Re: [Ibnemo] 答复: detailed review/question reagrding draft-xia-ibnemo-icim-00

"Bert Wijnen (IETF)" <bwietf@bwijnen.net> Fri, 12 June 2015 21:08 UTC

Return-Path: <bwietf@bwijnen.net>
X-Original-To: ibnemo@ietfa.amsl.com
Delivered-To: ibnemo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D85141B2AC8 for <ibnemo@ietfa.amsl.com>; Fri, 12 Jun 2015 14:08:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.6
X-Spam-Level:
X-Spam-Status: No, score=-1.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7fx17n8n8KhZ for <ibnemo@ietfa.amsl.com>; Fri, 12 Jun 2015 14:08:48 -0700 (PDT)
Received: from lb2-smtp-cloud2.xs4all.net (lb2-smtp-cloud2.xs4all.net [194.109.24.25]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC77D1A8907 for <ibnemo@ietf.org>; Fri, 12 Jun 2015 14:08:47 -0700 (PDT)
Received: from Macintosh-6.fritz.box ([83.163.239.181]) by smtp-cloud2.xs4all.net with ESMTP id fZ8k1q0063vXPcr01Z8l0f; Fri, 12 Jun 2015 23:08:45 +0200
Message-ID: <557B4A5B.9060708@bwijnen.net>
Date: Fri, 12 Jun 2015 23:08:43 +0200
From: "Bert Wijnen (IETF)" <bwietf@bwijnen.net>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.6.0
MIME-Version: 1.0
To: "zhangyali (D)" <zhangyali369@huawei.com>, "ibnemo@ietf.org" <ibnemo@ietf.org>
References: <55799592.2090206@bwijnen.net> <5579BD09.5050302@bwijnen.net> <A747A0713F56294D8FBE33E5C6B8F581295153AC@szxeml513-mbx.china.huawei.com>
In-Reply-To: <A747A0713F56294D8FBE33E5C6B8F581295153AC@szxeml513-mbx.china.huawei.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/ibnemo/36Fd2OhiFazwGqu6wKHXyQ_14YU>
Subject: Re: [Ibnemo] 答复: detailed review/question reagrding draft-xia-ibnemo-icim-00
X-BeenThere: ibnemo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of Nemo, an intent-based North Bound \(NB\) interface consisting of an application protocol running over HTTP \(RESTful interfaces\) to exchange intent-based primitives between applications and meta-controllers controlling virtual network resources \(networks, storage, CPU\)." <ibnemo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ibnemo/>
List-Help: <mailto:ibnemo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Jun 2015 21:08:54 -0000

On 12/06/15 05:39, zhangyali (D) wrote:
> Hi Bert,
>
> Thanks so much for your reviewing and modifying our specification. Because English is not our mother tongue, there are many errors and implicit points which could not express our mind clearly. We will modify it in this week according to your suggestions and update it in IBNEMO.
I understand it is not easy for you (and even me) as non-native-speakers to write in English.
I know that my Chinese is much worse (in fact non-existent sofar).

Now, since I am not a native-Englisg-speaker either, it might be good for some native English
speaking people (I see there are a few authors listed who have English as their mother tongue)
could check if my proposed text is indeed better or rather good English, cause that is not 100% sure
either.

> Thanks again for your precious suggestions!
Welcome,
Bert
> Best,
> Yali
>
> -----邮件原件-----
> 发件人: Bert Wijnen (IETF) [mailto:bwietf@bwijnen.net]
> 发送时间: 2015年6月12日 0:53
> 收件人: ibnemo@ietf.org
> 主题: [Ibnemo] detailed review/question reagrding draft-xia-ibnemo-icim-00
>
> My comments and questions are provided to try and help to make the document clearer and easier to read, specifically for people (like myself) who are (fairly) new to Intent based information modelling (or intent based anything even).
>
> inline comments/quesions:
>> INTERNET-DRAFT Y. Xia, Ed.
>> Intended Status: Standards Track                            T. Zhou, Ed.
>> Expires: November 23, 2015                                 Y. Zhang, Ed.
>>                                                                  S.
>> Hares Huawei
>>                                                                 P. Aranda
>>                                                                  D.
>> Lopez Telefornica
>>                                                              J. Crowcroft
>>                                                      Cambridge University
>>                                                                  Y. Zhang
>>                                                              China Unicom
>>                                                              May 22,
>> 2015
>>
> You have 9 authors/editors for this document.
> I thought that RFC-editor and IESG don't like/allow that, see http://www.rfc-editor.org/pipermail/rfc-interest/2015-May/008869.html
>
> See also discussion on "surprise authors" recently, which may be relevant?
>
>> Intent Common Information Model
>>                          draft-xia-ibnemo-icim-00
>>
>> Abstract
>>
>>     Intent Common Information Model (ICIM) generalizes a unified model
>>     for expressing different layers' intent whatever role,
>>     responsibility, knowledge, etc.
> a "Common" model "generalizes" a "unified" model?
> What does that mean? I guess we awant to define a Common model that is generalized enough so it can be used as a basis/starting point for all Intent-based models, no?
>> This document provides an information
>>     model to be inherited and expanded to construct specific intent
>> model
> "to be inherited from and expanded on" I guess "to construct specific intent models" (plural models I guess?)
>
>> in different areas. According to this information model, network
>>     intent model is put forward which can satisfy users' need in
> "network intent model" ?? The text in the document talks a lot about virtual machines and cpu load of a computer and such. Admitted, there is also some network related text.
> So it the "intent" (;-)) that the ICIM can be the basis for network related models as well as for data center related models?
>> different layers, such as, end-users, business developers, and
>>     network administers.
>>
> "different layers"? DO we not really mean different "roles" here?
> All these people are "users" but they do have different roles.
> And some roles may only have control over/access to upper layer intent/networking, other roles may have control/access to lower layers of the network or data center.
>> Status of this Memo
>>
>>     This Internet-Draft is submitted to IETF in full conformance with the
>>     provisions of BCP 78 and BCP 79.
>>
>>     Internet-Drafts are working documents of the Internet Engineering
>>     Task Force (IETF), its areas, and its working groups.  Note that
>>     other groups may also distribute working documents as
>>     Internet-Drafts.
>>
>>     Internet-Drafts are draft documents valid for a maximum of six months
>>     and may be updated, replaced, or obsoleted by other documents at any
>>     time.  It is inappropriate to use Internet-Drafts as reference
>>     material or to cite them other than as "work in progress."
>>
>>     The list of current Internet-Drafts can be accessed at
>>     http://www.ietf.org/1id-abstracts.html
>>
>>
>>
>> Xia, et al.            Expires November 23, 2015 [Page 1]
>> INTERNET DRAFT      Intent Common Information Model         May 22, 2015
>>
>>     The list of Internet-Draft Shadow Directories can be accessed at
>>     http://www.ietf.org/shadow.html
>>
>> Copyright and License Notice
>>
>>     Copyright (c) 2015 IETF Trust and the persons identified as the
>>     document authors. All rights reserved.
>>
>>     This document is subject to BCP 78 and the IETF Trust's Legal
>>     Provisions Relating to IETF Documents
>>     (http://trustee.ietf.org/license-info) in effect on the date of
>>     publication of this document. Please review these documents
>>     carefully, as they describe your rights and restrictions with respect
>>     to this document. Code Components extracted from this document must
>>     include Simplified BSD License text as described in Section 4.e of
>>     the Trust Legal Provisions and are provided without warranty as
>>     described in the Simplified BSD License.
>>
>> Table of Contents
>>
>>     1  Introduction  . . . . . . . . . . . . . . . . . . . . . . . . .  4
>>       1.1  Terminology . . . . . . . . . . . . . . . . . . . . . . . .  4
>>     2. Intent Common Information Model Overview  . . . . . . . . . . .  4
>>       2.1  Elements  . . . . . . . . . . . . . . . . . . . . . . . . .  5
>>         2.1.1  User  . . . . . . . . . . . . . . . . . . . . . . . . .  5
>>         2.1.2  Context . . . . . . . . . . . . . . . . . . . . . . . .  5
>>         2.1.3  Object  . . . . . . . . . . . . . . . . . . . . . . . .  5
>>         2.1.4  Result  . . . . . . . . . . . . . . . . . . . . . . . .  5
>>         2.1.5  Operation . . . . . . . . . . . . . . . . . . . . . . .  6
>>       2.2  Relationships in ICIM . . . . . . . . . . . . . . . . . . .  6
>>         2.2.1  Relationship between Result and Operation . . . . . . .  6
>>         2.2.2  Relationship between Object and Operation . . . . . . .  7
>>         2.2.3  Relationship between Object and Result  . . . . . . . .  7
>>       2.3  Intent and Policy . . . . . . . . . . . . . . . . . . . . .  7
>>       2.4  Layers of Intent  . . . . . . . . . . . . . . . . . . . . .  8
>>     3.  Intent Modeling  . . . . . . . . . . . . . . . . . . . . . . .  8
>>       3.1  Intent overview . . . . . . . . . . . . . . . . . . . . . .  8
>>       3.2  Top level intent expression . . . . . . . . . . . . . . . .  8
>>       3.3  Objects in the network  . . . . . . . . . . . . . . . . . .  9
>>       3.4  Type of result  . . . . . . . . . . . . . . . . . . . . . . 10
>>       3.5  Operation composition . . . . . . . . . . . . . . . . . . . 10
>>     4  Security Considerations . . . . . . . . . . . . . . . . . . . . 12
>>     5  IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 12
>>     6  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . . . 12
>>     7  Informative References  . . . . . . . . . . . . . . . . . . . .
>> 12
>>
>>
>> Xia, et al.            Expires November 23, 2015 [Page 2]
>> INTERNET DRAFT      Intent Common Information Model         May 22, 2015
>>
>>     Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . .
>> 12
>>
>>
>>
>> Xia, et al.            Expires November 23, 2015 [Page 3]
>> INTERNET DRAFT      Intent Common Information Model         May 22, 2015
>>
>> 1  Introduction
>>
>>     Intent is a new philosophy to design open interface. Opposite to
>> the
> "intent" is a very generic term. I guess we mean "intent based networking" or "intent based network management" or some such to be a new philosophy, no?
>> 'bottom up' method which opens what system has, Intent interface uses
> "opens what a system has" ??
>> 'top down' method which opens what user's requirement.
> "opens what user's requirement" ??
>
> I guess you mean to say that with "bottom up" we manage the system by doing detailed config/management first to hopefully fulfill user requirements. I.e. we are busy in details.
>
> Then the new philosophy allows/stimulates a "top diown" approach, where we (the user) begins with expressing his/her intent (desired state) and the system translates that (at various layers) into layer specific intent or commands. I believe you sort of say that below, but the sentence above is hard to parse/understand
>
>> With this
>>     Intent interface, users just need to express what their requirements
>>     are, rather than how to implement them, so Intent interface is user
>>     friendly. Intent interface is much closer to user, but different
>>     users have different intention manifestations, which have different
> Mmmm I think I get "manifestations".
> Would it be easier to understand if you wrote:
> "different users express their requirements/intent if different ways"
>>     granularity or different level. It depends on users' role, knowledge
>>     and their purpose. Intent can be some final results of objects and
>>     also can be some specific operations on objects in specific context.
>>     Although dictating operations is the manifestation of intent, a
>> user
> Is that a "manifestation of intent" ?? Mmm maybe. I guess you man to say that in a "primitive way" people could express intent by dictation commands ??
>> just need to assign the operations he cares about, and has no need to
>>     plan complete and detailed operations list for the system to achieve
>>     the intent.
>>     Intent Common Information Model (ICIM) generalizes a generic model
> "generalizes a generic model"? Is that a tautologie?
> I think I would do: s/generalizes/specifies/
>>     for expressing key components of intent interface and the
>>     relationship between these components. This document provides a
>>     common model to be inherited and expanded to construct specific
>>     intent interface in specific areas. According to this information
>>     model, intent interface in network area is put forward which can
>>     satisfy user' intention in different layers or different roles, such
>>     as, end-users, business developers, network administers, etc
> good, here you did say that "intention in different layers" is "intention in different roles".
> So I think that comes closer to what we've been talking about. I think I would prefer (if my understanding of the whole concept is correct, which may still not be the case)
>
>                  an intent interface in the network area is put forward which allows a user in
>      various roles ( such as, end-users, business developers, network administers, etc)
>      to express his/her intent at the different layers of the network.
>
> So beat me up if I got it wrong
>>
>> 1.1  Terminology
>>
>>     The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
>>     "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
>>     document are to be interpreted as described in RFC 2119 [RFC2119].
>>
> Mmm ... none of these terms is actually used in the document.
> Maybe in preparation for later?
>> 2. Intent Common Information Model Overview
>>
>>     Intent Common Information Model aims to generalize a unified
>>     information model which satisfied different areas, scenarios, and
> s/satisfied/satisfies/
>
> and agagin: "aims to generalize a unified info model" ??
>> other constraints. So, it is a complete and detailed information
>>     model to define the constituent elements of intent, but some
>> elements
> so "intent" is composed of multiple (I guess 1-*) elements?
>>     can be omitted or implied under some special situations when using
>>     this model to express specific data model.
> that is a pretty generic statement that does not mean much to me.
> I guess you mean to say that not all possible elements that may constitue an intent need to be present?
>>     From the overall perspective, construction elements of intent can be
>>     generalized into user of intent who author and own this intent,
>>     intent content which is a desired purpose and the specific context
>>     for implementing intent.
> Do I understand that the above could be listed as:
>
>      From the overall perspective, construction elements of intent can be
>      generalized into:
>        - user of intent who author and own this intent,
>        - intent content which is a desired purpose, and
>        - the specific context for implementing intent.
> In other words, are you saying there are 3 categories of construction elements?
>> Furthermore, in general, person's intent
>>     content is often visioning ultimate state of some objects or
> Mmm "person's intent content". So is this the element "user of intent" or "intent content" above??
> Or is it just "a person's intent" or "the intent that one specific person might have"?
>
> "visioning" ?? Do you mean "defining the ultimate desired state" or "specifying..." ??
>>     performing actions to these objects, so intent content can be
>>     abstracted into object which is the target for intent, result which
>>
>>
>> Xia, et al.            Expires November 23, 2015 [Page 4]
>> INTERNET DRAFT      Intent Common Information Model         May 22, 2015
>>
>>     is a desired state and operation which is the specific actions to
>>     achieve a purpose.
> I wonder again if a bulleted list makes sense for the above, for example:
>
>      Furthermore, in general, the intent of some person includes
>      intent content that is:
>      
>        - often wanting/needed/defining the ultimate state of some objects
>        - or a set of actions to be performed to these objects,
>
>      so intent content can be abstracted into:
>
>        - an object which is the target for intent,
>        - result which is a desired state and
>        - operation which is the set of specific actions to
>          achieve a purpose.
>
>> 2.1  Elements
>>
>> 2.1.1  User
>>
>>     User is an abstract class which refers the subject and owner to
> refers? or did you mean specifies (once instantiated of course)
>> express the intent. For example, end-users, business designers,
>>     network administrators are all instances of User class.
> so it also has an attribute that specifies the "role"?
> Or do you mean to state that no matter which role users play or assume, they all are instantiated as an object of class User.
>> Intent has a
>>     strong relationship with the user. So intent is different for
>>     specific user when this information model is applied to specific
>>     scenario. So when ICIM is implemented, this class will involve a role
>>     mapping.
> the "mapping seems to indicate that "Role" is possibly also an abstract class and that instances of the "User" class will get mapped (via reference?) to a Role.
>> 2.1.2  Context
>>
>>     Context refers to a set of specific background information such as,
>>     timer, price, and so on. Context has a huge influence on a person
> s/timer/time/ ??
>> designing a detailed  plan or selecting the best program to achieve a
>>     purpose. For example, when an enterprise plans to build a dedicated
>>     connection between two sites, price and distance will be the context
>>     in this scenario. While may not be part of how an entity expresses or
>>     executes some intent, it is a factor that must be considered with the
>>     expression of intent.
>>
> So I would think that Context is also an abstract class, no?
>> 2.1.3 Object
>>
>>     Object refers an abstract class which defines some entities
>> affected
> refers or IS an abstract class?
> If not, then I guess Entity is an abstract class?
>> or managed by intent. For the management, users could manage life
>>     cycle of the objects through some concrete operations, such as,
>>     create, update, delete, etc. In addition, users could use other
>>     specific operations to affect the behavior of managed objects. For
>>     example, a business designer want all traffic be filtered by a
>>     special firewall. The object of this business designers intent could
>>     be the all traffic flowing on a specific network (e.g. L3VPN), and
>>     this intent impacts the forwarding behavior of the traffic network.
>>     Object is different in specific area. In network area, object is an
>>     aggregation class with node, connection and flow. For objects, users
>>     could construct some specific objects to achieve intent, and it is
>>     also allowed for users to assign intent to existing resources.
>>
> what are "existing resources" ??
>> 2.1.4 Result
>>
>>     Result is a type of intent which refers to an ultimate state or
> So Result is a type of intent.
> Is intent a class? and is result an instantiation of the Intent class?
> or is Result a class that inherits from Intent?
>> something an individual wants to achieve. This type of intent shields
>>     difference and diversity of an environment away from the users'
>>     intent. The person just envisions the ultimate state of objects
> "envisions" or "wants" or "specifies"?
>>
>> Xia, et al.            Expires November 23, 2015 [Page 5]
>> INTERNET DRAFT      Intent Common Information Model         May 22, 2015
>>
>>     without worrying about how to achieve it. For example, a result could
>>     be that the company accesses any sites on the Internet safely. It
>>     just defines a result that ignores technology details, such as,
>>     firewall, ACL, and so on.
>>
>>     Though desired state is a general requirement, violation state is
>>     another special state which has an important status when achieving
>>     integral compliance. For example, a typical scenario is all virtual
>>     machines owned by different tenants should not be deployed in a same
>>     hypervisor.
> Not sure I understand "all virtual machines... same hypervisor"
> Did you mean to say "that one specific tenant does not want other tenants vms to be under same hypervisor as specific tenant" ?
> Or are you stating "each hypervisor should only run vms that belong to the same tenant" ??
>
>
>> This type of result just shows the undesired state which
>>     is a type of violation state, and this kind of intent should be
>>     involved in this information model.
> I think I would call it an "undesired" or "unwanted" state.
> A "violated state" would be a state where something has happened against the rules/wants/desires.
>>
>> 2.1.5  Operation
>>
> So is that also a class by itself, or a subclass of Intent?
>> Operation is a type of intent which refers to some specific actions
>>     an individual desires to take for realizing the purpose. This type of
>>     intent formulates explicit plan to realize a purpose which may take a
>>     better control of the whole system. According to the diversity of
>>     system support capability, there are large sets of operations for
>>     users to take.
>>
>>     Generally, operations can be divided into two categories. One is
>>     action without condition which is called "command" usually. For
>>     example, create a virtual machine. This kind of operation defines a
>>     concrete action which is executed immediately without any trigger.
>>     The other is action with condition. For this kind of operations,
>>     condition is a trigger for the action. And actions will not be
>>     executed immediately until the condition clause is tested to be true.
>>     For example, "do load balancing when the utilization of a link
>>     exceeds 80%". In this example, "utilization of a link" is the
> I think "utilization >80% of a link" is the condition, no?
>> trigger, and "do load balancing" is the action. Action will not be
>>     taken until the trigger is true.  Actions are different by stages
>>     which depend on the layer of intent. Actions expressed in upper layer
>>     may lead to cascaded actions in other lower layers. For example, the
>>     action "do load balancing" will bring out many actions which are
>>     depend on technologies and devices.
>>
>> 2.2  Relationships in ICIM
>>
>> 2.2.1  Relationship between Result and Operation
>>
>>     Users are free to express their intent, no matter it is an ultimate
> s/no matter/no matter if/
>> result or specific operations in their mind, but there are some
>>     relationships between these two basic types of intent. For result,
>>     users just need to express the goal without worrying how to implement
>>     it in a specific system which facilitates users to focus on real
> I think I would /facilitates/allows/, but my native language is Dutch and not English, so I cede to the native English speakers (as in several of my other comments too)
>> requirement. When achieving the ultimate result, it needs some
> I think: s/When achieving/To achieve/
>
> I think I would also s/it needs/the (underlying) system (or engine) needs/
>>
>> Xia, et al.            Expires November 23, 2015 [Page 6]
>> INTERNET DRAFT      Intent Common Information Model         May 22, 2015
>>
>>     reasoning mechanisms to transfer it to real executable operations
>>     which are supported by specific system. So in a specific scenario, a
>>     result can generate concrete operations. For example, for a
>>     geographical distributed enterprise, its intent is constructing a
>>     dedicated line between headquarters and branches at the least cost.
>>     This intent just expresses a result without defining how to construct
>>     this dedicated line. So business designers will design the best
>>     solution and concrete operations referring capability of devices,
>>     optional programs, prices, etc.
>>
>> 2.2.2  Relationship between Object and Operation
>>
>>     Operation refers to some specific actions on some objects, so object
>>     is the target of an action. In general, any action will include some
>>     objects to execute this action. When users want to execute some
>>     actions to achieve goals, they may construct the target objects and
>>     assign specific actions on them, and it is allowed for users to use
>>     existing resources to do some operations. Though object is the target
>>     of action, it offers the constraint for optional operations. For
>>     example, for a virtual machine, the optional operations are create,
>>     delete, immigrant, etc.
> immigrant? Do you mean "migrate" ??
>> 2.2.3  Relationship between Object and Result
>>
>>     Result refers to some ultimate state for some objects. This type of
>>     intent does not define which specific operations to take but express
>>     the desired state of objects. So it is independent on objects'
>>     capability. For example, intent is all virtual machines' CPU
>>     utilization could not exceed 80%. It does not assign specific
> s/could/should/ ??
>> operations. So reasoning mechanism will choose suitable operations to
>>     satisfy this intent, such as, immigrant virtual machine or expand it.
>>
> Native English speakers please help: Does one "satisfy" an intent?
> Or is there some other verb for that that fits better? It sounds weird to me.
> s/immigrant/migrate/??
>
>> 2.3 Intent and Policy
>>
>>     In industry, Policy already has a clear definition, such as in
>>     RFC3060. Policy rule consists of an event, a set of conditions and a
>>     set of actions.  When an event occurs, actions will be taken until
>>     condition clauses are evaluated to be true.
>>
>>     As mentioned above, intent refers to a purpose in achieving ultimate
>>     result or performing operation. The intent has a larger scope
>>     compared with the policy since Intent can express both result and
>>     operation.  On one hand if a result is described by intent, there may
>>     be no specific action given to show how to achieve this intent. On
>>     the other hand, if operation described by intent, conditions of
>>     action is optional. Policy is a specific form of operation in
>>     intent.
>>
>>
>>
>> Xia, et al.            Expires November 23, 2015 [Page 7]
>> INTERNET DRAFT      Intent Common Information Model         May 22, 2015
>>
>> 2.4  Layers of Intent
>>
>>     Intent reflects a person's mental desire which depends on person's
> is it not a persons "expressed desire" as opposed to "mental desire"?
> For example, a persons "mental desire" does not always depend on his/her role does it? He/she may desire much more that what his/her role allows.
> The point is that he/she can only express his/her desires within the capabilities or authorizations of the role he/she plays (has been assigned).
>> role, knowledge, and other contextual factors. So users in different
>>     layers may have different intent.
> I think I would say "users in different roles" instead of layers
>> While different layer of intent has
>>     some differences in content and implementation, the expression of
>>     each layer of intent is same which defines an ultimate goal or
>>     dictates specific operations.
>>
>>     For example, in the network area the intent of end-users could be
>>     safe connectivity between two sites which a technology independent
>>     and device independent requirement. For business-based network
>>     designers, the network connectivity can be selected which is device-
>>     independent but technology specific. An example of the business-based
>>     technology is the L3VPN. For network administrators, intent can be
>>     specific operations on a set of devices such as configuring IP
>>     addresses on network servers in a data center.
>>
>> 3.  Intent Modeling
>>
>>     This section defines the concept and hierarchy of intent, and
>>     describes the Intent Common Information Model.
>>
>> 3.1  Intent overview
>>
>>     In general, intent is one's specific mental activity, so it strongly
>>     depends on the subject. Different users may have different
>>     manifestations and intent. In addition, context, omitted usually,
>> is
> every time I read the word "manifestation(s)" I get confused.
> Is it just me? WHat exactly is meant here?
>> an important factor when achieving purpose, which offers necessary
>>     background information to impact the decision. Figure 1 illustrates
>>     the overview of the intent. Figure 1 indicates that the user has
>>     intent in some context. For example, an enterprise wants to block all
>>     http traffic in work time. In this intent, the user is the
>>     enterprise, the intent is to block all http traffic in the work
>>     hours, and the context includes the definition of the "enterprise"
>>     and the "work hours".
>>
>>              +------+  has    +--------+  in    +---------+
>>              | user +-------->+ intent +------->+ context |
>>              +------+         +--------+        +---------+
>>
>>                  Figure 1 general prescription for intent
> MMmmmm so "an enterprise wants to block all http traffic in work hours"
> sounds as a policy to me. The corporate person who needs implement that can to express this as an intent via the Inent Interface I guess. So this person needs to be defined (instantiated as a User class) in the system, this instantiated user needs to get assigned a role of "enterprise user" or some such, which allows him to express his/her intent at that high level "block all http traffic during work hours", no?
> I guess some Context type objects/class instantiation need to be created that defines "http traffic" and "work hours". Probably also some objects need to be defined that specify the links on which this needs to be blocked, how to do it (firewall) etc, but that is for other roles, that translate the high level "intent" to lower level intents.
>> 3.2 Top level intent expression
>>
>>     In Cambridge Dictionaries, the definition of "intent" is the fact
>>     that you want and plan to do something. So, in general, intent
>> refers
>>
>>
>> Xia, et al.            Expires November 23, 2015 [Page 8]
>> INTERNET DRAFT      Intent Common Information Model         May 22, 2015
>>
>>     to an agent's purpose in getting an ultimate result or performing
>>     some specific operation. In specific areas, these results or
>>     operations will relate to some objects. Figure 2 describes the
>>     general expression of intent.
>>
>>                               +----------+
>>                               |  intent  |
>>                               +-C--A--A--+
>>                                 |  |  |
>>                     +-----------+  |  +------------+
>>                     |              |               |
>>                 +---+----+     +---+----+    +-----+-----+
>>                 | object |     | result |    | operation |
>>                 +--------+     +--------+    +-----------+
>>
>>                         Figure 2 intent expression
>>
> What do the C and A stand for in above figure?
> Is that Context and Action ?
> Would be good to add a legend to the figure
>> One type of intent is to express key operations that a user wants to
>>     execute. The underlying intent system can generate a complete
>>     operation list from user's request. The other type of intent is to
>>     express an ultimate result or state without dictating any operations.
>>
>>     For example, intent of a user may be a result without defining how to
>>     realize it, such as, requiring security communication between two
>>     sites, or dictate some detailed operations in order to achieve a
>>     purpose, such as, filtering all traffics by firewall between these
>>     two sites.
>>
>> 3.3  Objects in the network
>>
>>     Object is an abstraction class which can be inherited and expanded
>> in
> "inherited from"
>> different area. In network area, the object, i.e. the target of
>>     intent, can be generalized into Node, Connection and Flow, as shown
>>     in Figure 3.
>>
>>                                     +------+
>>                              +------+ node |
>>                              |      +------+
>>                 +--------+G+-+
>>                 |        |          +------------+
>>                 | object |G+--------+ connection |
>>                 |        |          +------------+
>>                 +--------+G+-+
>>                              |      +------+
>>                              +------+ flow |
>>                                     +------+
>>
>>                  Figure 3 common objects in network area
>>
> Please add legend as to what G means. is it Generalization?
> Then I am surprised. I would think that "object" is the generic thing and that derived classes like node, coinnection and flow are specialized classes that share some basic attributes with the base Object class.
>
>> Xia, et al.            Expires November 23, 2015 [Page 9]
>> INTERNET DRAFT      Intent Common Information Model         May 22, 2015
>>
>>     The Node represents the functions a network node may provide in a
>>     network such as network services, forwarding functions (firewall,
>>     load balancer, virtual router, and others), or a group of network
>>     elements. A group of network elements can be a subnet, an autonomous
>>     system, or a confederation of autonomous systems.
>>
>>     The Connection describes logical connectivity between node entities.
>>     This connection is not limited to any physical link, but just
>>     expresses the communication capacity between nodes.
>>
>>     The Flow refers to the traffic in network which describes data
>>     packets have some certain common characters.
>>
>> 3.4  Type of result
>>
>>     Result refers an ultimate state which is expected or avoided. Figure
>>     4 describes two types of result. For example, a user may express an
>>     intent is his computer's CPU utilization must less than 80%. This
>>     expression is a type of result which describes an expected state. Of
>>     course, this user can also express this intent as it's an error when
>>     his computer's CPU utilization exceeds 80%. This expression is
>>     another type of result which describe a avoid state. Users are free
>>     to describe either one.
>>
>>                                +--------+
>>                                | result |
>>                                +-G----G-+
>>                                  |    |
>>                            +-----+    +----+
>>                            |               |
>>                        +---+----+      +---+---+
>>                        | expect |      | avoid |
>>                        +--------+      +-------+
>>
>>                       Figure 4 expression of Result
>>
> same question as previous figure
>
>> 3.5 Operation composition
>>
>>     Operation refers to some specific actions in order to achieve some
>>     purposes. An operation must have some actions. However, if condition
>>     and constraint need to be defined in operations, it depends on
>>     specific scenario and users' require.
> s/require/requirement/ ?
>> Once a condition is involved in
>>     operation, actions will not be executed immediately until condition
>>     is true. In additional, constraint restricts action itself or the
>>     scope of action.
>>
>>
>>
>> Xia, et al.            Expires November 23, 2015 [Page 10]
>> INTERNET DRAFT      Intent Common Information Model         May 22, 2015
>>
>>                                +-----------+
>>                                | operation |
>>                                +-A---C---A-+
>>                                  |   |   |
>>                    +-------------+   |   +--------------+
>>                    |                 |                  |
>>                    |                 |                  |
>>              +-----+-----+       +---+----+      +------+-----+
>>              | condition |       | action |      | constraint |
>>              +-----------+       +--------+      +------------+
>>
>>                     Figure 5 composition of operation
>>
> Do the A and C in figure mean anything? If so, what?
>>
>> Xia, et al.            Expires November 23, 2015 [Page 11]
>> INTERNET DRAFT      Intent Common Information Model         May 22, 2015
>>
>> 4  Security Considerations
>>
>>     TBD
>>
>> 5  IANA Considerations
>>
>>     This draft includes no request to IANA.
>>
>> 6  Acknowledgements
>>
>>     The authors would like to thanks the valuable comments made by Wei
>>     Cao, Sheng Jiang, Zhigang Ji, Xuewei Wang, Shixing Liu, Yan Zhang.
>>
>> 7  Informative References
>>
>>     [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
>>     Requirement Levels", BCP 14, RFC 2119, March 1997.
>>
>> Authors' Addresses
>>
>>     Yinben Xia
>>     Huawei Technologies Co., Ltd
>>     Q14, Huawei Campus, No.156 Beiqing Road
>>     Hai-Dian District, Beijing, 100095
>>     P.R. China
>>
>>     EMail: xiayinben@huawei.com
>>
>>     Tianran Zhou
>>     Huawei Technologies Co., Ltd
>>     Q14, Huawei Campus, No.156 Beiqing Road
>>     Hai-Dian District, Beijing, 100095
>>     P.R. China
>>
>>     EMail: zhoutianran@huawei.com
>>
>>     Yali Zhang
>>     Huawei Technologies Co., Ltd
>>     Q14, Huawei Campus, No.156 Beiqing Road
>>     Hai-Dian District, Beijing, 100095
>>     P.R. China
>>
>>     EMail: zhangyali369@huawei.com
>>
>>
>> Xia, et al.            Expires November 23, 2015 [Page 12]
>> INTERNET DRAFT      Intent Common Information Model         May 22, 2015
>>
>>     Susan Hares
>>     Huawei Technologies Co., Ltd
>>     7453 Hickory Hill
>>     Saline, MI  48176
>>     USA
>>
>>     Email: shares@ndzh.com
>>
>>     Pedro Andres Aranda
>>     Telefornica I+D,
>>     Don Ramon de la Cruz, 82 Street
>>     Madrid, 28006, Spain
>>
>>     EMail: pedroa.aranda@telefonica.com
>>
>>     Diego R. Lopez
>>     Telefornica I+D,
>>     Don Ramon de la Cruz, 82 Street
>>     Madrid, 28006, Spain
>>
>>     EMail: diego.r.lopez@telefonica.com
>>
>>     Jon Crowcroft
>>     University of Cambridge Computer Laboratory
>>     William Gates Building, 15 JJ Thomson Avenue
>>     Cambridge, CB3 0FD UK
>>
>>     Email:  jon.crowcroft@cl.cam.ac.uk
>>
>>     Yan Zhang
>>     China Unicom P.R. China
>>
>>     Email: zhangy1036@chinaunicom.cn
>>
>> Xia, et al.            Expires November 23, 2015 [Page 13]
>>
>>
> Bert
>
>