Davis Social Links S. Felix Wu Computer Science Department University of California, Davis

Slides:



Advertisements
Similar presentations
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Advertisements

Delivery and Forwarding of
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
Davis Social Links FIND: Facebook-based INternet Design S. Felix Wu Computer Science Department University of California, Davis
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Ecs289m Spring, 2008 Online Social Network (1) S. Felix Wu Computer Science Department University of California, Davis
Kyushu University Graduate School of Information Science and Electrical Engineering Department of Advanced Information Technology Supervisor: Professor.
02/06/2006ecs236 winter Intrusion Detection ecs236 Winter 2006: Intrusion Detection #4: Anomaly Detection for Internet Routing Dr. S. Felix Wu Computer.
UCDavis, ecs251 Spring /18/2007Davis Social Links1 Davis Social Links A Socially Structured P2P System S. Felix Wu University of California, Davis.
04/05/20011 ecs298k: Routing in General... lecture #2 Dr. S. Felix Wu Computer Science Department University of California, Davis
TCP/IP Protocol Suite 1 Chapter 6 Upon completion you will be able to: Delivery, Forwarding, and Routing of IP Packets Understand the different types of.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Cyber Security Challenges a social informatics touch on old attacks S. Felix Wu University of California, Davis 16/5/2013IEEE Intelligence and Security.
Ad Hoc Wireless Routing COS 461: Computer Networks
Computer Networks Layering and Routing Dina Katabi
Brand Engagement Study - Retail. Brand Engagement Studies To demonstrate the ability of internet advertising to drive engagement To measure the effects.
TCP/IP Protocol Suite 1 Chapter 6 Upon completion you will be able to: Delivery, Forwarding, and Routing of IP Packets Understand the different types of.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
The Internet Present By Tianyi Xiao ID : C  The Internet is a global system of interconnected computer networks that use the standard Internet.
1 Internet Protocol: Forwarding IP Datagrams Chapter 7.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
Internet Application. understanding Addresses Routing of Instant Messaging Collaborative Computing Grid Social networking Forums Societies.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
© 2008 IBM Corporation ® Atlas for Lotus Connections Unlock the power of your social network! Customer Overview Presentation An IBM Software Services for.
10/8/2015CST Computer Networks1 IP Routing CST 415.
1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Spring 2006Computer Networks1 Chapter 2 Network Models.
1 Overview Remember, we are just beginning to herd the cats. Much of this will become clearer LATER! The more we learn, the more all of this will come.
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Node Lookup in P2P Networks. Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
K. Salah1 Security Protocols in the Internet IPSec.
Chapter 29 Peer-to-Peer Paradigm Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Ahoy: A Proximity-Based Discovery Protocol Robbert Haarman.
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
Multi Node Label Routing – A layer 2.5 routing protocol
Project Management: Messages
Copyright notice © 2008 Raul Jimenez - -
CCT356: Online Advertising and Marketing
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Telemedicine.
IP Forwarding Covers the principles of end-to-end datagram delivery in IP networks.
CHAPTER 3 Architectures for Distributed Systems
Internet Networking recitation #4
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
IP Forwarding Relates to Lab 3.
IP Forwarding Relates to Lab 3.
IP Forwarding Relates to Lab 3.
Meeting, training & teaching in the interactive iWorld
Delivery, Forwarding, and Routing of IP Packets
IP Forwarding Relates to Lab 3.
Delivery, Forwarding, and Routing of IP Packets
IP Forwarding Relates to Lab 3.
Presentation transcript:

Davis Social Links S. Felix Wu Computer Science Department University of California, Davis

09/10/2007Davis Social Links2 Internet Basic datagram service between one IP address and another Routing: exchanging the information regarding the address space and how to reach them. “Allow by Default” Applications built on top of the services –MySpace, Facebook, Orkut, SecondLife, LiveJournal, LinkedIn, Wikipedia, Skype, Google, Bittorrent, LimeWire, Youtube, IM,…

09/10/2007Davis Social Links3 Easy to Send & Receive Many, if not most, in our society can quickly learn how to use & Internet. You don’t need to understand the low level details (e.g., how SMTP, BGP, OLSR or AODV really works or what my current IP address is) before you can communicate with your friends as long as you know their identity!

09/10/2007Davis Social Links4 Urgent! Please contact me! FROM:MR.CHEUNG PUI Hang Seng Bank Ltd Sai Wan Ho Branch 171 Shaukiwan Road Hong Kong. Please contact me on my personal box Let me start by introducing myself. I am Mr. Cheung Pui,director of operations of the Hang Seng Bank Ltd,Sai Wan Ho Branch. I have a obscured business suggestion for you. Before the U.S and Iraqi war our client Major Fadi Basem who was with the Iraqi forces and also business man made a numbered fixed deposit for 18 calendar months, with a value of Twenty Four millions Five Hundred Thousand United State Dollars only in my branch. Upon maturity several notice was sent to him,…

09/10/2007Davis Social Links5 ITRI considers this as a spam!

09/10/2007Davis Social Links6 Easy to Send & Receive Easy for both the good users and the spammers. (fair simplicity) The spammers abuse the “sending” right, while the good users have very limited options to counter back. –how easy can we change our address? –how often do we need to do that? A “receiver” or “the owner of the identity” should have some control. –But, that means also “burden” to the users.

09/10/2007Davis Social Links7 Easy to Send & Receive Easy for both the good users and the spammers. (fair simplicity) The spammers abuse the “sending” right, while the good users have very limited options to counter back. –how easy can we change our address? –how often do we need to do that? A “receiver” or “the owner of the identity” should have some control. –But, that means also “burden” to the users.

09/10/2007Davis Social Links8 Possible Ideas of Future Internet Allow by Default versus Deny by Default Receiver versus Sender controllability Reconsider the role of Service Providers versus P2P

09/10/2007Davis Social Links9 DSL (Davis Social Links) Principle: –Effective human communication reflects the social/trust relationship and reputation within our society. Design: –Can we integrate and enhance our cyber communication system with the human social/trust model? AB AB F F F

09/10/2007Davis Social Links10

09/10/2007Davis Social Links11 Social Networking Social Network services –Friendster, MySpace, Facebook, Orkut, LinkedIn.. Social Links, Interest Keywords, Search & Community Services

09/10/2007Davis Social Links12 Social Networks: # of Users FaceBook ~34M Friendster ~47M Hi5 ~50M LinkedIn ~12M MySpace~200M Orkut ~47M Yahoo! 360 o ~4M … among many others.

09/10/2007Davis Social Links13

09/10/2007Davis Social Links14 Social Network Access Interfaces FBML - Facebook Markup Language FQL - Facebook Query Language REST (REpresentational State Transfer) Web API FBJS - Implementation of Javascript on the Facebook platform

09/10/2007Davis Social Links15 DSL (Davis Social Links) Principle: –Effective human communication reflects the social/trust relationship and reputation within our society. Design: –Can we integrate and enhance our cyber communication system with the human social/trust model? AB AB F F F

09/10/2007Davis Social Links16 The same message content “M” from Cheung Pui “M” from Cheung Pui via IETF mailing list “M” from Cheung Pui via Karl Levitt

09/10/2007Davis Social Links17 Social Link Identification “M” from Cheung Pui  Probably a spam “M” from Cheung Pui via IETF mailing list  Probably not interesting “M” from Cheung Pui via Karl Levitt  Better be more serious…

09/10/2007Davis Social Links18 Social Link Identification “M” from Cheung Pui  Probably a spam “M” from Cheung Pui via IETF mailing list  Probably not interesting “M” from Cheung Pui via Karl Levitt  Better be more serious… Either “M” is important, or Karl’s machine has been subverted!

09/10/2007Davis Social Links19 A Social Link representing a trust relationship between two directly communicating entities Trust Attribute

09/10/2007Davis Social Links20 A Direct Social Link Karl is a very well respected individual to me! I suspect that Karl is too busy to install the latest patches! Trust Attribute

09/10/2007Davis Social Links21 Message Value & Prioritization Application IDS Link Ranks Reputation Incentives Other Trust Metrics

09/10/2007Davis Social Links22 DSL (Davis Social Links) One important goal: –Can we build a P2P social network service? –Allows Search/Crawl and Control –Scalable and Secure/Robust –“Control” implies relatively more dynamic social network! AB AB F F F

09/10/2007Davis Social Links23 A Path of Social Links

09/10/2007Davis Social Links24 Receiving an via a Path of Social Links

09/10/2007Davis Social Links25 A Couple of Issues first… How to discover the social route path, if no direct social link exists? How to prevent spammers from easily discovering a large number of valid social paths?

09/10/2007Davis Social Links26 Social Keywords Soccer, BGP, Davis, California, Intrusion Detection,…

09/10/2007Davis Social Links27 Social Keywords Soccer, BGP, Davis, California, Intrusion Detection,… Social keywords represents my interests and the semantic/social interpretation of myself. Ownership

09/10/2007Davis Social Links28 Cultural & Natural Language 工研院, BGP, 台灣, Students, Committee, Soccer

09/10/2007Davis Social Links29 IP IP address is all we need to communicate and everything else is on top of IP. IP is global “routable” identity However, too simple to be perfect?! –Can we remove the need for global routable identities?

09/10/2007Davis Social Links30 Identifier & Keyword Under DSL, each peer has its own decision or policy regarding what “social keywords” to announce, and it can change the announcement itself any time. NO global unique network-wide identifier –No unique IP address or address in the “network” layer –Identity only in the application layer Relative Peering relationship only –Local “link” identity

09/10/2007Davis Social Links31 DSL Let’s decide some of the “everything else” –Global Flooding (w/o GRI) Then, we decide the possible candidates for us to communicate –Scope-limiting Finally, we rely on the Application layer to nail down the “one” or “ones”.

09/10/2007Davis Social Links32 Multiple Social Links BGP, Davis, California, Intrusion Detection,… Soccer, Wine, Bike, Davis, California,…

09/10/2007Davis Social Links33 Policy-Driven Forwarding BGP, Davis, California, Intrusion Detection,… Soccer, Wine, Bike, Davis, California,…

09/10/2007Davis Social Links34 Propagation & Aggregation

09/10/2007Davis Social Links35 Aggregation Ownership Similar to Scope-Limited Flooding in Gnutella/Freenet, but more scalable with aggregation.

09/10/2007Davis Social Links36 Scalability & Locality Ownership football soccer ???

09/10/2007Davis Social Links37 Scalability & Locality Ownership football soccer Davis

09/10/2007Davis Social Links38 How to find “content X”? Owner of XOther Peers Remember that under DSL there is no such thing called “global identifier”.

09/10/2007Davis Social Links39 Use the right “keywords for X”! Owner of XOther Peers Query Davis soccer

09/10/2007Davis Social Links40 Layering TCP/IP Link Application IP-like Traditional layer-2 Application DSL Social Layer Social Link Layer-2

09/10/2007Davis Social Links41 A Social/Overlay Link

09/10/2007Davis Social Links42 Davis - Washington DC - Sacramento Social path discovery Sending the real messages along the path

09/10/2007Davis Social Links43 Route Discovery Keywords and aggregated keywords “content addressable s”

09/10/2007Davis Social Links44 Function F(incoming) = outgoing Potential Receivers Potential Senders incomingoutgoingDSL ID Davis CaliforniaJapan001 JapanNorthern California Davis CA Northern California Policy driven Maybe itself a service

09/10/2007Davis Social Links45 Forwarding: Source Routing Sender: Data packet SR 003, 001

09/10/2007Davis Social Links46 Forwarding: Source Routing Sender: Data packet SR 003, 001

09/10/2007Davis Social Links47 Privacy and Accountability No single intermediate node will have the knowledge, at least in the network layer, about “who is talking to who on what”. –In DSL, no global identifier. However, the messages themselves contain sufficient information to trace back toward the “social path”, if necessary and nodes are collaborative. –BTW, this (tracing on a per packet/ basis) is impossible for today’s Internet, even for “route path”.

09/10/2007Davis Social Links48

09/10/2007Davis Social Links49 Problems with Overlay Triangle Overlay Routing –Davis, Washington DC, Sacramento –Traffic following the Social/Overlay path You can still bed DDoS’ed or Spammed! –IP/ addresses are still there.

09/10/2007Davis Social Links50 MANET in Airport, Train, Flight Application DSL Social Layer Social Link Layer-2 Who has the 1307th piece of media X? Promotion on new Pizza toppings A,B, & C! Who has seen this lost baby girl in the past 3 minutes? Who wants to play OK-bridge or Warcraft-III?

09/10/2007Davis Social Links51 DSL-wifi Link Established –representing a neighbor relationship in the application layer

09/10/2007Davis Social Links52 MANET MANET (Mobile Ad Hoc Network) –Network Layer Identify

09/10/2007Davis Social Links53 Infrastructure-less Content Sharing Conference/Meeting –File Transfer Infrastructure  Infrastructure-less Identification

09/10/2007Davis Social Links54 DSL Routing

09/10/2007Davis Social Links55 DSL Keyword Propagation

09/10/2007Davis Social Links56 A “Relative” Identity under DSL “Key words” plus one DSL path –Why will this be sufficient for communication? –Especially, when even the DSL information itself is decentralized? (I.e., in general, no one single DSL router knows the complete DSL path.)

09/10/2007Davis Social Links57

09/10/2007Davis Social Links58 DSL in a Social Network Owner of XOther Peers Query AppTest Davis Soccer

09/10/2007Davis Social Links59 Examples I want to find all the pizza places in Davis. –Can I do it without yet another service provider? –How about “unpopular topics”? Can I find the contact information for Felix Wu in Davis (who is interested in soccer)?

09/10/2007Davis Social Links60 DSL vs. Google

09/10/2007Davis Social Links61 “Google” It’s about the “content” –Data-centric networking. Input to the Engine –A set of key words characterizing the target document. Output –A set of documents/links matching the keywords

09/10/2007Davis Social Links62 “DSL” It’s also about the “content” –Application will decide the mechanism to further the communication. Input to the Decentralized Engine –A set of key words characterizing the target document (plus the aggregation keywords). Output –A set of DSL entities with the DSP (Davis Social Path pointer) matching the keywords

09/10/2007Davis Social Links63 DSL Search Engine DSL Social World Receiver or Content Sender or Reader We are not just connecting the IP addresses! We are connecting all the contents that can be interpreted!

09/10/2007Davis Social Links64 Google vs. DSL Google is essentially a “routing” framework between the contents and their potential consumers. Google decides how to extract the “key words” from your (the owner) web page or document.

09/10/2007Davis Social Links65 Google vs. DSL Google is essentially a “routing” framework between the contents and their potential consumers. Google decides how to extract the “key words” from your (the owner) web page or document. A DSL “owner/receiver to be” has the complete control over that. A balance between: –How I would like others to know about me? And, I might want different folks to know me in different ways! –How I can differentiate myself from other Felix Wu?

09/10/2007Davis Social Links66 Applications 911-like scenarios (power/infrastructure) Commercial and non-Commercial Advertisements for the local community. Ad Hoc Peer-to-Peer Sharing without the Internet!

09/10/2007Davis Social Links67 Unstructured P2P Where is this piece of music? What is the location of this content? What is the current IP address of this skype user?

09/10/2007Davis Social Links68 Structured P2P

09/10/2007Davis Social Links69 DHT-based BT Tracker Index key (Content- Dependent) The owner of the identifier matching this hash entry will be the tracker for the corresponding index key! Sharing/Downloading FreeBSD 5.4 CD images PUT & GET

09/10/2007Davis Social Links70 DHT-based P2P Index key Routing from a key to an identifier PUT & GET

09/10/2007Davis Social Links71 DHT vs. DSL DHT –[Contents, Keys, Identifiers] –Conceptually, we have a global hash table! DSL –[Contents, Keys, Relative Identifiers] –Social/trust relationships along the route path

09/10/2007Davis Social Links72 No Unique Identifier!!! Two peers might announced exactly the same set of keywords! Both of them will receive the query, and this might not be a problem. Usually, end2end applications can tell which one (or ones) is really wanted.

09/10/2007Davis Social Links73 Trackerless BitTorrent Owner of XOther Peers Query AppTest

09/10/2007Davis Social Links74

09/10/2007Davis Social Links75 Tracker Volunteer VolunteerOther Peers Query AppTest Content/Key Tracker

09/10/2007Davis Social Links76 Tracker Volunteers VolunteersOther Peers Query AppTest Content/Key Tracker

09/10/2007Davis Social Links77 DSL-Torrent How to seed your torrent? –Use DSL to search for all the volunteers –You can screen out “unqualified” trackers by not contacting them. (owner controllability) How to contact/select the tracker(s)? –Use the keywords, of course –But, use the right aggregation keywords to reach the trackers closer to the “UCDavis” social circle!

09/10/2007Davis Social Links78

09/10/2007Davis Social Links79 Tracking the BT clients Seed Tracker With Trackerless, the inspector might become the tracker itself to record all the IP addresses of the peers –Traceability vs. Privacy How about DSL-Torrent?

09/10/2007Davis Social Links80 Applications 911-like scenarios (power/infrastructure) Commercial and non-Commercial Advertisements for the local community. Ad Hoc Peer-to-Peer Sharing without the Internet!

09/10/2007Davis Social Links81 Applications 911-like scenarios (power/infrastructure) Commercial and non-Commercial Advertisements for the local community. –What is a community? Ad Hoc Peer-to-Peer Sharing without the Internet!

09/10/2007Davis Social Links82 Community-Oriented Social Network Peers sharing some common interests Communities intersect Community as a boundary for information flow and policy

09/10/2007Davis Social Links83 Community-Oriented Social Network Peers sharing some common interests Communities intersect Community as a boundary for information flow and policy How to establish a community? How to maintain the membership? How to set the inter- & intra- community policy?

09/10/2007Davis Social Links84 Forming a Community “UCDavis as a community” “When should we have a community for Aggie?” –Davis, California, Aggie

09/10/2007Davis Social Links85 Scope-Limiting Keyword Propagation Davis Soccer

09/10/2007Davis Social Links86 Scope-Limiting Keyword Propagation/Flooding Davis Soccer

09/10/2007Davis Social Links87 Scope-Limiting Keyword Propagation/Flooding Davis Soccer

09/10/2007Davis Social Links88 Penalization on Spams If Karl had forwarded lots of junk mails to Felix, then Felix will lower the priority of the social link between them. Karl will be informed about the downgrade. Karl needs to investigate “which messages” (from which incoming DSLs) were causing the downgrade and penalize toward the sources.

09/10/2007Davis Social Links89 DSL

09/10/2007Davis Social Links90 DSL Route Discovery & Trust Management DSL Forwarding Plane

09/10/2007Davis Social Links91 Parallel/Overlay Communication

09/10/2007Davis Social Links92 DSL is an old idea! We, as human, have been using similar communication principles. Maybe it is a good opportunity to re-think about our cyber communication system. Identity is a per-application, context- oriented, and sometime relative issue. Forming cyber communities of interests for application. AB AB F F F

09/10/2007Davis Social Links93 DSL is still an old idea! Many applications already have “social network like” structure to enable P2P sharing across Internet. e.g., media sharing, on-line game, restaurant recommendation,… Should we push these into a generic Social Network layer-3 to support all the applications? AB AB F F F

09/10/2007Davis Social Links94 A Different Internet?! Current Internet: every IP address will be able to communicate with every other IP address! –Allow by Default DSL-based “Internet”: we have a large number of “pairs” (two entities and their corresponding direct social link) –Deny by Default

09/10/2007Davis Social Links95 Comparison IP/ –Convergence to an absolute consistent state –IP/ addresses are all you need, but the controllability is biased toward the sender DSL: –Convergence to a relative consistent state –No global network identity. Every DSL entity defines its own relative identity based on origin keywords. –Controllability is more balanced with other application challenges.

09/10/2007Davis Social Links96 Spam on DSL Still needs much more evaluation on how the spammer can exploit the DSL framework. But, maybe some spammers will no longer spam economically! –Social network will give the merchants much better channels to send their advertisements! –Using spam to deliver product information over DSL might seriously hurt the sales on the social channels. –Still there will still be some global spam activities.

09/10/2007Davis Social Links97

09/10/2007Davis Social Links98 Acknowledgement Lerone Banks Dimitri DeFigueiredo Felix Huang Juan Lang Xiaoming Lu Matt Spear Shih-Ming Tsang Shawn Ye AB AB F F F more info:

09/10/2007Davis Social Links99 Questions? or DSL to me