Title: Davis Social Links FIND: Facebook-based INternet Design
1Davis Social LinksFIND Facebook-based INternet
Design
S. Felix Wu Computer Science Department University
of California, Davis wu_at_cs.ucdavis.edu http//www
.facebook.com/sfelixwu http//dsl.cs.ucdavis.edu
2Future Internet Design
- We only know a little bit about what we dont
want. - We really need to know the requirements of the
future!
3Future Internet Design
- We only know a little bit about what we dont
want. - We really need to know the requirements of the
future! - What are the possible future applications and why
will the current Internet architecture be
insufficient?
gap
4Internet
SMTP
33130 Autonomous Systems 311755 Address
Prefixes announced
BGP DNS
http//bgp.potaroo.net/cidr/
5Unique Routable Identity
Destination Identity is the ONLY thing you need
to communicate with that particular identity!
6Unique Routable Identity
SMTP
- Any identity (email address, IP, url) can
communicate with any one else. - Email, web, bittorrent, warcraft, skype
Destination Identity is the ONLY thing you need
to communicate with that particular identity!
7Properties
- Unique global network-layer identifier
- IPv4/v6 addresses
- Global connectivity
- The primary job of BGP
- 311755 Address Prefixes announced
8The emails I received typically each morning
Spam as just an example
9SMTP
10SMTP
11We are trying to make the information of social
context and relationship explicit!
SMTP
Eric
Felix
Dualism
Justin
12SMTP
Eric
Felix
Facebook
13SMTP
Existing Applications
Native DSL Applications and Games
Wrapper
Eric
Felix
Social Context
DSL Kernel
Community Oriented Keywords
Name-ID resolution
Policy/Reputation-based Route discovery
Facebook
DSLoFB
14SMTP
SoEmail
Eric
Felix
Social Context
DSL Kernel
Community Oriented Keywords
Name-ID resolution
Policy/Reputation-based Route discovery
Facebook
DSLoFB
15What should be the social context for this
interaction?
16(No Transcript)
17(No Transcript)
18(No Transcript)
19Internet
SMTP
33130 Autonomous Systems 311755 Address
Prefixes announced
BGP DNS
http//bgp.potaroo.net/cidr/
20Social-Control Routing
SMTP
3
2
1
21Social/Application
SMTP
22Social/Networking
Relationship-Oriented Networking
3
2
1
23Social/Networking
Relationship Graph Abstraction/Dynamics
3
2
1
24Social-View of Network-Layer DDoS
Remapping, Soft Binding, Trust-based
Prioritization
25Relationship-Oriented Network
- Everything is a social node
- E.g.,
- Your Facebook profile
- URL XYZ
- Your own email message
- Composition (text, forwarded text, URL)
- Author of the message
26RON
- Packets - Relationships (Cisco)
- Graph! (abstraction/aggregation of the
application activities at that moment or over a
period of time) - Security applications
- Pricing models
- Lower layer network route (ISP)
- Mapping
27(No Transcript)
28Social Network has its potential value in
communication!!
29The value of the Social Network
- Social Network has its own unique value in
facilitating human communication - A concern about a network losing its value
- while we are unsure about how to quantify the
true value
30Social Network Games
31http//apps.facebook.com/fightersc/ongoingfights
32Fighters Club
- A couple millions users
- A Coalition game like Warcraft
- Team members who are Facebook friends receive
higher fighting powers - 1400 new friendships established daily
- 10 of users with gt95 friendships purely based
on this game.
33Open Issues
- What is the value of this social network?
- How would this value be distributed and
allocated to each individual peers? - MySpace, Facebook, LinkedIn didnt define the
game for network formation and value
allocation. - But, it is important to design the game such that
the OSN will eventually converge to a state to
best support the communities.
34http
Roughly your friends (or friend2s)
Anybody with an IP address
35(No Transcript)
3640 to 300 to 350 millions
37(No Transcript)
38http
Roughly your friends (or friend2s)
Quality of the Friendship may have been out of
control
A typical politician in Taiwan has about 3K FB
friends!
Anybody with an IP address
39http
real human social network
Roughly your friends (or friend2s)
online social network
Quality of the Friendship may have been out of
control
A typical politician in Taiwan has about 3K FB
friends!
Anybody with an IP address
40http
What we really want
Roughly your friends (or friend2s)
Anybody with an IP address
41Value of OSN
- How to leverage the value of Online Social
Network in Computing/Communication? - Privacy/Confidentiality, Social Ranking
- How to architect the Social Network itself such
that its value can be protected? - Trust and Reputation
42Social Computing
Future Applications
Online Social Computing/Networking Service
Infrastructure
FIND
Internet
Network Virtualization
43XYZ???
Considering No IP/IPv6 addresses No DNS/BGP
Routing in the social network layer
44Who is Salma?
45My message to Salma
46My message to Salma
47The Social Path(s)
48doesnt know the address of
B
D
A
C
A has to explicitly declare if there is any
social context under this communication activity
with D! But, D only cares if it is from C
or not!
49Finding
B
D
A
C
A2D, while D is McDonalds! D would like
customers to find the right route. idea
keyword propagation e.g., McDonalds
50Internet Connection
- IP address/Gateway DNS server
51Social Internet Connection
- IP address/Gateway DNS server
- My Direct Friends
- What I should tell my friends about myself
(unnecessary)
SoISP ATT Facebook
52 as the Social Peer
- Attributes (available only to direct friends)
- McDonalds Express, 640 W Covell Blvd, D,
Davis, (530) 756-8886, Davis Senior High School,
Community Park, North Davis
53Keyword its propagation policy
Trust
Hop Count
Community Attribute
54Propagating the keywords of
B
D
K McDonalds
A
C
Hop-by-hop keyword propagation
55Propagating the keywords of
B
D
K McDonalds
K McDonalds
A
C
Hop-by-hop keyword propagation
56Propagating the keywords of
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
Hop-by-hop keyword propagation
57Propagating the keywords of
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
Hop-by-hop keyword propagation And, I know I am
doing FLOODING!!
58Control the Flooding
- Internet Addresses
- The scale is much smaller (300K)
- Addressing is hierarchical (aggregation)
- Global connectivity was given on day one
- Social Attributes
- Much larger (350M times of Attributes)
- Unstructured naming
- Global social connectivity is being developed by
the social network itself
59in Community of Davis
B
D
A
C
Who should receive the keyword announcement for
McDonalds?
60Per-Keyword Propagation Policy
- For each keyword, we will associate it with a
propagation policy T, N, A - T Trust Value Threshold
- N Hop counts left to propagate (-1 each step)
- A Community Attributes
- Examples
- gt0.66, 4, Davis K via L1
- gt0, , K via L2
61Social/Community Attributes
B
D
A
C
Who should receive the keyword announcement for
McDonalds? Answer
62Community
B
D
A
C
63Community
B
D
A
C
- A connected graph of social nodes sharing a set
of community attributes
64We lost Global Connectivity!
- We cannot propagate all the keywords too far
away for the concern of scalability. - Global reachability is sacrificed.
- But, Less might well be More
- In between deny and allow by default
- Communication is mutual!
- As an example, if we want to communicate with a
certain far-reach region as our mission, then
we will send a missionary there on OSN!
65reaching Western Africa
66Connecting to Western Africa
Sending a missionary there Socially!
67Now Finding
Q McDonalds
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
- Search Keyword McDonalds
- A might know Ds keyword via two channels
- (1) Somebody else (2) From its friends
- Questions does D need an identity? Scalable?
68We also lost unique identification
- At least, at the social network and keyword layer!
69(No Transcript)
70Phishing Attacks
- Today, somebody would trick us to believe that
they are the official Bank of America! - In DSL, ANYBODY can claim to be BoA as long as
they announce the magic keywords. - So, we are Phishing by Default.
71Why not?
- Relying on IP ( BGP), URL, DNS, and trusted
browser plus uncompromised Javascripts and
captures might not be terribly secure anyway. - We need end-to-end mutual authentication for
certain applications, and more importantly, at
the application layer! - Different applications have different security
requirements!
72Application Tests
- Example 1 credential-oriented
- PKI certificate as the keyword
- If you can sign or decrypt the message, you are
the ONE! (BTW, not all applications need this!) - Example 2 service-oriented
- Service/protocol/bandwidth support
- Example 3 offer-oriented
- Please send me your coupons/promotions!
73Finding
Application Test
Q McDonalds
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
Search Keyword McDonalds Questions is this
the right McDonalds?
74Routable Identity
- Application identity Mgt Network identity
- Network identity Rgt Network identity
- Network identity Mgt Application identity
Application Entity
Application Entity
DNS
BGP
Network Entity
Network Entity
75App/Route Identity
- Application identity Mgt Network identity
- Network identity Rgt Network identity
- Network identity Mgt Application identity
- Keywords (MF-R)gt Multiple Paths
- Application identity selection
- Network route selection
76Social Control Layer
Application Entity
Application Entity
Network Route Selection
Social Entity
Social Entity
Dualism
AL-BGP
Network Entity
Network Entity
77Hijackable Routable Identify
78Application Test ltgt Layer 3
79App/Route Identity
- Application identity Mgt Network identity
- Network identity Rgt Network identity
- Network identity Mgt Application identity
- Keywords (MF-R)gt Multiple Paths
- Application identity selection
- Network route selection
The end user will have some control via the
social layer!
80URI versus ADC
- URI (Unique Routable Identity)
- We assume that our destination target is bound to
an URI. - We assume that both the MAPPING (e.g., DNS) and
ROUTING (e.g., BGP) are correct. - ADC (Application Dependent Credential)
- The lower layer (like search engine) will give us
a few options to click. - The application (or the user) will then choose
the one (or ones).
81A couple issues
- How to establish the social route?
- How would A know about D (or Ds identity)
? - How to maintain this reputation network?
- KarmaNet A Feed-back Trust Control System
82D decides, and rewards/punishes
Pktcgtd
A
B
C
D
Trust(DgtC)
Trust(CgtB)
Trust(BgtA)
Pktbcd
Pktabc
Pktab
83Trust Structure
We want to stabilize these decentralized values
such that they can be used to effectively choose
the best route.
84Routing with Trust
85Simulation study of 100K nodes
86Pairwise 1-way Trust
87(No Transcript)
88(No Transcript)
89Trust/Reputation Systems
- performance and responsiveness to dynamics (of
trust and reputation) - Assuming no oracle or human reset (and we might
not have ground truth in real-time anyway). - operations and management
- Bounded/unbounded for life-time expected attack
instances - Versus bounded for a fix period of time
- Probabilistic versus Deterministic
90SMTP
Existing Applications
Native DSL Applications and Games
Wrapper
Eric
Felix
Social Context
DSL Kernel
Community Oriented Keywords
Name-ID resolution
Policy/Reputation-based Route discovery
Facebook
DSLoFB
91DSL is an old idea!
A
B
And, I certainly dont have the answer yet
- We, as human, have been using similar social
communication principles. Maybe it is a good
opportunity to re-think about our cyber
communication system. - Re-consider the current Internet architecture
- Global Connectivity vs. Mutual Interest
- Unique Routable Identifier vs. Application
Dependent Credential
F
A
B
F
F
92Remarks
- Social-Centric Networking
- Packet/Flow Relationship
- Trust Management
- Social Network in Progression/Development
- Softer/Fuzzy Resolution via Keywords
- Name, Content, Identification
- Semantic Analysis
- Social Network Control to Bridge the Gap
93Future Applications
Online Social Computing/Networking Service
Infrastructure
Bridging the between end users and the network!
FIND
Internet
Network Virtualization
94ISP SCSP(Social Community Service Provider)
SMTP
Internet old/new Applications
3
2
1
95Status
- DSL OSN kernel FAITH ProtoGENI
- The Social Computing Service Layer
- Social Search Engine
- SOaaS (Social Computing as a Service)
- Mapping into Cloud Computing
- Social Applications
- SoEmail, MinB, Calendar, Chat-Room, Games
- Social-Enabled Networking
- FIND (Content-Centric Networking, e.g.)
- How will the L-3 routers leverage the SOaaS?
- New Network Layer Algorithms/Architecture
96Status
- FIND GENI
- Facebook platform plus a suite of applications
- You are welcome to join!
- http//dsl.cs.ucdavis.edu/
97(No Transcript)
98Acknowledgements
- NSF/FIND, GENI, ARO/MURI, CTA, Intel