SlideShare une entreprise Scribd logo
1  sur  20
10/04/15 110/04/15 1
A Content Centric
Mobile Social Network
Amir Krifa, Amir.Krifa@sophia.inria.fr
Chadi Barakat, Chadi.Barakat@sophia.inria.fr
10/04/15 210/04/15 2
Motivations
 The most visited sites on the Internet:
 #3 MySpace
 #4 YouTube
 #5 Facebook
 #7 Wikipedia
 #11 Blogger.com
 #12 Craigs List
 #15 Photobucket
 #20 Flickr
Network use has evolved
to be DOMINATED by
content distribution and
retrieval services.
10/04/15 310/04/15 3
Motivations
 Current social networking and content distribution
services architecture:
 Services are centralized
 peers’ privacy and content’ security are not well enforced
 Services access is costly (Internet access, specially for mobile
users, ..),
 average user spends more than 55 minutes per day on
Facebook,
 There are more than 65 million active users currently
accessing Facebook through their mobile devices.
 Not Green (more than 350 million active users on Facebook)
 Time consuming while users are not sure to find the correct info
they are looking for or meet the right person,…
10/04/15 410/04/15 4
Motivations
 The provider of the content you are looking for can be just
close !
• Ingenious solution:
• Due to the congestion
on its network, the
AT&T website has
stopped offering phones
to the New York
metropolitan area !
10/04/15 510/04/15 5
Our Approach
 We propose overcome the described challenges by:
 Projecting/Updating people’ online/on board social
networks,
 Your online social networks = People you meet more then X
times/day + Others ( People you do not meet frequently or never
meet)
 Such projection is needed (as initialization step) for understanding
whether an exchange is desirable
 Integrating a “tit for tat” mechanism within each group of
friends in order to:
 Enforce them to share their mobiles’ storage capacities and
wireless connections ( Bluetooth +/ Wi-Fi)
 Setting up a content centric architecture on top of the
mobile social network for content distribution and retrieval
10/04/15 6
 We propose to reduce as much as possible the time
people spend looking for content.
 A user can just express his interests locally and count on his mobility
as well as his friends mobility towards attracting the right content.
Our Approach
A
B
C
D
1
2
3
4
Interested
in FEJ
I propose
and EJ
Private Circle
Find one
content
10/04/15 710/04/15 7
Our Approach
 We propose to extend your private circle of
frequently met friends based on redundant meetings
with unknown people.
 It is a possibility to extend your on board social network starting from
real life meetings
D
C
B
A
4
3
2
1
I post
house
music
I’m looking for
house music
Private Circle
Common Interest + Frequently met
= Potential link, alarm the user
10/04/15 8
Our Approach
 It is also possible that one peer of your private circle
proposes to you a potential new friend.
 One user of your private circle meet frequently an unknown
peer and finds that he satisfies lot of your interests…
 You are notified and it remains up to you to decide
 It is another possibility to extend your real on board social
network…
10/04/15 910/04/15 9
Projecting/Updating people’
online/on board social networks
 Based on redundant /day meetings we can identify
the possible content carries on which we can count.
But,
 Initialization step: Take into consideration people desire
to exchange which is already expressed via online social
networks,
 Then, notify the user once a potential friend is found.
 And it is up to him to decide whether to update his real/on
board social network or not.
10/04/15 10
Per Private Circle “Tit for Tat”
Rules
 Initially, a user private circle = people you meet
frequently who already belong to your online social
network.
 Then, the private circle is extended.
 “Tit for Tat“ rules:
 Each member of your private circle must carries your
interest and try to answer them starting from his daily
meetings.
 Members has to suggest to each others possible new real
life links.
10/04/15 11
Per Private Circle “Tit for Tat”
Rules
 “Tit for Tat“ rules:
 NDCij : number of downloaded
contents from node j to node I
 NUIij : number of uploaded interests
from node I to node j
 NMij : number of meetings between
node I and node j
 DEij = 0/1 : desire to exchange
between node I and node j
 We propose to the user the ability to
access to the rank list of his private
circle’ members and to decide whether
to discard or not a given user from his
list.
ijij
ij
ijj
NMNUI
NDC
DERank
1
∗∗=
10/04/15 12
Scheduling/Drop policy
 In the case of a limited contact opportunity a node
has to:
 First: Try to respectively forward/ask for his local user
contents/interests
 Second: Ask for the interests of his private circle users in
decreasing order of their ranks.
 In the case of a local storage overflow a node has
to:
 Start by dropping the contents/interests of his private circle
users who has the smallest rank.
10/04/15 1310/04/15 13
A Content Centric Architecture
 Reuse the data tagging schema
proposed for content centric networks.
 Users are able to ask/publish either a
specific piece of data or a complete
content category.
10/04/15 14
Node Architecture
Wi-Fi Bluetooth
Social
Links
Store
Content
Store
StoreManager
+DropPolicies
Forwarding Manager
+ Scheduling Policies
Social Network
Manager
Data Manager
Interest
Store
Interest Manager
ApplicationInterface
SQLite
Databases
10/04/15 1510/04/15 15
Summarize: What do you need
to do ?
- Run your agent in your Smartphone.
- Describe what you are looking for.
- Publish your announcements/
contents.
- Keep you Bluetooth adapter on.
- Enjoy your day and forget about the
social application running in your
Smartphone.
- Once at home, at the end of the day, you can
look at the announcements/contents collected
by your agent.
10/04/15 1610/04/15 16
Experimental Facilities and
Challenges
 Control the battery consumption.
 How to manage the network adapter (Keep it on all
the day …)?
 How to manage a large number of opportunistic
contacts happening at the same period of time ?
 How to define the group of friends ? People you
meet in average more than X times/week ? What is
the value of X?
 …
10/04/15 1710/04/15 17
Which Mobile platform shall
we target ?
 Smartphone market share numbers from 2008, and then
2009, with the % change in parenthesis afterwards:
 Android – 0% to 3.9%
 BlackBerry OS – 16% to 20.8%
 iPhone – 12.9% to 17.1%
 Symbian – 49.7% to 44.6%
 WebOS – 0% to 1.1%

Windows Mobile – 11% to 7.9%
 So Android, BlackBerry OS, iPhone OS and WebOS are all
eating Symbian and WinMo market share.
 Prevision for 2010
 Android – 11.3% BlackBerry – 21.2% iPhone – 19.3%
 Symbian – 35.7% WebOS – 2.7% WinMo – 5.6%
10/04/15 1810/04/15 18
IPhone Vs Android
 Android’s platform and developer tools are excellent. Leveraging
Java and the Eclipse IDE are major winning factors for Android.
Apple’s developer tools are shockingly bad by comparison.
 The Objective-C language and platform APIs are cumbersome and
poorly organized. These factors combined in my estimation make
application development about three times more expensive when
developing for iPhone.
 The only area where Apple’s developer tools excelled was in
profiling and heap analysis.
 Apple’s app store from a user’s standpoint and from a worldwide
coverage standpoint are excellent. In this area Google market for
Android is weak.
10/04/15 19
IPhone Vs Android
 Development for iPhone may improve as tools such as
iphonical (MDD for iPhone) and objectiveeclipse (Eclipse plug-in for
Objective-C) emerge.
 We may see a shake-up in the mobile market, with at least 18 new
Android handsets being released this year.
10/04/15 20
THANKS

Contenu connexe

Tendances

Intro to Web 3.0 and the Internet of Things
Intro to Web 3.0 and the Internet of ThingsIntro to Web 3.0 and the Internet of Things
Intro to Web 3.0 and the Internet of ThingsPhilip Sheldrake
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene PetereJuliezaMaeGermo
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYkillersmile1
 
What is internet By M.SUDIR Phil (LIS)
What is internet By M.SUDIR Phil (LIS)What is internet By M.SUDIR Phil (LIS)
What is internet By M.SUDIR Phil (LIS)sahilkhan412
 
ICT 7 Q2 Chapter 1 PPT.pptx
ICT 7 Q2 Chapter 1 PPT.pptxICT 7 Q2 Chapter 1 PPT.pptx
ICT 7 Q2 Chapter 1 PPT.pptxRaymondPuno1
 
Internet and computer
Internet and computerInternet and computer
Internet and computerRhea Dellosa
 
M.Florence Dayana Web Design-UNit 1
  M.Florence Dayana  Web Design-UNit 1  M.Florence Dayana  Web Design-UNit 1
M.Florence Dayana Web Design-UNit 1Dr.Florence Dayana
 
From Web 1.0 to Web 2.0 to Web 3.0
From Web 1.0 to Web 2.0 to Web 3.0From Web 1.0 to Web 2.0 to Web 3.0
From Web 1.0 to Web 2.0 to Web 3.0Total Social Media
 
School Libraries And The Future
School Libraries And The FutureSchool Libraries And The Future
School Libraries And The FutureThe Librain
 
Online Free Communication Tools
Online Free Communication ToolsOnline Free Communication Tools
Online Free Communication Toolshoubinfang
 
The Web: history - now - future
The Web: history - now - futureThe Web: history - now - future
The Web: history - now - futureKnowledge Hives
 
Detail History of web 1.0 to 3.0
Detail History of web 1.0 to 3.0Detail History of web 1.0 to 3.0
Detail History of web 1.0 to 3.0Ghazal Hina
 
Communication tools ppt fa2013
Communication tools ppt fa2013Communication tools ppt fa2013
Communication tools ppt fa20133610Instructor
 
Week 2 computers, web and the internet
Week 2 computers, web and the internetWeek 2 computers, web and the internet
Week 2 computers, web and the internetcarolyn oldham
 
Web 4.0 and beyond
Web 4.0 and beyondWeb 4.0 and beyond
Web 4.0 and beyondJohan Koren
 
Web 3.0 (Presentation)
Web 3.0 (Presentation)Web 3.0 (Presentation)
Web 3.0 (Presentation)Allan Cho
 

Tendances (20)

Intro to Web 3.0 and the Internet of Things
Intro to Web 3.0 and the Internet of ThingsIntro to Web 3.0 and the Internet of Things
Intro to Web 3.0 and the Internet of Things
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene Petere
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
 
Web 1.0 2.0 3.0
Web 1.0 2.0 3.0Web 1.0 2.0 3.0
Web 1.0 2.0 3.0
 
Analysis of the websites
Analysis of the websitesAnalysis of the websites
Analysis of the websites
 
What is internet By M.SUDIR Phil (LIS)
What is internet By M.SUDIR Phil (LIS)What is internet By M.SUDIR Phil (LIS)
What is internet By M.SUDIR Phil (LIS)
 
ICT 7 Q2 Chapter 1 PPT.pptx
ICT 7 Q2 Chapter 1 PPT.pptxICT 7 Q2 Chapter 1 PPT.pptx
ICT 7 Q2 Chapter 1 PPT.pptx
 
Internet and computer
Internet and computerInternet and computer
Internet and computer
 
M.Florence Dayana Web Design-UNit 1
  M.Florence Dayana  Web Design-UNit 1  M.Florence Dayana  Web Design-UNit 1
M.Florence Dayana Web Design-UNit 1
 
From Web 1.0 to Web 2.0 to Web 3.0
From Web 1.0 to Web 2.0 to Web 3.0From Web 1.0 to Web 2.0 to Web 3.0
From Web 1.0 to Web 2.0 to Web 3.0
 
Web 3.0
Web 3.0Web 3.0
Web 3.0
 
Uc13.chapter.08
Uc13.chapter.08Uc13.chapter.08
Uc13.chapter.08
 
School Libraries And The Future
School Libraries And The FutureSchool Libraries And The Future
School Libraries And The Future
 
Online Free Communication Tools
Online Free Communication ToolsOnline Free Communication Tools
Online Free Communication Tools
 
The Web: history - now - future
The Web: history - now - futureThe Web: history - now - future
The Web: history - now - future
 
Detail History of web 1.0 to 3.0
Detail History of web 1.0 to 3.0Detail History of web 1.0 to 3.0
Detail History of web 1.0 to 3.0
 
Communication tools ppt fa2013
Communication tools ppt fa2013Communication tools ppt fa2013
Communication tools ppt fa2013
 
Week 2 computers, web and the internet
Week 2 computers, web and the internetWeek 2 computers, web and the internet
Week 2 computers, web and the internet
 
Web 4.0 and beyond
Web 4.0 and beyondWeb 4.0 and beyond
Web 4.0 and beyond
 
Web 3.0 (Presentation)
Web 3.0 (Presentation)Web 3.0 (Presentation)
Web 3.0 (Presentation)
 

Similaire à Mobitrade

No tube & experimenting with linked data to improve ux
No tube & experimenting with linked data to improve uxNo tube & experimenting with linked data to improve ux
No tube & experimenting with linked data to improve uxvickybuser
 
Digital Trends 2010
Digital Trends 2010Digital Trends 2010
Digital Trends 2010Halogen AS
 
Digital trends 2010
Digital trends 2010Digital trends 2010
Digital trends 2010Tom de Haas
 
Dfinity Vietnam presentation -Final-1701.pptx
Dfinity Vietnam presentation -Final-1701.pptxDfinity Vietnam presentation -Final-1701.pptx
Dfinity Vietnam presentation -Final-1701.pptxTamHoan1
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment TechnologiesMichelle Faina
 
Social Media Presentation at VAS
Social Media Presentation at VASSocial Media Presentation at VAS
Social Media Presentation at VASLasa UK
 
Change of Pace. Answer 2 of the 3 questions posed below. Your choice.pdf
Change of Pace. Answer 2 of the 3 questions posed below. Your choice.pdfChange of Pace. Answer 2 of the 3 questions posed below. Your choice.pdf
Change of Pace. Answer 2 of the 3 questions posed below. Your choice.pdffathimahardwareelect
 
Introduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxIntroduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxJerome Bigael
 
Social Networking
Social NetworkingSocial Networking
Social Networkingswamipise14
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxsittiepalao
 
ENGLES TECNICO lll
ENGLES TECNICO lllENGLES TECNICO lll
ENGLES TECNICO lllrichard017
 
Presentacion de ingles tecnico lll
Presentacion de ingles tecnico lllPresentacion de ingles tecnico lll
Presentacion de ingles tecnico lllrichard017
 
Information and Communications Technology.pptx
Information and Communications Technology.pptxInformation and Communications Technology.pptx
Information and Communications Technology.pptxRupertGarryTorres1
 

Similaire à Mobitrade (20)

No tube & experimenting with linked data to improve ux
No tube & experimenting with linked data to improve uxNo tube & experimenting with linked data to improve ux
No tube & experimenting with linked data to improve ux
 
Digital Trends 2010
Digital Trends 2010Digital Trends 2010
Digital Trends 2010
 
Digital trends 2010
Digital trends 2010Digital trends 2010
Digital trends 2010
 
Digital Trends 2010
Digital Trends 2010Digital Trends 2010
Digital Trends 2010
 
Dfinity Vietnam presentation -Final-1701.pptx
Dfinity Vietnam presentation -Final-1701.pptxDfinity Vietnam presentation -Final-1701.pptx
Dfinity Vietnam presentation -Final-1701.pptx
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment Technologies
 
Social Media Presentation at VAS
Social Media Presentation at VASSocial Media Presentation at VAS
Social Media Presentation at VAS
 
Change of Pace. Answer 2 of the 3 questions posed below. Your choice.pdf
Change of Pace. Answer 2 of the 3 questions posed below. Your choice.pdfChange of Pace. Answer 2 of the 3 questions posed below. Your choice.pdf
Change of Pace. Answer 2 of the 3 questions posed below. Your choice.pdf
 
Introduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxIntroduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptx
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
Ict u5
Ict u5Ict u5
Ict u5
 
ENGLES TECNICO lll
ENGLES TECNICO lllENGLES TECNICO lll
ENGLES TECNICO lll
 
Pre
PrePre
Pre
 
Pre
PrePre
Pre
 
Presentacion de ingles tecnico lll
Presentacion de ingles tecnico lllPresentacion de ingles tecnico lll
Presentacion de ingles tecnico lll
 
Social Media (2009)
Social Media   (2009)Social Media   (2009)
Social Media (2009)
 
E-tech lesson 1.pptx
E-tech lesson 1.pptxE-tech lesson 1.pptx
E-tech lesson 1.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Information and Communications Technology.pptx
Information and Communications Technology.pptxInformation and Communications Technology.pptx
Information and Communications Technology.pptx
 

Plus de Amir Krifa

A Standalone Content Sharing Application for Spontaneous Communities of Mobil...
A Standalone Content Sharing Application for Spontaneous Communities of Mobil...A Standalone Content Sharing Application for Spontaneous Communities of Mobil...
A Standalone Content Sharing Application for Spontaneous Communities of Mobil...Amir Krifa
 
Adaptive Traffic Sampling and Management Platform
Adaptive Traffic Sampling and Management PlatformAdaptive Traffic Sampling and Management Platform
Adaptive Traffic Sampling and Management PlatformAmir Krifa
 
Mobi trade node
Mobi trade nodeMobi trade node
Mobi trade nodeAmir Krifa
 
Hbsd router.ppt
Hbsd router.pptHbsd router.ppt
Hbsd router.pptAmir Krifa
 
Realistic simulations of delay tolerant networks
Realistic simulations of  delay tolerant networksRealistic simulations of  delay tolerant networks
Realistic simulations of delay tolerant networksAmir Krifa
 
Towards efficient content dissemination over DTN
Towards efficient content dissemination over DTNTowards efficient content dissemination over DTN
Towards efficient content dissemination over DTNAmir Krifa
 

Plus de Amir Krifa (6)

A Standalone Content Sharing Application for Spontaneous Communities of Mobil...
A Standalone Content Sharing Application for Spontaneous Communities of Mobil...A Standalone Content Sharing Application for Spontaneous Communities of Mobil...
A Standalone Content Sharing Application for Spontaneous Communities of Mobil...
 
Adaptive Traffic Sampling and Management Platform
Adaptive Traffic Sampling and Management PlatformAdaptive Traffic Sampling and Management Platform
Adaptive Traffic Sampling and Management Platform
 
Mobi trade node
Mobi trade nodeMobi trade node
Mobi trade node
 
Hbsd router.ppt
Hbsd router.pptHbsd router.ppt
Hbsd router.ppt
 
Realistic simulations of delay tolerant networks
Realistic simulations of  delay tolerant networksRealistic simulations of  delay tolerant networks
Realistic simulations of delay tolerant networks
 
Towards efficient content dissemination over DTN
Towards efficient content dissemination over DTNTowards efficient content dissemination over DTN
Towards efficient content dissemination over DTN
 

Dernier

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Dernier (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Mobitrade

  • 1. 10/04/15 110/04/15 1 A Content Centric Mobile Social Network Amir Krifa, Amir.Krifa@sophia.inria.fr Chadi Barakat, Chadi.Barakat@sophia.inria.fr
  • 2. 10/04/15 210/04/15 2 Motivations  The most visited sites on the Internet:  #3 MySpace  #4 YouTube  #5 Facebook  #7 Wikipedia  #11 Blogger.com  #12 Craigs List  #15 Photobucket  #20 Flickr Network use has evolved to be DOMINATED by content distribution and retrieval services.
  • 3. 10/04/15 310/04/15 3 Motivations  Current social networking and content distribution services architecture:  Services are centralized  peers’ privacy and content’ security are not well enforced  Services access is costly (Internet access, specially for mobile users, ..),  average user spends more than 55 minutes per day on Facebook,  There are more than 65 million active users currently accessing Facebook through their mobile devices.  Not Green (more than 350 million active users on Facebook)  Time consuming while users are not sure to find the correct info they are looking for or meet the right person,…
  • 4. 10/04/15 410/04/15 4 Motivations  The provider of the content you are looking for can be just close ! • Ingenious solution: • Due to the congestion on its network, the AT&T website has stopped offering phones to the New York metropolitan area !
  • 5. 10/04/15 510/04/15 5 Our Approach  We propose overcome the described challenges by:  Projecting/Updating people’ online/on board social networks,  Your online social networks = People you meet more then X times/day + Others ( People you do not meet frequently or never meet)  Such projection is needed (as initialization step) for understanding whether an exchange is desirable  Integrating a “tit for tat” mechanism within each group of friends in order to:  Enforce them to share their mobiles’ storage capacities and wireless connections ( Bluetooth +/ Wi-Fi)  Setting up a content centric architecture on top of the mobile social network for content distribution and retrieval
  • 6. 10/04/15 6  We propose to reduce as much as possible the time people spend looking for content.  A user can just express his interests locally and count on his mobility as well as his friends mobility towards attracting the right content. Our Approach A B C D 1 2 3 4 Interested in FEJ I propose and EJ Private Circle Find one content
  • 7. 10/04/15 710/04/15 7 Our Approach  We propose to extend your private circle of frequently met friends based on redundant meetings with unknown people.  It is a possibility to extend your on board social network starting from real life meetings D C B A 4 3 2 1 I post house music I’m looking for house music Private Circle Common Interest + Frequently met = Potential link, alarm the user
  • 8. 10/04/15 8 Our Approach  It is also possible that one peer of your private circle proposes to you a potential new friend.  One user of your private circle meet frequently an unknown peer and finds that he satisfies lot of your interests…  You are notified and it remains up to you to decide  It is another possibility to extend your real on board social network…
  • 9. 10/04/15 910/04/15 9 Projecting/Updating people’ online/on board social networks  Based on redundant /day meetings we can identify the possible content carries on which we can count. But,  Initialization step: Take into consideration people desire to exchange which is already expressed via online social networks,  Then, notify the user once a potential friend is found.  And it is up to him to decide whether to update his real/on board social network or not.
  • 10. 10/04/15 10 Per Private Circle “Tit for Tat” Rules  Initially, a user private circle = people you meet frequently who already belong to your online social network.  Then, the private circle is extended.  “Tit for Tat“ rules:  Each member of your private circle must carries your interest and try to answer them starting from his daily meetings.  Members has to suggest to each others possible new real life links.
  • 11. 10/04/15 11 Per Private Circle “Tit for Tat” Rules  “Tit for Tat“ rules:  NDCij : number of downloaded contents from node j to node I  NUIij : number of uploaded interests from node I to node j  NMij : number of meetings between node I and node j  DEij = 0/1 : desire to exchange between node I and node j  We propose to the user the ability to access to the rank list of his private circle’ members and to decide whether to discard or not a given user from his list. ijij ij ijj NMNUI NDC DERank 1 ∗∗=
  • 12. 10/04/15 12 Scheduling/Drop policy  In the case of a limited contact opportunity a node has to:  First: Try to respectively forward/ask for his local user contents/interests  Second: Ask for the interests of his private circle users in decreasing order of their ranks.  In the case of a local storage overflow a node has to:  Start by dropping the contents/interests of his private circle users who has the smallest rank.
  • 13. 10/04/15 1310/04/15 13 A Content Centric Architecture  Reuse the data tagging schema proposed for content centric networks.  Users are able to ask/publish either a specific piece of data or a complete content category.
  • 14. 10/04/15 14 Node Architecture Wi-Fi Bluetooth Social Links Store Content Store StoreManager +DropPolicies Forwarding Manager + Scheduling Policies Social Network Manager Data Manager Interest Store Interest Manager ApplicationInterface SQLite Databases
  • 15. 10/04/15 1510/04/15 15 Summarize: What do you need to do ? - Run your agent in your Smartphone. - Describe what you are looking for. - Publish your announcements/ contents. - Keep you Bluetooth adapter on. - Enjoy your day and forget about the social application running in your Smartphone. - Once at home, at the end of the day, you can look at the announcements/contents collected by your agent.
  • 16. 10/04/15 1610/04/15 16 Experimental Facilities and Challenges  Control the battery consumption.  How to manage the network adapter (Keep it on all the day …)?  How to manage a large number of opportunistic contacts happening at the same period of time ?  How to define the group of friends ? People you meet in average more than X times/week ? What is the value of X?  …
  • 17. 10/04/15 1710/04/15 17 Which Mobile platform shall we target ?  Smartphone market share numbers from 2008, and then 2009, with the % change in parenthesis afterwards:  Android – 0% to 3.9%  BlackBerry OS – 16% to 20.8%  iPhone – 12.9% to 17.1%  Symbian – 49.7% to 44.6%  WebOS – 0% to 1.1%  Windows Mobile – 11% to 7.9%  So Android, BlackBerry OS, iPhone OS and WebOS are all eating Symbian and WinMo market share.  Prevision for 2010  Android – 11.3% BlackBerry – 21.2% iPhone – 19.3%  Symbian – 35.7% WebOS – 2.7% WinMo – 5.6%
  • 18. 10/04/15 1810/04/15 18 IPhone Vs Android  Android’s platform and developer tools are excellent. Leveraging Java and the Eclipse IDE are major winning factors for Android. Apple’s developer tools are shockingly bad by comparison.  The Objective-C language and platform APIs are cumbersome and poorly organized. These factors combined in my estimation make application development about three times more expensive when developing for iPhone.  The only area where Apple’s developer tools excelled was in profiling and heap analysis.  Apple’s app store from a user’s standpoint and from a worldwide coverage standpoint are excellent. In this area Google market for Android is weak.
  • 19. 10/04/15 19 IPhone Vs Android  Development for iPhone may improve as tools such as iphonical (MDD for iPhone) and objectiveeclipse (Eclipse plug-in for Objective-C) emerge.  We may see a shake-up in the mobile market, with at least 18 new Android handsets being released this year.