Re: [Ibnemo] role based intent

Dave Hood <dave.hood@ericsson.com> Wed, 03 June 2015 15:59 UTC

Return-Path: <dave.hood@ericsson.com>
X-Original-To: ibnemo@ietfa.amsl.com
Delivered-To: ibnemo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 75CD31A9123 for <ibnemo@ietfa.amsl.com>; Wed, 3 Jun 2015 08:59:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.75
X-Spam-Level:
X-Spam-Status: No, score=-1.75 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_CHARSET_FARAWAY=2.45, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1oBnLzyug-Bg for <ibnemo@ietfa.amsl.com>; Wed, 3 Jun 2015 08:59:27 -0700 (PDT)
Received: from usevmg21.ericsson.net (usevmg21.ericsson.net [198.24.6.65]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C3F791A911B for <ibnemo@ietf.org>; Wed, 3 Jun 2015 08:59:26 -0700 (PDT)
X-AuditID: c6180641-f79086d000001909-d1-556ebed4fe71
Received: from EUSAAHC003.ericsson.se (Unknown_Domain [147.117.188.81]) by usevmg21.ericsson.net (Symantec Mail Security) with SMTP id F4.61.06409.4DEBE655; Wed, 3 Jun 2015 10:46:12 +0200 (CEST)
Received: from EUSAAMB105.ericsson.se ([147.117.188.122]) by EUSAAHC003.ericsson.se ([147.117.188.81]) with mapi id 14.03.0210.002; Wed, 3 Jun 2015 11:59:25 -0400
From: Dave Hood <dave.hood@ericsson.com>
To: Xiayinben <xiayinben@huawei.com>, Zhoutianran <zhoutianran@huawei.com>, STUART VENTERS <stuart.venters@adtran.com>, "Natale, Bob" <RNATALE@mitre.org>
Thread-Topic: role based intent
Thread-Index: AdCdxq4VFvGDpUDvRK6YJXpiQnECmwANkqOQAAXMRWAAAGlUUA==
Date: Wed, 3 Jun 2015 15:59:24 +0000
Message-ID: <8D15A2BAF93E9C49AB037A0647E5FA643F84DBFC@eusaamb105.ericsson.se>
References: <BBA82579FD347748BEADC4C445EA0F2166BBFAC2@nkgeml512-mbx.china.huawei.com> <8D15A2BAF93E9C49AB037A0647E5FA643F84C6C3@eusaamb105.ericsson.se> <5FD31D8EDBF4EC468B36D86F04FDB2E873828241@nkgeml507-mbs.china.huawei.com>
In-Reply-To: <5FD31D8EDBF4EC468B36D86F04FDB2E873828241@nkgeml507-mbs.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [147.117.188.10]
Content-Type: multipart/related; boundary="_004_8D15A2BAF93E9C49AB037A0647E5FA643F84DBFCeusaamb105erics_"; type="multipart/alternative"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrBIsWRmVeSWpSXmKPExsUyuXRPoO6VfXmhBsu/m1m03nzEZNF48ASz xfkFz1ksmtu3s1r8eHqX1WLCyQXMDmweKyY2snm0HHnL6rFkyU8mj8kbD7N5vG24yh7AGsVl k5Kak1mWWqRvl8CV0bJzMmvB3UlMFeua3jA1ML5vYOpi5OSQEDCRmLXvDzuELSZx4d56ti5G Lg4hgaOMEj8mrmWFcJYxSqzceZ4VpIpNQEPiyaXJTCAJEYHZjBJX9y1g6WLk4GAWcJNoPpMA UiMsICcxt3kZ2AYRAXmJnZePsULYThIXDy5kBilnEVCRaJjKARLmFfCVmNTYzAJiCwk8ZZSY PJkZxOYUCJOYfWUNG4jNCHTc91NrwEYyC4hL3HoyH+oBEYmHF0+zQdiiEi8f/2OFsJUkJi09 B3Y/s0A3o8T9d3tYIJYJSpyc+YRlAqPoLCSzZiGrm4WkDqIoX6L9zUYmCFtLYl7DbyhbUWJK 90N2CFtT4srkQ1C2tsSyha+ZIWxdiekTjsDVz17+ihFi2VJGiU0nvkMt0JFYuucNI7KhCxh5 VzFylBanluWmGxluYgQmjWMSbI47GBd8sjzEKMDBqMTDm6CeFyrEmlhWXJl7iFGag0VJnFfa DygkkJ5YkpqdmlqQWhRfVJqTWnyIkYmDU6qBsevlubXdBfsaJx6ZOskqJyEzW25feOB1ttsX HpQJlx5XXOmvZFRc9vfOgy97ikNfSlb5GIaI9/5yPJwYxuYmv2t7QPGS5yJndY8HX528dz3b zlRO3k7uB2sXVh7PE1+heHmD5w7O404nti65tyNr8Y9vJgnRIsYTPuju8+6UMbl0ltPLeu6H LCWW4oxEQy3mouJEAJxhU637AgAA
Archived-At: <http://mailarchive.ietf.org/arch/msg/ibnemo/MH-_NCODpBXtaQgvurhUR0FoIcw>
Cc: "sdn@irtf.org" <sdn@irtf.org>, "ibnemo@ietf.org" <ibnemo@ietf.org>
Subject: Re: [Ibnemo] role based intent
X-BeenThere: ibnemo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of Nemo, an intent-based North Bound \(NB\) interface consisting of an application protocol running over HTTP \(RESTful interfaces\) to exchange intent-based primitives between applications and meta-controllers controlling virtual network resources \(networks, storage, CPU\)." <ibnemo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ibnemo/>
List-Help: <mailto:ibnemo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Jun 2015 15:59:29 -0000

I do think this is acceptable, but it takes us back to the point that any NBI conveys intent, for its user and its provider in its context, which renders the concept not particularly useful. It would be really helpful to see a concrete example of something that we can all agree is *not* intent.

Dave

From: Xiayinben [mailto:xiayinben@huawei.com]
Sent: Wednesday, June 03, 2015 8:53 AM
To: Dave Hood; Zhoutianran; STUART VENTERS; Natale, Bob
Cc: sdn@irtf.org; ibnemo@ietf.org
Subject: 答复: role based intent

Hi Dave,

I think the meaning of ‘one intent layer’ is that each role has one intent layer but not all roles have one intent layer.
And we don’t need care about the layer relationship between different role’s intent. So  in general, there is only one intent layer.
Do you think this is acceptable?

Yinben

发件人: Ibnemo [mailto:ibnemo-bounces@ietf.org] 代表 Dave Hood
发送时间: 2015年6月3日 21:03
收件人: Zhoutianran; STUART VENTERS; Natale, Bob
抄送: sdn@irtf.org<mailto:sdn@irtf.org>; ibnemo@ietf.org<mailto:ibnemo@ietf.org>
主题: Re: [Ibnemo] role based intent

Layering is the right issue, but the point is a little different. We, who look at the global scenario from the perspective of the gods, see that there is a recursion of clients/servers or customers/providers or ….

But from the perspective of any one of those interfaces, the other layers are completely invisible. So a given app can invoke intent against a given SDN controller, but the controller doesn’t know whether the app is just a middleman, and the app doesn’t know whether the controller can satisfy its requirements directly or whether it is also just a middleman.

You can have one intent layer, as long as you recognize that you are only seeing one slice of the world. If you insist on only one northernmost intent layer in toto, you will have to go back to the “make money” intent of the investors.

And if we recognize that each interface stands on its own, then any service invocation across that interface qualifies as an expression and satisfaction of intent by that particular invoker-provider pair.

Dave

From: Zhoutianran [mailto:zhoutianran@huawei.com]
Sent: Tuesday, June 02, 2015 11:30 PM
To: Dave Hood; STUART VENTERS; Natale, Bob
Cc: ibnemo@ietf.org<mailto:ibnemo@ietf.org>; sdn@irtf.org<mailto:sdn@irtf.org>
Subject: role based intent


Hi Dave, Stuart, Bob and all,



I found many problems raised in the mailing list are coursed by the layered intent thinking. Maybe we are tainted by the ISO model:-)



For the layered intent, intent is a spectrum, very abstract at the top layer, more network specific and less abstract when the layer goes down. The problem is that the boundary of intent and non intent is vague. Or there is no boundary between this two, since one's what may be another one's how. And consequently, it looks like everything is intent and no clear intent definition.



The role based intent will provide only one intent layer. That is always the top layer abstraction for each role, as shown in the following figure. The functions can be layered as the implementation of the intent layer.

[cid:image001.jpg@01D09DDB.9566DF10]

With the role based intent, although the end user's intent is much abstracted then the network administrator's intent, they are not related each other. I.e., the end user will not use the administrator's intent. And the admin will not provide additional services/interfaces to the end user.



The essential of layering is that the lower layer will provide interface to the higher layer. In order to fit up layer requirements, the lower layer will provide adequate interfaces/capabilities. That also means too much information for a dedicated up layer user/app.



For role based intent, we can firstly indentify various roles (no need to be complete, but those with attention), and then figure out the intent of each role. In this way, intent can be clear defined. That will also keep the intent of each role to a small set on what they really cares about, without expending to support other one’s intent.





Best Regards,

Terence