Title: Davis Social Links
1Davis Social Links
S. Felix Wu Computer Science Department University
of California, Davis wu_at_cs.ucdavis.edu http//ww
w.cs.ucdavis.edu/wu/
2Internet
- Basic datagram service between one IP address and
another - Routing exchanging the information regarding the
address space and how to reach them. - Allow by Default
- Applications built on top of the services
- MySpace, Facebook, Orkut, SecondLife,
LiveJournal, LinkedIn, Wikipedia, Skype, Google,
Bittorrent, LimeWire, Youtube, IM,
3Easy to Send Receive
- Many, if not most, in our society can quickly
learn how to use Email Internet. - You dont need to understand the low level
details (e.g., how SMTP, BGP, OLSR or AODV really
works or what my current IP address is) before
you can communicate with your friends as long as
you know their identity!
4Urgent! Please contact me!
FROMMR.CHEUNG PUI Hang Seng Bank Ltd Sai Wan Ho
Branch 171 Shaukiwan Road Hong Kong. Please
contact me on my personal box puicheungcheungpui_at_
yahoo.com Let me start by introducing myself. I
am Mr. Cheung Pui,director of operations of the
Hang Seng Bank Ltd,Sai Wan Ho Branch. I have a
obscured business suggestion for you. Before the
U.S and Iraqi war our client Major Fadi Basem who
was with the Iraqi forces and also business man
made a numbered fixed deposit for 18
calendar months, with a value of Twenty Four
millions Five Hundred Thousand United State
Dollars only in my branch. Upon maturity several
notice was sent to him,
5ITRI considers this as a spam!
6Easy to Send Receive
- Easy for both the good users and the spammers.
(fair simplicity) - The spammers abuse the sending right, while the
good users have very limited options to counter
back. - how easy can we change our email address?
- how often do we need to do that?
- A receiver or the owner of the identity
should have some control. - But, that means also burden to the users.
7Easy to Send Receive
- Easy for both the good users and the spammers.
(fair simplicity) - The spammers abuse the sending right, while the
good users have very limited options to counter
back. - how easy can we change our email address?
- how often do we need to do that?
- A receiver or the owner of the identity
should have some control. - But, that means also burden to the users.
8Possible Ideas of Future Internet
- Allow by Default versus Deny by Default
- Receiver versus Sender controllability
- Reconsider the role of Service Providers versus
P2P
9DSL (Davis Social Links)
A
B
- Principle
- Effective human communication reflects the
social/trust relationship and reputation within
our society. - Design
- Can we integrate and enhance our cyber
communication system with the human social/trust
model?
F
A
B
F
F
10(No Transcript)
11Social Networking
- Social Network services
- Friendster, MySpace, Facebook, Orkut, LinkedIn..
- Social Links, Interest Keywords, Search
Community Services
12Social Networks of Users
http//en.wikipedia.org/wiki/List_of_social_networ
king_sites
- FaceBook 34M
- Friendster 47M
- Hi5 50M
- LinkedIn 12M
- MySpace 200M
- Orkut 47M
- Yahoo! 360o 4M
- among many others.
13(No Transcript)
14Social Network Access Interfaces
- FBML - Facebook Markup Language
- FQL - Facebook Query Language
- REST (REpresentational State Transfer) Web API
- FBJS - Implementation of Javascript on the
Facebook platform
15DSL (Davis Social Links)
A
B
- Principle
- Effective human communication reflects the
social/trust relationship and reputation within
our society. - Design
- Can we integrate and enhance our cyber
communication system with the human social/trust
model?
F
A
B
F
F
16The same message content
- M from Cheung Pui
- M from Cheung Pui via IETF mailing list
- M from Cheung Pui via Karl Levitt
17Social Link Identification
- M from Cheung Pui
- ? Probably a spam
- M from Cheung Pui via IETF mailing list
- ? Probably not interesting
- M from Cheung Pui via Karl Levitt
- ? Better be more serious
18Social Link Identification
- M from Cheung Pui
- ? Probably a spam
- M from Cheung Pui via IETF mailing list
- ? Probably not interesting
- M from Cheung Pui via Karl Levitt
- ? Better be more serious
Either M is important, or Karls machine has
been subverted!
19A Social Link
Trust Attribute
representing a trust relationship between two
directly communicating entities
20A Direct Social Link
Trust Attribute
Karl is a very well respected individual to me! I
suspect that Karl is too busy to install the
latest patches!
21Message Value Prioritization
Link Ranks Reputation Incentives Other Trust
Metrics
Application IDS
22DSL (Davis Social Links)
A
B
- One important goal
- Can we build a P2P social network service?
- Allows Search/Crawl and Control
- Scalable and Secure/Robust
- Control implies relatively more dynamic social
network!
F
A
B
F
F
23A Path of Social Links
24Receiving an email via a Path of Social Links
25A Couple of Issues first
- How to discover the social route path, if no
direct social link exists? - How to prevent spammers from easily discovering a
large number of valid social paths?
26Social Keywords
Soccer, BGP, Davis, California, Intrusion
Detection,
27Social Keywords
Soccer, BGP, Davis, California, Intrusion
Detection,
Ownership
Social keywords represents my interests and the
semantic/social interpretation of myself.
28Cultural Natural Language
???, BGP, ??,
Students, Committee, Soccer
29IP
- IP address is all we need to communicate and
everything else is on top of IP. - IP is global routable identity
- However, too simple to be perfect?!
- Can we remove the need for global routable
identities?
30Identifier Keyword
- Under DSL, each peer has its own decision or
policy regarding what social keywords to
announce, and it can change the announcement
itself any time. - NO global unique network-wide identifier
- No unique IP address or email address in the
network layer - Identity only in the application layer
- Relative Peering relationship only
- Local link identity
31DSL
- Lets decide some of the everything else
- Global Flooding (w/o GRI)
- Then, we decide the possible candidates for us to
communicate - Scope-limiting
- Finally, we rely on the Application layer to nail
down the one or ones.
32Multiple Social Links
BGP, Davis, California, Intrusion Detection,
Soccer, Wine, Bike, Davis, California,
33Policy-Driven Forwarding
BGP, Davis, California, Intrusion Detection,
Soccer, Wine, Bike, Davis, California,
34Propagation Aggregation
35Aggregation
Ownership
Similar to Scope-Limited Flooding in
Gnutella/Freenet, but more scalable with
aggregation.
Ownership
36Scalability Locality
???
soccer
Ownership
football
Ownership
37Scalability Locality
Davis
soccer
Ownership
football
Ownership
38How to find content X?
Owner of X
Other Peers
Remember that under DSL there is no such thing
called global identifier.
39Use the right keywords for X!
soccer
Owner of X
Other Peers
Query
Davis
soccer
40Layering
Application
Application
TCP/IP
DSL Social Layer
Link
Social Link
Layer-2
IP-like
Traditional layer-2
41A Social/Overlay Link
42Davis - Washington DC - Sacramento
- Social path discovery
- Sending the real messages along the path
43Route Discovery
Keywords and aggregated keywords
. . . .
content addressable emails
44Function F(incoming) outgoing
Policy driven Maybe itself a service
Northern California
Davis CA
001
002
Potential Senders
Potential Receivers
incoming
outgoing
DSL ID
Davis California
Japan
001
Japan
Northern California
002
003
45Forwarding Source Routing
Sender Data packet SR 003, 001
46Forwarding Source Routing
Sender Data packet SR 003, 001
001
003
47Privacy and Accountability
- No single intermediate node will have the
knowledge, at least in the network layer, about
who is talking to who on what. - In DSL, no global identifier.
- However, the messages themselves contain
sufficient information to trace back toward the
social path, if necessary and nodes are
collaborative. - BTW, this (tracing on a per packet/email basis)
is impossible for todays Internet, even for
route path.
48(No Transcript)
49Problems with Overlay
- Triangle Overlay Routing
- Davis, Washington DC, Sacramento
- Traffic following the Social/Overlay path
- You can still bed DDoSed or Spammed!
- IP/email addresses are still there.
50MANET in Airport, Train, Flight
Application
DSL Social Layer
Social Link
Layer-2
Who has the 1307th piece of media X? Promotion on
new Pizza toppings A,B, C! Who has seen this
lost baby girl in the past 3 minutes? Who wants
to play OK-bridge or Warcraft-III?
51DSL-wifi
- Link Established
- representing a neighbor relationship in the
application layer
52MANET
- MANET (Mobile Ad Hoc Network)
- Network Layer Identify
53Infrastructure-less Content Sharing
- Conference/Meeting
- File Transfer
- Infrastructure ?Infrastructure-less
- Identification
54DSL Routing
55DSL Keyword Propagation
56A Relative Identity under DSL
- Key words plus one DSL path
- Why will this be sufficient for communication?
- Especially, when even the DSL information itself
is decentralized? (I.e., in general, no one
single DSL router knows the complete DSL path.)
57(No Transcript)
58DSL in a Social Network
Owner of X
Other Peers
Query AppTest
59Examples
- I want to find all the pizza places in Davis.
- Can I do it without yet another service provider?
- How about unpopular topics?
- Can I find the contact information for Felix Wu
in Davis (who is interested in soccer)?
60DSL vs. Google
61Google
- Its about the content
- Data-centric networking.
- Input to the Engine
- A set of key words characterizing the target
document. - Output
- A set of documents/links matching the keywords
62DSL
- Its also about the content
- Application will decide the mechanism to further
the communication. - Input to the Decentralized Engine
- A set of key words characterizing the target
document (plus the aggregation keywords). - Output
- A set of DSL entities with the DSP (Davis Social
Path pointer) matching the keywords
63DSL Search Engine
Receiver or Content
Sender or Reader
DSL Social World
We are not just connecting the IP addresses! We
are connecting all the contents that can be
interpreted!
64Google vs. DSL
- Google is essentially a routing framework
between the contents and their potential
consumers. - Google decides how to extract the key words
from your (the owner) web page or document.
65Google vs. DSL
- Google is essentially a routing framework
between the contents and their potential
consumers. - Google decides how to extract the key words
from your (the owner) web page or document. - A DSL owner/receiver to be has the complete
control over that. A balance between - How I would like others to know about me?
- And, I might want different folks to know me in
different ways! - How I can differentiate myself from other Felix
Wu?
66Applications
- 911-like scenarios (power/infrastructure)
- Commercial and non-Commercial Advertisements for
the local community. - Ad Hoc Peer-to-Peer Sharing without the Internet!
67Unstructured P2P
Where is this piece of music? What is the
location of this content? What is the current IP
address of this skype user?
68Structured P2P
69DHT-based BT Tracker
Sharing/Downloading FreeBSD 5.4 CD images
The owner of the identifier matching this hash
entry will be the tracker for the corresponding
index key!
Index key (Content-Dependent)
PUT GET
70DHT-based P2P
PUT GET
Index key
Routing from a key to an identifier
71DHT vs. DSL
- DHT
- Contents, Keys, Identifiers
- Conceptually, we have a global hash table!
- DSL
- Contents, Keys, Relative Identifiers
- Social/trust relationships along the route path
72No Unique Identifier!!!
- Two peers might announced exactly the same set of
keywords! - Both of them will receive the query, and this
might not be a problem. - Usually, end2end applications can tell which one
(or ones) is really wanted.
73Trackerless BitTorrent
Owner of X
Other Peers
Query AppTest
74(No Transcript)
75Tracker Volunteer
Content/Key Tracker
Volunteer
Other Peers
Query AppTest
76Tracker Volunteers
Content/Key Tracker
Volunteers
Other Peers
Query AppTest
77DSL-Torrent
- How to seed your torrent?
- Use DSL to search for all the volunteers
- You can screen out unqualified trackers by not
contacting them. (owner controllability) - How to contact/select the tracker(s)?
- Use the keywords, of course
- But, use the right aggregation keywords to reach
the trackers closer to the UCDavis social
circle!
78(No Transcript)
79Tracking the BT clients
- Seed
- Tracker
- With Trackerless, the inspector might become the
tracker itself to record all the IP addresses of
the peers - Traceability vs. Privacy
- How about DSL-Torrent?
80Applications
- 911-like scenarios (power/infrastructure)
- Commercial and non-Commercial Advertisements for
the local community. - Ad Hoc Peer-to-Peer Sharing without the Internet!
81Applications
- 911-like scenarios (power/infrastructure)
- Commercial and non-Commercial Advertisements for
the local community. - What is a community?
- Ad Hoc Peer-to-Peer Sharing without the Internet!
82Community-Oriented Social Network
- Peers sharing some common interests
- Communities intersect
- Community as a boundary for information flow and
policy
83Community-Oriented Social Network
- Peers sharing some common interests
- Communities intersect
- Community as a boundary for information flow and
policy - How to establish a community?
- How to maintain the membership?
- How to set the inter- intra- community policy?
84Forming a Community
- UCDavis as a community
- When should we have a community for Aggie?
- Davis, California, Aggie
85Scope-Limiting Keyword Propagation
86Scope-Limiting Keyword Propagation/Flooding
87Scope-Limiting Keyword Propagation/Flooding
88Penalization on Spams
- If Karl had forwarded lots of junk mails to
Felix, then Felix will lower the priority of the
social link between them. - Karl will be informed about the downgrade.
- Karl needs to investigate which messages (from
which incoming DSLs) were causing the downgrade
and penalize toward the sources.
89DSL Email
90(No Transcript)
91Parallel/Overlay Communication
92DSL is an old idea!
A
B
- We, as human, have been using similar
communication principles. Maybe it is a good
opportunity to re-think about our cyber
communication system. - Identity is a per-application, context-oriented,
and sometime relative issue. - Forming cyber communities of interests for
application.
F
A
B
F
F
93DSL is still an old idea!
A
B
- Many applications already have social network
like structure to enable P2P sharing across
Internet. - e.g., media sharing, on-line game, restaurant
recommendation, - Should we push these into a generic Social
Network layer-3 to support all the applications?
F
A
B
F
F
94A Different Internet?!
- Current Internet every IP address will be able
to communicate with every other IP address! - Allow by Default
- DSL-based Internet we have a large number of
pairs (two entities and their corresponding
direct social link) - Deny by Default
95Comparison
- IP/email
- Convergence to an absolute consistent state
- IP/email addresses are all you need, but the
controllability is biased toward the sender - DSL
- Convergence to a relative consistent state
- No global network identity. Every DSL entity
defines its own relative identity based on origin
keywords. - Controllability is more balanced with other
application challenges.
96Spam on DSL
- Still needs much more evaluation on how the
spammer can exploit the DSL framework. - But, maybe some spammers will no longer spam
economically! - Social network will give the merchants much
better channels to send their advertisements! - Using spam to deliver product information over
DSL might seriously hurt the sales on the social
channels. - Still there will still be some global spam
activities.
97(No Transcript)
98Acknowledgement
A
B
- Lerone Banks
- Dimitri DeFigueiredo
- Felix Huang
- Juan Lang
- Xiaoming Lu
- Matt Spear
- Shih-Ming Tsang
- Shawn Ye
more info wu_at_cs.cudavis.edu
F
A
B
F
F
99Questions?
wu_at_cs.ucdavis.edu or DSL to me