1
Davis Social LinksSocial Network Kernel for Future Internet Design
Norm Matloff, Michael Neff, S. Felix Wu, Computer ScienceDiane FelmleeSociologyUniversity of California, Davishttp://www.facebook.com/people/S_Felix_Wu/581205756http://www.cs.ucdavis.edu/~wu/
2
SMTP
SMTP as an example…
It’s about communication between two networked entities…
3
Internet
SMTP
4
SMTP
Internet Architecture& Routing
• Any identity (email address, IP, url) can communicate with any one else.– Email, web, bittorrent, warcraft, skype…
5
The emails I received typically…
6
You have a few seconds to decide……
7
To me personally, this is a typical social spam.
8
Oops…
9
10
11/16/2007
11/26/2007
In my office
11/27/2007
Spammed?
12/10/2007
“Memoryless”For Felix Wu
11
SMTP
12
SMTP
13
SMTP
Felix Lerone
14
Social-Control Routing
Internet Applications
12
3
SMTP
15
Social-Control Routing
12
3
SMTP
16
17
The value of the “Social Network”
• Social Network has its own unique value in facilitating human communication
• A concern about a network losing its “value”– while we are unsure about how to quantify the true value…
18
Don’t worry about the language…
19
20
Fighter’s Club
• A Coalition game ~ like Warcraft• Team members who are Facebook friends receive higher fighting powers
• ~1400 new friendships established daily
• ~10% of users with >95% friendships purely based on this game.
21
Open Issues
• What is the “value” of this social network?
• How would this “value” be distributed and allocated to each individual peers?
• MySpace, Facebook, LinkedIn didn’t define the “game” for network formation and value allocation.– But, it is important to design the game such that the OSN will eventually converge to a state to best support the communities.
22
Friendship requested
23
Friendship requested
BTW, this guy stole 24 millions dollars from me during my DSL demo to George Kesides!
24
Research Issues
• How to systematically leverage the Social Network?
• How to architect the Social Network itself such that its value can be protected?
• And, plus a few typical CS concerns– Decentralization, Scalability, Privacy/Trust…
25
SMTP
Felix Lerone
26
SMTP
Felix Lerone
27
SMTP
Felix Lerone
DSL Kernel
Policy/Reputation-basedRoute discovery
Social Context
28
SMTP
Felix Lerone
DSL Kernel
Policy/Reputation-basedRoute discovery
Social Context
29
30
SMTP
Felix Lerone
DSL Kernel
Policy/Reputation-basedRoute discovery
Social Context
Wrapper
CommunityOriented
Keywords
31
32
DSL Kernel
Policy/Reputation-basedRoute discovery
CommunityOriented
Keywords
Name-IDresolution
Social Context
DSLoFB
SMTP
Felix Lerone
Divert
Native DSLApplicationsand Games
ExistingApplications
Wrapper
33
DSL Kernel
Social Context
SMTP
Felix Lerone
Divert
Wrapper
34
DSL Kernel
Social Context
SMTP
Felix Lerone
Divert
Wrapper
35
DSL Kernel
Social Context
SMTP
Felix Lerone
Divert
Wrapper
36
DSL Kernel
Social Context
SMTP
Felix Lerone
Divert
Wrapper
37
DSL Kernel
Social Context
DSLoFB
SMTP
Felix Lerone
Divert
Wrapper
UFS(inode)/GFSDistributed FB
38
DSL Kernel
Social Context
DSLoFB
SMTP
Felix Lerone
Divert
Wrapper
UFS(inode)/GFSDistributed FB
Cache Buffer
VFS(vnode)
System Calls
Trap into the SN kernel
OS Architecture Analogy
Authentication
39
DSL Kernel
Policy/Reputation-basedRoute discovery
CommunityOriented
Keywords
Name-IDresolution
Social Context
DSLoFB
SMTP
Felix Lerone
Divert
Native DSLApplicationsand Games
ExistingApplications
Wrapper
40
Just a couple issues …
• How to establish the social route?– How would “A” know about “D” (or “D’s identity”) ?
• How to maintain this “reputation network”?– KarmaNet: A Feed-back Trust Control System
41
Who is Salma?
42
My message to Salma
43
The Social Path(s)
44
Community
• A connected graph of social nodes sharing a set of community attributes
45
Community Control:
C
D
Who should receive the keyword announcement for “[email protected]”? Answer: Who should receive the keyword announcement fot “South Lake Tahoe Tournament”? Answer:
E
46
as the Social Peer
• Attributes:– {McDonald’s Express, 640 W Covell Blvd, # D, Davis, (530) 756-8886, Davis Senior High School, Community Park, North Davis}
47
“Per-Keyword Policy”
• For each keyword, we will associate it with a propagation policy: [T, N, A]– T: Trust Value Threshold– N: Hop counts left to propagate (-1 each step)
– A: Community Attributes
• Examples:– [>0.66, 4, “Davis”] K via L1
– [>=0, , ] K via L2
€
∞
€
∅
48
Scalability & Controllability
• McDonald’s doesn’t want to flood the whole network– It only wants to multicast to the “Target set” of customers
• And, it only wants this target set of users being able to use that particular keyword to contact.– Receiver/owner controllability
49
http
Anybody with an IP address
Roughly your friends (or friend2s)
50
http
Anybody with an IP address
Roughly your friends (or friend2s)
Quality of the Friendship may have been out of control…
51
http
Anybody with an IP address
Roughly your friends (or friend2s)
52
“Per-Keyword Policy”
• For each keyword, we will associate it with a propagation policy: [T, N, A]– T: Trust Value Threshold– N: Hop counts left to propagate (-1 each step)
– A: Community Attributes
• Examples:– [>0.66, 4, “Davis”] K via L1
– [>=0, , ] K via L2
€
∞
€
∅
53
54
Simulation study of 100K+ nodes…
55
http
Anybody with an IP address
Roughly your friends (or friend2s)
Privacyas social values
56
DSL is an old idea!
We, as human, have been using similar social communication principles. Maybe it is a good opportunity to re-think about our cyber communication system.
Identity is a per-application, context-oriented, and sometime relative issue.
Forming cyber communities of interests for application.
A B
A BF
FF
And, I certainly don’t have the answer yet…
57
Internet {old/new} Applications
12
3
SMTP
58
Internet {old/new} Applications
12
3
SMTP
DSL Kernel
Social Context
Policy/Reputation-basedRoute discovery
CommunityOriented
Keywords
Name-IDresolution
59
Internet {old/new} Applications
12
3
SMTP
ISP + SCSP(Social Community Service Provider)
60