Davis Social Links FIND: Facebook-based INternet Design - PowerPoint PPT Presentation

1 / 98
About This Presentation
Title:

Davis Social Links FIND: Facebook-based INternet Design

Description:

Davis Social Links FIND: Facebook-based INternet Design S. Felix Wu Computer Science Department University of California, Davis wu_at_cs.ucdavis.edu http://www.facebook ... – PowerPoint PPT presentation

Number of Views:445
Avg rating:3.0/5.0
Slides: 99
Provided by: cyrusCsUc
Category:

less

Transcript and Presenter's Notes

Title: Davis Social Links FIND: Facebook-based INternet Design


1
Davis Social LinksFIND Facebook-based INternet
Design
S. Felix Wu Computer Science Department University
of California, Davis wu_at_cs.ucdavis.edu http//www
.facebook.com/sfelixwu http//dsl.cs.ucdavis.edu
2
Future Internet Design
  • We only know a little bit about what we dont
    want.
  • We really need to know the requirements of the
    future!

3
Future Internet Design
  • We only know a little bit about what we dont
    want.
  • We really need to know the requirements of the
    future!
  • What are the possible future applications and why
    will the current Internet architecture be
    insufficient?

gap
4
Internet
SMTP
33130 Autonomous Systems 311755 Address
Prefixes announced
BGP DNS
http//bgp.potaroo.net/cidr/
5
Unique Routable Identity
Destination Identity is the ONLY thing you need
to communicate with that particular identity!
6
Unique Routable Identity
SMTP
  • Any identity (email address, IP, url) can
    communicate with any one else.
  • Email, web, bittorrent, warcraft, skype

Destination Identity is the ONLY thing you need
to communicate with that particular identity!
7
Properties
  • Unique global network-layer identifier
  • IPv4/v6 addresses
  • Global connectivity
  • The primary job of BGP
  • 311755 Address Prefixes announced

8
The emails I received typically each morning
Spam as just an example
9
SMTP
10
SMTP
11
We are trying to make the information of social
context and relationship explicit!
SMTP
Eric
Felix
Dualism
Justin
12
SMTP
Eric
Felix
Facebook
13
SMTP
Existing Applications
Native DSL Applications and Games
Wrapper
Eric
Felix
Social Context
DSL Kernel
Community Oriented Keywords
Name-ID resolution
Policy/Reputation-based Route discovery
Facebook
DSLoFB
14
SMTP
SoEmail
Eric
Felix
Social Context
DSL Kernel
Community Oriented Keywords
Name-ID resolution
Policy/Reputation-based Route discovery
Facebook
DSLoFB
15
What should be the social context for this
interaction?
16
(No Transcript)
17
(No Transcript)
18
(No Transcript)
19
Internet
SMTP
33130 Autonomous Systems 311755 Address
Prefixes announced
BGP DNS
http//bgp.potaroo.net/cidr/
20
Social-Control Routing
SMTP
3
2
1
21
Social/Application
SMTP
22
Social/Networking
Relationship-Oriented Networking
3
2
1
23
Social/Networking
Relationship Graph Abstraction/Dynamics
3
2
1
24
Social-View of Network-Layer DDoS
Remapping, Soft Binding, Trust-based
Prioritization
25
Relationship-Oriented Network
  • Everything is a social node
  • E.g.,
  • Your Facebook profile
  • URL XYZ
  • Your own email message
  • Composition (text, forwarded text, URL)
  • Author of the message

26
RON
  • Packets - Relationships (Cisco)
  • Graph! (abstraction/aggregation of the
    application activities at that moment or over a
    period of time)
  • Security applications
  • Pricing models
  • Lower layer network route (ISP)
  • Mapping

27
(No Transcript)
28
Social Network has its potential value in
communication!!
29
The value of the Social Network
  • Social Network has its own unique value in
    facilitating human communication
  • A concern about a network losing its value
  • while we are unsure about how to quantify the
    true value

30
Social Network Games
31
http//apps.facebook.com/fightersc/ongoingfights
32
Fighters Club
  • A couple millions users
  • A Coalition game like Warcraft
  • Team members who are Facebook friends receive
    higher fighting powers
  • 1400 new friendships established daily
  • 10 of users with gt95 friendships purely based
    on this game.

33
Open Issues
  • What is the value of this social network?
  • How would this value be distributed and
    allocated to each individual peers?
  • MySpace, Facebook, LinkedIn didnt define the
    game for network formation and value
    allocation.
  • But, it is important to design the game such that
    the OSN will eventually converge to a state to
    best support the communities.

34
http
Roughly your friends (or friend2s)
Anybody with an IP address
35
(No Transcript)
36
40 to 300 to 350 millions
37
(No Transcript)
38
http
Roughly your friends (or friend2s)
Quality of the Friendship may have been out of
control
A typical politician in Taiwan has about 3K FB
friends!
Anybody with an IP address
39
http
real human social network
Roughly your friends (or friend2s)
online social network
Quality of the Friendship may have been out of
control
A typical politician in Taiwan has about 3K FB
friends!
Anybody with an IP address
40
http
What we really want
Roughly your friends (or friend2s)
Anybody with an IP address
41
Value of OSN
  • How to leverage the value of Online Social
    Network in Computing/Communication?
  • Privacy/Confidentiality, Social Ranking
  • How to architect the Social Network itself such
    that its value can be protected?
  • Trust and Reputation

42
Social Computing
Future Applications
Online Social Computing/Networking Service
Infrastructure
FIND
Internet
Network Virtualization
43
XYZ???
Considering No IP/IPv6 addresses No DNS/BGP
Routing in the social network layer
44
Who is Salma?
45
My message to Salma
46
My message to Salma
47
The Social Path(s)
48
doesnt know the address of
B
D
A
C
A has to explicitly declare if there is any
social context under this communication activity
with D! But, D only cares if it is from C
or not!
49
Finding
B
D
A
C
A2D, while D is McDonalds! D would like
customers to find the right route. idea
keyword propagation e.g., McDonalds
50
Internet Connection
  • IP address/Gateway DNS server

51
Social Internet Connection
  • IP address/Gateway DNS server
  • My Direct Friends
  • What I should tell my friends about myself

(unnecessary)
SoISP ATT Facebook
52
as the Social Peer
  • Attributes (available only to direct friends)
  • McDonalds Express, 640 W Covell Blvd, D,
    Davis, (530) 756-8886, Davis Senior High School,
    Community Park, North Davis

53
Keyword its propagation policy
Trust
Hop Count
Community Attribute
54
Propagating the keywords of
B
D
K McDonalds
A
C
Hop-by-hop keyword propagation
55
Propagating the keywords of
B
D
K McDonalds
K McDonalds
A
C
Hop-by-hop keyword propagation
56
Propagating the keywords of
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
Hop-by-hop keyword propagation
57
Propagating the keywords of
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
Hop-by-hop keyword propagation And, I know I am
doing FLOODING!!
58
Control the Flooding
  • Internet Addresses
  • The scale is much smaller (300K)
  • Addressing is hierarchical (aggregation)
  • Global connectivity was given on day one
  • Social Attributes
  • Much larger (350M times of Attributes)
  • Unstructured naming
  • Global social connectivity is being developed by
    the social network itself

59
in Community of Davis
B
D
A
C
Who should receive the keyword announcement for
McDonalds?
60
Per-Keyword Propagation Policy
  • For each keyword, we will associate it with a
    propagation policy T, N, A
  • T Trust Value Threshold
  • N Hop counts left to propagate (-1 each step)
  • A Community Attributes
  • Examples
  • gt0.66, 4, Davis K via L1
  • gt0, , K via L2

61
Social/Community Attributes
B
D
A
C
Who should receive the keyword announcement for
McDonalds? Answer
62
Community
B
D
A
C
63
Community
B
D
A
C
  • A connected graph of social nodes sharing a set
    of community attributes

64
We lost Global Connectivity!
  • We cannot propagate all the keywords too far
    away for the concern of scalability.
  • Global reachability is sacrificed.
  • But, Less might well be More
  • In between deny and allow by default
  • Communication is mutual!
  • As an example, if we want to communicate with a
    certain far-reach region as our mission, then
    we will send a missionary there on OSN!

65
reaching Western Africa
66
Connecting to Western Africa
Sending a missionary there Socially!
67
Now Finding
Q McDonalds
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
  • Search Keyword McDonalds
  • A might know Ds keyword via two channels
  • (1) Somebody else (2) From its friends
  • Questions does D need an identity? Scalable?

68
We also lost unique identification
  • At least, at the social network and keyword layer!

69
(No Transcript)
70
Phishing Attacks
  • Today, somebody would trick us to believe that
    they are the official Bank of America!
  • In DSL, ANYBODY can claim to be BoA as long as
    they announce the magic keywords.
  • So, we are Phishing by Default.

71
Why not?
  • Relying on IP ( BGP), URL, DNS, and trusted
    browser plus uncompromised Javascripts and
    captures might not be terribly secure anyway.
  • We need end-to-end mutual authentication for
    certain applications, and more importantly, at
    the application layer!
  • Different applications have different security
    requirements!

72
Application Tests
  • Example 1 credential-oriented
  • PKI certificate as the keyword
  • If you can sign or decrypt the message, you are
    the ONE! (BTW, not all applications need this!)
  • Example 2 service-oriented
  • Service/protocol/bandwidth support
  • Example 3 offer-oriented
  • Please send me your coupons/promotions!

73
Finding
Application Test
Q McDonalds
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
Search Keyword McDonalds Questions is this
the right McDonalds?
74
Routable Identity
  • Application identity Mgt Network identity
  • Network identity Rgt Network identity
  • Network identity Mgt Application identity

Application Entity
Application Entity
DNS
BGP
Network Entity
Network Entity
75
App/Route Identity
  • Application identity Mgt Network identity
  • Network identity Rgt Network identity
  • Network identity Mgt Application identity
  • Keywords (MF-R)gt Multiple Paths
  • Application identity selection
  • Network route selection

76
Social Control Layer
Application Entity
Application Entity
Network Route Selection
Social Entity
Social Entity
Dualism
AL-BGP
Network Entity
Network Entity
77
Hijackable Routable Identify
78
Application Test ltgt Layer 3
79
App/Route Identity
  • Application identity Mgt Network identity
  • Network identity Rgt Network identity
  • Network identity Mgt Application identity
  • Keywords (MF-R)gt Multiple Paths
  • Application identity selection
  • Network route selection

The end user will have some control via the
social layer!
80
URI versus ADC
  • URI (Unique Routable Identity)
  • We assume that our destination target is bound to
    an URI.
  • We assume that both the MAPPING (e.g., DNS) and
    ROUTING (e.g., BGP) are correct.
  • ADC (Application Dependent Credential)
  • The lower layer (like search engine) will give us
    a few options to click.
  • The application (or the user) will then choose
    the one (or ones).

81
A couple issues
  • How to establish the social route?
  • How would A know about D (or Ds identity)
    ?
  • How to maintain this reputation network?
  • KarmaNet A Feed-back Trust Control System

82
D decides, and rewards/punishes
Pktcgtd
A
B
C
D
Trust(DgtC)
Trust(CgtB)
Trust(BgtA)
Pktbcd
Pktabc
Pktab
83
Trust Structure
We want to stabilize these decentralized values
such that they can be used to effectively choose
the best route.
84
Routing with Trust
85
Simulation study of 100K nodes
86
Pairwise 1-way Trust
87
(No Transcript)
88
(No Transcript)
89
Trust/Reputation Systems
  • performance and responsiveness to dynamics (of
    trust and reputation)
  • Assuming no oracle or human reset (and we might
    not have ground truth in real-time anyway).
  • operations and management
  • Bounded/unbounded for life-time expected attack
    instances
  • Versus bounded for a fix period of time
  • Probabilistic versus Deterministic

90
SMTP
Existing Applications
Native DSL Applications and Games
Wrapper
Eric
Felix
Social Context
DSL Kernel
Community Oriented Keywords
Name-ID resolution
Policy/Reputation-based Route discovery
Facebook
DSLoFB
91
DSL is an old idea!
A
B
And, I certainly dont have the answer yet
  • We, as human, have been using similar social
    communication principles. Maybe it is a good
    opportunity to re-think about our cyber
    communication system.
  • Re-consider the current Internet architecture
  • Global Connectivity vs. Mutual Interest
  • Unique Routable Identifier vs. Application
    Dependent Credential

F
A
B
F
F
92
Remarks
  • Social-Centric Networking
  • Packet/Flow Relationship
  • Trust Management
  • Social Network in Progression/Development
  • Softer/Fuzzy Resolution via Keywords
  • Name, Content, Identification
  • Semantic Analysis
  • Social Network Control to Bridge the Gap

93
Future Applications
Online Social Computing/Networking Service
Infrastructure
Bridging the between end users and the network!
FIND
Internet
Network Virtualization
94
ISP SCSP(Social Community Service Provider)
SMTP
Internet old/new Applications
3
2
1
95
Status
  • DSL OSN kernel FAITH ProtoGENI
  • The Social Computing Service Layer
  • Social Search Engine
  • SOaaS (Social Computing as a Service)
  • Mapping into Cloud Computing
  • Social Applications
  • SoEmail, MinB, Calendar, Chat-Room, Games
  • Social-Enabled Networking
  • FIND (Content-Centric Networking, e.g.)
  • How will the L-3 routers leverage the SOaaS?
  • New Network Layer Algorithms/Architecture

96
Status
  • FIND GENI
  • Facebook platform plus a suite of applications
  • You are welcome to join!
  • http//dsl.cs.ucdavis.edu/

97
(No Transcript)
98
Acknowledgements
  • NSF/FIND, GENI, ARO/MURI, CTA, Intel
Write a Comment
User Comments (0)
About PowerShow.com