظام المحاضرات الالكترونينظام المحاضرات الالكتروني.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Net 221D:Computer Networks Fundamentals
Chapter 3 Selecting the Technology. Agenda Internet Technology –Architecture –Protocol –ATM IT for E-business –Selection Criteria –Platform –Middleware.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Networks The Big Picture. Three Great Leaps of Civilization.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Client-server communication Prof. Wenwen Li School of Geographical Sciences and Urban Planning 5644 Coor Hall
Network Architecture IS250 Spring 2010 John Chuang
COMP1321 Digital Infrastructure Richard Henson March 2016.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
Networking Using the OSI Model.
What the OSI Protocol Layers Do
ECEN “Internet Protocols and Modeling”
IS 4506 Server Configuration (HTTP Server)
OSI Model The Seven Layers
Internet & Web.
Network Models CCNA Instructor Training Course October 12-17, 2009
OSI Reference Model Kashif Ishaq.
Computer Networks DA2402.
Presentation transcript:

Social Area Networks and the Comm.unity Platform Nadav Aharony MIT Media Laboratory: Viral Communications 01/23/2008

functionality  Networking technology has expanded greatly, nevertheless most advances have been in terms of functionality. usability  There is still a lot that can be done to improve usability of our networks, as they remain very complicated. ©Copyright 2008 Nadav Aharony

By modeling communication networks after our innate social skills and relationships, we could improve their performance as well as their usability. If the network is an augmentation of our social interface to other people, shouldn’t it also represent our social affinities? ©Copyright 2008 Nadav Aharony

Social Interactions Network Technologies

 People act differently according to situation, context, identity of counterpart(s), or who else is around.  Communication devices mostly use hard coded protocols and behavior towards other devices, regardless of the relationship between their owners. ©Copyright 2008 Nadav Aharony

 LANs, WANs, MANs  Physical, geographical hierarchy.  Personal Area Network (PAN): Not just any device, but devices used by one user.  Storage Area Network (SAN): Not just connectivity, but also storage related features. ©Copyright 2008 Nadav Aharony

Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, a/b/g/n, ATM E.g PHY, SONET, ADSL, T1 ©Copyright 2008 Nadav Aharony

Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, a/b/g/n, ATM E.g PHY, SONET, ADSL, T1 End-User App , IM, File Share, etc. ©Copyright 2008 Nadav Aharony

Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, a/b/g/n, ATM E.g PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App , IM, File Share, etc. ©Copyright 2008 Nadav Aharony

Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, a/b/g/n, ATM E.g PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App , IM, File Share, etc. ©Copyright 2008 Nadav Aharony

Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, a/b/g/n, ATM E.g PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App , IM, File Share, etc. Use context and relationship to determine file sharing permissions ©Copyright 2008 Nadav Aharony

Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, a/b/g/n, ATM E.g PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App , IM, File Share, etc. ©Copyright 2008 Nadav Aharony Cognitive / Software Radio: Family devices coordinate a frequency hopping sequence

Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, a/b/g/n, ATM E.g PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App , IM, File Share, etc. ©Copyright 2008 Nadav Aharony Use encryption for communicating with co-workers

Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, a/b/g/n, ATM E.g PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App , IM, File Share, etc. Change Wireless LAN’s “Medium access politeness” according to company hierarchy ©Copyright 2008 Nadav Aharony

Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, a/b/g/n, ATM E.g PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App , IM, File Share, etc. Use social network knowledge to route data (“Friendship Routing”) ©Copyright 2008 Nadav Aharony

Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, a/b/g/n, ATM E.g PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App , IM, File Share, etc. Use different authentication protocols depending on relationships ©Copyright 2008 Nadav Aharony

Social context pervades the network stack. Application Presentation Session Transport Network Data Link Physical e.g. HTTP, FTP, DNS, Telnet Data Representation & Encryption e.g. Sockets, SIP End-to-End Link; e.g. TCP, UDP Path Determination & IP, ICMP, ARP E.g. MAC, Ethernet, a/b/g/n, ATM E.g PHY, SONET, ADSL, T1 “Social Awareness Layer” End-User App , IM, File Share, etc. ©Copyright 2008 Nadav Aharony “Social Firewall”

©Copyright 2008 Nadav Aharony

Remote terminals of the big “network cloud” Natural extensions of our body and senses

Comm.unity Platform Reality Mining Networking Social Interaction Design ©Copyright 2008 Nadav Aharony

 Allow devices to talk directly to each other (“Anything with a radio and can do sockets”)  Ad-hoc, wireless, peer-to-peer, one-hop (F2F)  NO: Centralized servers, coordination, or administration  Scalable. Easily deployed by end users.  Implement SocAN ideas ©Copyright 2008 Nadav Aharony

BroadcastUnicast UDPTCP Ad-Hoc Ethernet Already Implemented Partially Implemented ©Copyright 2008 Nadav Aharony File System Interface Groups/Tags Mechanism Socially Aware, Context Aware, Cross-Layer Networking Engine Data Collection Engine

BroadcastUnicast UDPTCP Ad-Hoc Ethernet Already Implemented Partially Implemented ©Copyright 2008 Nadav Aharony File System Interface Groups/Tags Mechanism Socially Aware, Context Aware, Cross-Layer Networking Engine Data Collection Engine

Socially Aware, Context Aware, Cross-Layer Networking Engine Groups/Tags Mechanism Data Collection Engine BroadcastUnicast UDPTCP Ad-Hoc Ethernet File System Interface Already Implemented Partially Implemented ©Copyright 2008 Nadav Aharony

Physical Interface API Transmission Modes Transport Protocols Security Tools Identity Tools Socially Aware, Context Aware, Cross-Layer Networking Engine Groups/Tags Mechanism Data Collection Engine BroadcastUnicast UDPTCP Ad-Hoc Ethernet File System Interface Already Implemented Partially Implemented ©Copyright 2008 Nadav Aharony

Socially Aware, Context Aware, Cross-Layer Networking Engine Relationship Engine Groups/Tags Mechanism Data Collection Engine BroadcastUnicast UDPTCP Ad-Hoc Context/State Manager Ethernet Physical Interface API Transmission Modes Transport Protocols Security Tools Identity Tools “Multiple Identity” Engine File System Interface Encrypted Control Already Implemented Partially Implemented Will Implement ©Copyright 2008 Nadav Aharony

Socially Aware, Context Aware, Cross-Layer Networking Engine Relationship Engine Groups/Tags Mechanism Data Collection Engine BroadcastUnicast UDP Multicast TCP Ad-Hoc Context/State Manager Ethernet Bluetooth IR Physical Interface API Transmission Modes Transport Protocols Security Tools Encrypted Data Identity Tools “Multiple Identity” Engine File System Interface Encrypted Control Already Implemented Partially Implemented Want to Implement Will Implement ©Copyright 2008 Nadav Aharony Gossip Engine

Socially Aware, Context Aware, Cross-Layer Networking Engine Relationship Engine Groups/Tags Mechanism Data Collection Engine BroadcastUnicast UDP Multicast TCP Network-Coded Transport … … Ad-Hoc Context/State Manager Ethernet Bluetooth IR … Physical Interface API Transmission Modes Transport Protocols Security Tools Encrypted Data Identity Tools “Anonimizer” Mode “Multiple Identity” Engine File System Interface GPS Interface Pseudo Broadcast Encrypted Control Already Implemented Partially Implemented Want to Implement Considering Will Implement ZigBee ©Copyright 2008 Nadav Aharony Gossip Engine

©Copyright 2008 Nadav Aharony

Reality Mining [Eagle & Pentland] Sociometric Badge [Olguin] Privacy, Sharing, Interest (PSI) Social Firewal [Miklas] ©Copyright 2008 Nadav Aharony Comm.unity Platform Reality Mining Networking Social Interaction Design

 Need: Populate device with user relationship / social data.  Use devices as sensors for learning the user. (We already carry them with us) Network layer data (e.g. wireless radio scan) Application usage (we own the app!) Additional sensors (e.g. accelerometer)  Reality Mining - Learn social relationships.  Not totally automatic: Keep user in the loop. ©Copyright 2008 Nadav Aharony

 ©Copyright 2008 Nadav Aharony

 Mix of online and physical presence  Privacy concerns Controlling Identity Impression management Not exposing private relationship information  Interaction with one/many peers  Understanding and controlling the AI  Notifications/Interruptions from the device ©Copyright 2008 Nadav Aharony

Online presence and social networks applications are going to merge with our real-world presence and relationships.  Location, Location, Location Manual entry (Facebook, Jaiku, Twitter) Base station / Accesspoint calculations (Google “My Location”) GPS (Loopt) Device-to-device sensing (Reality Mining, I’m also dabbling in this area)  Many initiatives are already underway: Dating applications Connecting to online content sharing sites (e.g. Flikr) Connecting to online social network sites (Facebook, MySpace) New social networks (Dodgeball) Many more coming… ©Copyright 2008 Nadav Aharony

 Risk of exposing identity and other information to undesired parties. Sgt. Slaugter ©Copyright 2008 Nadav Aharony

 Risk of exposing identity and other information to undesired parties. Army Buddies Sgt. Slaugter ©Copyright 2008 Nadav Aharony

 Risk of exposing identity and other information to undesired parties. Army Buddies Sgt. Slaugter Gay Dating ©Copyright 2008 Nadav Aharony

 Physicality aspect increases risk.  Careless design may lead to exposure of undesired relationship and trust information. “On my client you are marked as offline but I see you here chatting with other people!” Things one can get away with in the online world or direct physical interactions. ©Copyright 2008 Nadav Aharony

 These technologies have potential to be very useful: Meeting new people with shared interests Knowing that our acquaintances are around Access to desired information and content Local context is very powerful in many domains  However, hasty design and implementation could damage trust and privacy, and even expose users to physical dangers. (Or greatly limit the usage scenarios, like what happened to video-conferncing) ©Copyright 2008 Nadav Aharony

 Allow users to create multiple identities and choose how to expose them.  Defined levels of trust – Granular exposure of profile details.  Different types of user groups: Public: all can see group content and members Private: Invite only. Even group name is not exposed. Open Sign-up: Group name is visible, but sign-up for details.  Correlate between trust levels and presence information E.g. “invisible” to strangers, “busy” for distant acquaintances, etc  Default: Symmetry in information exchange Users can opt-out (expose information to the public, or expose more than their peers) ©Copyright 2008 Nadav Aharony