1 / 45

D avis S ocial L inks FIND : F acebook-based IN ternet D esign

D avis S ocial L inks FIND : F acebook-based IN ternet D esign. S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu http://www.facebook.com/sfelixwu. D avis S ocial L inks FIND : F acebook-based IN ternet D esign.

Télécharger la présentation

D avis S ocial L inks FIND : F acebook-based IN ternet D esign

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Davis Social LinksFIND:Facebook-based INternet Design S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu http://www.facebook.com/sfelixwu

  2. Davis Social LinksFIND:Facebook-based INternet Design Disclaimer: I really need 75 minutes MINIMUM!

  3. I had a few seconds to decide…… Davis Social Links @ GEC6, Salt Lake City, Utah

  4. To me personally, this is a typical social spam. Davis Social Links @ GEC6, Salt Lake City, Utah

  5. Oops… Davis Social Links @ GEC6, Salt Lake City, Utah

  6. Davis Social Links @ GEC6, Salt Lake City, Utah

  7. 11/27 /2007 12/10 /2007 Spammed? “Memoryless” For Felix Wu 11/16 /2007 11/26 /2007 In my office Davis Social Links @ GEC6, Salt Lake City, Utah

  8. SMTP We are trying to make the information of social context and relationship explicit! Eric Felix Dualism Justin Davis Social Links @ GEC6, Salt Lake City, Utah

  9. Social-Control Routing SMTP 3 2 1 Davis Social Links @ GEC6, Salt Lake City, Utah

  10. “Social Control Layer” Application Entity Application Entity Trust & Relationship Network Route Selection Social Entity Social Entity Dualism AL-BGP Network Entity Network Entity Davis Social Links @ GEC6, Salt Lake City, Utah

  11. Davis Social Links @ GEC6, Salt Lake City, Utah

  12. Social Network has its potential value in communication!! Davis Social Links @ GEC6, Salt Lake City, Utah

  13. The value of the “Social Network” • Social Network has its own unique value in facilitating human communication • A concern about a network losing its “value” • while we are unsure about how to quantify the true value… Davis Social Links @ GEC6, Salt Lake City, Utah

  14. Social Network Games Davis Social Links @ GEC6, Salt Lake City, Utah

  15. Davis Social Links @ GEC6, Salt Lake City, Utah

  16. Fighter’s Club • A couple millions users • A Coalition game ~ like Warcraft • Team members who are Facebook friends receive higher fighting powers • ~1400 new friendships established daily • ~10% of users with >95% friendships purely based on this game. Davis Social Links @ GEC6, Salt Lake City, Utah

  17. http Roughly your friends (or friend2s) Anybody with an IP address Davis Social Links @ GEC6, Salt Lake City, Utah

  18. http Roughly your friends (or friend2s) Quality of the Friendshipmay have been out of control… A typical politician in Taiwan has about 3K+ FB friends! Anybody with an IP address Davis Social Links @ GEC6, Salt Lake City, Utah

  19. Open Issues • What is the “value” of this social network? • How would this “value” be distributed and allocated to each individual peers? • MySpace, Facebook, LinkedIn didn’t define the “game” for network formation and value allocation. • But, it is important to design the game such that the OSN will eventually converge to a state to best support the communities. Davis Social Links @ GEC6, Salt Lake City, Utah

  20. http What we really want: Roughly your friends (or friend2s) Anybody with an IP address Davis Social Links @ GEC6, Salt Lake City, Utah

  21. Value of OSN • How to leverage the value of Online Social Network in Computing/Communication? • Privacy/Confidentiality, Social Ranking • How to architect the Social Network itself such that its value can be protected? • Trust and Reputation Davis Social Links @ GEC6, Salt Lake City, Utah

  22. Just a couple controversial points • Both unique routable identity and global network layer connectivity are unnecessary and considered harmful! • Under OSN, identity is all relative. • We don’t have globally unique IP addresses and the DNS process itself becomes social. • Less is More! • But, IP addresses and DNS won’t go away any time soon… Davis Social Links @ GEC6, Salt Lake City, Utah

  23. “Routable Identity” • Application identity=M=> Network identity • Network identity =R=> Network identity • Network identity =M=>Application identity Application Entity Application Entity DNS BGP Network Entity Network Entity Davis Social Links @ GEC6, Salt Lake City, Utah

  24. Social Controlled Communication Application Entity Application Entity Network Route Selection Social Entity Social Entity Dualism AL-BGP Network Entity Network Entity Davis Social Links @ GEC6, Salt Lake City, Utah

  25. Hijackable Routable Identify Davis Social Links @ GEC6, Salt Lake City, Utah

  26. Application Test <> “Layer 3” Davis Social Links @ GEC6, Salt Lake City, Utah

  27. “App/Route Identity” • Application identity =M=> Network identity • Network identity =R=> Network identity • Network identity =M=> Application identity • Keywords =(MF-R)=> “Multiple Paths” • Application identity selection • Network route selection The end user will have some control via the social layer! Davis Social Links @ GEC6, Salt Lake City, Utah

  28. URI versus ADC • URI (Unique Routable Identity) • We assume that our destination target is bound to an URI. • We assume that both the MAPPING (e.g., DNS) and ROUTING (e.g., BGP) are correct. • ADC (Application Dependent Credential) • The lower layer (like search engine) will give us a few options to click. • The application (or the user) will then choose the one (or ones). Davis Social Links @ GEC6, Salt Lake City, Utah

  29. Communication is Mutual IP access is improving, but social resources connecting to the rest of the world is still behind. Davis Social Links @ GEC6, Salt Lake City, Utah

  30. Communication is Mutual IP access is improving, but social resources connecting to the rest of the world is still behind. The social missionary communication model Davis Social Links @ GEC6, Salt Lake City, Utah

  31. A couple issues … • How to establish the social route? • How would “A” know about “D” (or “D’s identity”) ? • How to maintain this “reputation network”? • KarmaNet: A Feed-back Trust Control System Davis Social Links @ GEC6, Salt Lake City, Utah

  32. Finding Application Test Q: McDonald’s B D K: “McDonald’s” K: “McDonald’s” K: “McDonald’s” A C Search Keyword: “McDonald’s” Questions: is this the right McDonald’s? Davis Social Links @ GEC6, Salt Lake City, Utah

  33. Simulation study of 100K+ nodes… Davis Social Links @ GEC6, Salt Lake City, Utah

  34. SMTP Divert Existing Applications Native DSL Applications and Games Wrapper Eric Felix Social Context DSL Kernel Name-ID resolution Community Oriented Keywords Policy/Reputation-based Route discovery Facebook DSLoFB Davis Social Links @ GEC6, Salt Lake City, Utah

  35. Davis Social Links @ GEC6, Salt Lake City, Utah

  36. SMTP Divert Wrapper Lerone Felix Social Context DSL Kernel Davis Social Links @ GEC6, Salt Lake City, Utah

  37. SMTP Communication Dualism Davis Social Links @ GEC6, Salt Lake City, Utah

  38. OSN Mutual Anonymity • Blind OSN date, embarrassment-less friendship establishment, Message in the Bottle, Anonymous Confession • Keywords of Interests • Relative Reputation/Trust • “Content-level” Privacy is out of scope • The communication parties don’t know the identifiers of each other, at least initially, and their exact social relationship Davis Social Links @ GEC6, Salt Lake City, Utah

  39. Message in the Bottle (MiB) Social Context DSL Kernel Name-ID resolution Community Oriented Keywords Policy/Reputation-based Route discovery Facebook DSLoFB Davis Social Links @ GEC6, Salt Lake City, Utah

  40. Three Layers • User Access layer • Native & Existing Applications • Social Control Layer • The core of DSL • Network Control Layer • Network Virtualization Davis Social Links @ GEC6, Salt Lake City, Utah

  41. DSL is an old idea! A B And, I certainly don’t have the answer yet… We, as human, have been using similar social communication principles. Maybe it is a good opportunity to re-think about our cyber communication system. Re-consider the current Internet architecture • Global Connectivity vs. Mutual Interest • Unique Routable Identifier vs. Application Dependent Credential F A B F F Davis Social Links @ GEC6, Salt Lake City, Utah

  42. ISP + SCSP(Social Community Service Provider) SMTP Internet {old/new} Applications 3 2 1 Davis Social Links @ GEC6, Salt Lake City, Utah

  43. GENI Experiment Application Entity Application Entity Network Route Selection Social Entity Social Entity Dualism AL-BGP Network Entity Network Entity Davis Social Links @ GEC6, Salt Lake City, Utah

  44. GENI Experiment • Leverage (and discover) the “features” of ProtoGENI as much as possible for our NSF FIND project. • Build something on “DSL” that is attractive and usable by real users • feedback to the FIND/GENI community • Share and reuse the experiments (data traces and models, under IRB) Davis Social Links @ GEC6, Salt Lake City, Utah

  45. Davis Social Links @ GEC6, Salt Lake City, Utah

More Related