Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model for intent

"Susan Hares" <shares@ndzh.com> Tue, 02 June 2015 22:49 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: ibnemo@ietfa.amsl.com
Delivered-To: ibnemo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DF9591B319F for <ibnemo@ietfa.amsl.com>; Tue, 2 Jun 2015 15:49:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -98.154
X-Spam-Level:
X-Spam-Status: No, score=-98.154 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, J_CHICKENPOX_45=0.6, MIME_8BIT_HEADER=0.3, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1OmjezNM6t2x for <ibnemo@ietfa.amsl.com>; Tue, 2 Jun 2015 15:48:58 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) by ietfa.amsl.com (Postfix) with ESMTP id D99851B31A4 for <ibnemo@ietf.org>; Tue, 2 Jun 2015 15:48:57 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=184.157.80.157;
From: "Susan Hares" <shares@ndzh.com>
To: "'PEDRO ANDRES ARANDA GUTIERREZ'" <pedroa.aranda@telefonica.com>, "'zhangyali \(D\)'" <zhangyali369@huawei.com>, <nfvrg@irtf.org>
References: <D19315B6.1D624%pedroa.aranda@telefonica.com>
In-Reply-To: <D19315B6.1D624%pedroa.aranda@telefonica.com>
Date: Tue, 2 Jun 2015 18:48:23 -0400
Message-ID: <014801d09d86$46b6d4b0$d4247e10$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0149_01D09D64.BFA9C890"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQIyszWq5a5j3lzymrlGmCaVlNwkHZzVpDnA
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/ibnemo/Ha_9WO2r2BENFo82rnmrugy-mNk>
Cc: draft-xia-ibnemo-icim@tools.ietf.org, ibnemo@ietf.org
Subject: Re: [Ibnemo] =?utf-8?b?W05mdnJnXSDnrZTlpI06ICBEZWZpbmluZyBhIENvbW1v?= =?utf-8?q?n_Model_for_intent?=
X-BeenThere: ibnemo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of Nemo, an intent-based North Bound \(NB\) interface consisting of an application protocol running over HTTP \(RESTful interfaces\) to exchange intent-based primitives between applications and meta-controllers controlling virtual network resources \(networks, storage, CPU\)." <ibnemo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ibnemo/>
List-Help: <mailto:ibnemo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jun 2015 22:49:02 -0000

Pedro and Yali: 

 

It helps to keep in the networking domain where I am familiar with work!  I agree that intent goes through the layers, but I still struggle to make the connections. 

 

I know that instances of code (BGP) on devices create zones  of connectivity (sub-domains/subnets, AS, Groups of AS), but I think there must be  more in the intent discuss.  Yinben and Yali’s comments that 

User à intent à context 

 

is still the key information.    Is it Intent + context (layer n) to ? at layer n-1.  

 

Sue 

 

PS - Perhaps I am tainted by the ISO model that suggests lower layers provide services for lower layers. 

 

From: Nfvrg [mailto:nfvrg-bounces@irtf.org] On Behalf Of PEDRO ANDRES ARANDA GUTIERREZ
Sent: Tuesday, June 02, 2015 2:38 AM
To: zhangyali (D); Susan Hares; nfvrg@irtf.org
Cc: draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org
Subject: Re: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent

 

Hi Yali,

 

let’s keep in the networking domain :-) I strongly believe that we need different levels or layers of intent. However, there are (at least) two different viewpoints:

 

If you follow the infrastructure view(which is where I feel more comfortable), I hope we agree that it is a completely different situation when you are designing a network element-by-element than when you are designing the network at a sub-domain level (for example levels in an IS-IS based network or areas if you use OSPF) or if you are defining the interconnections of a service provider’s AS (and dealing with BGP-4 policies) or if you are defining an end-to-end service. Although at the end, the upper layers will use all the features provided by the lower layers.

 

Now, I’m sure we can find the equivalent layering from a role point of view:

 

The user wants to access a service (for example a Web page), the provider of that Web page wants it to be served with the best quality of experience and so he chooses a specific provider – normally a CDN). The CDN provider will choose a given carrier to get access to the user’s service provider. The user’s service provider will dimension his network to fulfill a series of criteria. Within the service provider, the operators sitting at the Network Operations Centre will have to fulfill a series of KPIs, etc. 

 

As you see, I’m more a ‘box’ thinker. However, if someone can complete the ‘role’ example we can compare both approaches and try to identify if we can do any mapping between the two views. Maybe we could come up at end with a set of common denominators we can use to continue this discussion.

 

Best,

/PA

 

 

De: "zhangyali (D)" <zhangyali369@huawei.com>
Fecha: martes, 2 de junio de 2015 05:52
Para: PEDRO ANDRES ARANDA GUTIERREZ <pedroa.aranda@telefonica.com>om>, Sue Hares <shares@ndzh.com>om>, "nfvrg@irtf.org" <nfvrg@irtf.org>
CC: "draft-xia-ibnemo-icim@tools.ietf.org" <draft-xia-ibnemo-icim@tools.ietf.org>rg>, "ibnemo@ietf.org" <ibnemo@ietf.org>
Asunto: 答复: [Ibnemo] Defining a Common Model for intent
Nuevo envío de: <zhangyali369@huawei.com>
Nuevo envío para: <draft-xia-ibnemo-icim@ietf.org>
Fecha de nuevo envío: martes, 2 de junio de 2015 05:52

 

Hi Pedro,

 

Thanks for reviewing the draft and giving modification.

 

The question you have mentioned is a very important point for the abstraction of intent model. Maybe we can propose the transport market as a analogy.

1.       A customer wants to transport his goods from A to B. So his intent is getting his goods from A to B without carrying about how to do it. Then his intent is transferred to the transportation system. 

2.       This system analyzes customer’s requirement, and choose a suitable way to complete the requirement. For example, the system choose truck as the means. So the intent of transportation system is transferring the goods with truck.

3.       The driver of this truck analyze the path from A to B, and choose a most appropriate path to complete this order which will save more time. So  the intent of driver may be transferring the goods with the least time. Then the driver will start the engine, step on the gas, etc.

 

>From this analogy, the ultimate effect is the same, namely, transfer the goods from A to B. But the specific intent of different roles has some differences which depends on user’ role, knowledge, responsibility, etc. For example, transportation system is responsible for transporting goods, and he know the various ways. So he can form his intent by rendering the upper customer’s intent.

 

Supposing we divide users into different layers according to the implementation series, users in upper layer expresses his intent as what he want without having the knowledge about how to do it. Then the how procedure will be transferred to what in the lower layer according to knowledge and context. These transfer procedure lead to the completion of requirement. Same with the example in draft. Although the ultimate effect is same, the focus is different which will bring out the differentiation of intent.

 

This is just my immature opinion about intent. Do you think the differentiation of intent to complete the same thing is important and reasonable?

 

Best Regards,

 

Yali

 

发件人: PEDRO ANDRES ARANDA GUTIERREZ [mailto:pedroa.aranda@telefonica.com] 
发送时间: 2015年6月1日 17:15
收件人: Susan Hares; nfvrg@irtf.org
抄送: draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org
主题: Re: [Ibnemo] Defining a Common Model for intent

 

Hi,

 

A small clarification proposal for draft  <https://datatracker.ietf.org/doc/draft-xia-ibnemo-icim/> https://datatracker.ietf.org/doc/draft-xia-ibnemo-icim/ .

 

In section 2.4, I would leave the following as a paragraph

For example, in the network area the intent of end-users could be
safe connectivity between two sites which a technology independent
and device independent requirement. For business-based network
designers, the network connectivity can be selected which is device-
independent but technology specific. An example of the business-based
technology is the L3VPN. 
And change:
For network administrators, intent can be
specific operations on a set of devices such as configuring IP
addresses on network servers in a data center.

To

 

For network administrators, intent can be <new>defining a network topology like a router connected to a firewall, connected to a load balancer and this to two L2 networks where WWW servers sit or specifying the</new> operations on a set of devices such as configuring IP addresses on network servers in a data center.
 
Rationale behind this is again, that intent should be anything that is invariant and that expresses what a network operator/administrator may need to do, as opposed to how he would do that, i.e. The router is a HW device from vendor X or a virtual machine running a specific routing daemon over a given data-path implementation.
Best, /PA

---

Dr. Pedro A. Aranda Gutiérrez

 

Technology Exploration -

Network Innovation & Virtualisation

email: pedroa d0t aranda At telefonica d0t com

Telefónica, Investigación y Desarrollo

C/ D. Ramón de la Cruz,84

28006 Madrid, Spain

 

Fragen sind nicht da, um beantwortet zu werden.

Fragen sind da, um gestellt zu werden.

Georg Kreisler

 


  _____  



Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.

The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição

 

 

 

---

Dr. Pedro A. Aranda Gutiérrez

 

Technology Exploration -

Network Innovation & Virtualisation

email: pedroa d0t aranda At telefonica d0t com

Telefónica, Investigación y Desarrollo

C/ D. Ramón de la Cruz,84

28006 Madrid, Spain

 

Fragen sind nicht da, um beantwortet zu werden.

Fragen sind da, um gestellt zu werden.

Georg Kreisler

 

  _____  


Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.

The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição