1 Davis Social Links Social Network Kernel for Future Internet Design Norm Matloff, Michael Neff, S. Felix Wu, Computer Science Diane Felmlee Sociology.

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

EcoTherm Plus WGB-K 20 E 4,5 – 20 kW.
2 Casa 15m Perspectiva Lateral Izquierda.
Repaso: Unidad 2 Lección 2
1 A B C
Simplifications of Context-Free Grammars
Variations of the Turing Machine
1 DSLs with Groovy Saager Mhatre. 2 github.com/dexterous code.google.com/u/saager.mhatre
AP STUDY SESSION 2.
1
& dding ubtracting ractions.
Select from the most commonly used minutes below.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Addition and Subtraction Equations
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
Slide 1 FastFacts Feature Presentation November 11, 2008 We are using audio during this session, so please dial in to our conference line… Phone number:
ASTM Member Website Tools Jeff Adkins Diane Trinsey 1 September 2012 Officers Training Workshop.
David Burdett May 11, 2004 Package Binding for WS CDL.
Local Customization Chapter 2. Local Customization 2-2 Objectives Customization Considerations Types of Data Elements Location for Locally Defined Data.
Create an Application Title 1Y - Youth Chapter 5.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
CALENDAR.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt BlendsDigraphsShort.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
The 5S numbers game..
Media-Monitoring Final Report April - May 2010 News.
Welcome. © 2008 ADP, Inc. 2 Overview A Look at the Web Site Question and Answer Session Agenda.
Break Time Remaining 10:00.
Turing Machines.
Table 12.1: Cash Flows to a Cash and Carry Trading Strategy.
PP Test Review Sections 6-1 to 6-6
Bellwork Do the following problem on a ½ sheet of paper and turn in.
1 The Royal Doulton Company The Royal Doulton Company is an English company producing tableware and collectables, dating to Operating originally.
Operating Systems Operating Systems - Winter 2010 Chapter 3 – Input/Output Vrije Universiteit Amsterdam.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
TESOL International Convention Presentation- ESL Instruction: Developing Your Skills to Become a Master Conductor by Beth Clifton Crumpler by.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1..
Adding Up In Chunks.
FAFSA on the Web Preview Presentation December 2013.
SLP – Endless Possibilities What can SLP do for your school? Everything you need to know about SLP – past, present and future.
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
Facebook Pages 101: Your Organization’s Foothold on the Social Web A Volunteer Leader Webinar Sponsored by CACO December 1, 2010 Andrew Gossen, Senior.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
Artificial Intelligence
Before Between After.
Subtraction: Adding UP
: 3 00.
5 minutes.
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Types of selection structures
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
1 Titre de la diapositive SDMO Industries – Training Département MICS KERYS 09- MICS KERYS – WEBSITE.
Essential Cell Biology
Converting a Fraction to %
Numerical Analysis 1 EE, NCKU Tien-Hao Chang (Darby Chang)
Clock will move after 1 minute
famous photographer Ara Guler famous photographer ARA GULER.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
PSSA Preparation.
Physics for Scientists & Engineers, 3rd Edition
Select a time to count down from the clock above
Copyright Tim Morris/St Stephen's School
1.step PMIT start + initial project data input Concept Concept.
1 Dr. Scott Schaefer Least Squares Curves, Rational Representations, Splines and Continuity.
1 Non Deterministic Automata. 2 Alphabet = Nondeterministic Finite Accepter (NFA)
Davis Social Links FIND: Facebook-based INternet Design S. Felix Wu Computer Science Department University of California, Davis
Presentation transcript:

1 Davis Social Links Social Network Kernel for Future Internet Design Norm Matloff, Michael Neff, S. Felix Wu, Computer Science Diane Felmlee Sociology University of California, Davis

2 SMTP SMTP as an example… Its about communication between two networked entities…

3 Internet SMTP

4 Internet Architecture & Routing Any identity ( address, IP, url) can communicate with any one else. – , web, bittorrent, warcraft, skype…

5 The s I received typically…

6 You have a few seconds to decide……

7 To me personally, this is a typical social spam.

8 Oops…

9

10 11/16 / /26 /2007 In my office 11/27 /2007 Spammed? 12/10 /2007 Memoryless For Felix Wu

11 SMTP

12 SMTP

13 SMTP Felix Lerone

14 Social-Control Routing Internet Applications SMTP

15 Social-Control Routing SMTP

16

17 The value of the Social Network Social Network has its own unique value in facilitating human communication A concern about a network losing its value –while we are unsure about how to quantify the true value…

18 Dont worry about the language…

19

20 Fighters Club A Coalition game ~ like Warcraft Team members who are Facebook friends receive higher fighting powers ~1400 new friendships established daily ~10% of users with >95% friendships purely based on this game.

21 Open Issues What is the value of this social network? How would this value be distributed and allocated to each individual peers? MySpace, Facebook, LinkedIn didnt define the game for network formation and value allocation. –But, it is important to design the game such that the OSN will eventually converge to a state to best support the communities.

22 Friendship requested

23 Friendship requested BTW, this guy stole 24 millions dollars from me during my DSL demo to George Kesides!

24 Research Issues How to systematically leverage the Social Network? How to architect the Social Network itself such that its value can be protected? And, plus a few typical CS concerns –Decentralization, Scalability, Privacy/Trust…

25 SMTP Felix Lerone

26 Facebook SMTP Felix Lerone

27 Facebook SMTP Felix Lerone DSL Kernel Policy/Reputation-based Route discovery Social Context

28 Facebook SMTP Felix Lerone DSL Kernel Policy/Reputation-based Route discovery Social Context

29

30 Facebook SMTP Felix Lerone DSL Kernel Policy/Reputation-based Route discovery Social Context Wrapper Community Oriented Keywords

31

32 Facebook DSL Kernel Policy/Reputation-based Route discovery Community Oriented Keywords Name-ID resolution Social Context DSLoFB SMTP Felix Lerone Divert Native DSL Applications and Games Existing Applications Wrapper

33 DSL Kernel Social Context SMTP Felix Lerone Divert Wrapper

34 DSL Kernel Social Context SMTP Felix Lerone Divert Wrapper

35 DSL Kernel Social Context SMTP Felix Lerone Divert Wrapper

36 DSL Kernel Social Context SMTP Felix Lerone Divert Wrapper

37 Facebook DSL Kernel Social Context DSLoFB SMTP Felix Lerone Divert Wrapper UFS(inode)/GFS Distributed FB

38 Facebook DSL Kernel Social Context DSLoFB SMTP Felix Lerone Divert Wrapper UFS(inode)/GFS Distributed FB Cache Buffer VFS(vnode) System Calls Trap into the SN kernel OS Architecture Analogy Authentication

39 Facebook DSL Kernel Policy/Reputation-based Route discovery Community Oriented Keywords Name-ID resolution Social Context DSLoFB SMTP Felix Lerone Divert Native DSL Applications and Games Existing Applications Wrapper

40 Just a couple issues … How to establish the social route? –How would A know about D (or Ds identity) ? How to maintain this reputation network? –KarmaNet: A Feed-back Trust Control System

41 Who is Salma?

42 My message to Salma

43 The Social Path(s)

44 Community A connected graph of social nodes sharing a set of community attributes

45 Community Control: C D Who should receive the keyword announcement for Answer: Who should receive the keyword announcement fot South Lake Tahoe Tournament? Answer: E

46 as the Social Peer Attributes: –{McDonalds Express, 640 W Covell Blvd, # D, Davis, (530) , Davis Senior High School, Community Park, North Davis}

47 Per-Keyword Policy For each keyword, we will associate it with a propagation policy: [T, N, A] –T: Trust Value Threshold –N: Hop counts left to propagate (-1 each step) –A: Community Attributes Examples: –[>0.66, 4, Davis] K via L 1 –[>=0,, ] K via L 2

48 Scalability & Controllability McDonalds doesnt want to flood the whole network –It only wants to multicast to the Target set of customers And, it only wants this target set of users being able to use that particular keyword to contact. –Receiver/owner controllability

49 http Anybody with an IP address Roughly your friends (or friend 2 s)

50 http Anybody with an IP address Roughly your friends (or friend 2 s) Quality of the Friendship may have been out of control…

51 http Anybody with an IP address Roughly your friends (or friend 2 s)

52 Per-Keyword Policy For each keyword, we will associate it with a propagation policy: [T, N, A] –T: Trust Value Threshold –N: Hop counts left to propagate (-1 each step) –A: Community Attributes Examples: –[>0.66, 4, Davis] K via L 1 –[>=0,, ] K via L 2

53

54 Simulation study of 100K+ nodes…

55 http Anybody with an IP address Roughly your friends (or friend 2 s) Privacy as social values

56 DSL is an old idea! We, as human, have been using similar social communication principles. Maybe it is a good opportunity to re-think about our cyber communication system. Identity is a per-application, context- oriented, and sometime relative issue. Forming cyber communities of interests for application. AB AB F F F And, I certainly dont have the answer yet…

57 Internet {old/new} Applications SMTP

58 Internet {old/new} Applications SMTP DSL Kernel Social Context Policy/Reputation-based Route discovery Community Oriented Keywords Name-ID resolution

59 Internet {old/new} Applications SMTP ISP + SCSP(Social Community Service Provider)

60