Re: [Ibnemo] [Sdn] Defining a Common Model for intent

Dave Hood <dave.hood@ericsson.com> Tue, 02 June 2015 13:26 UTC

Return-Path: <dave.hood@ericsson.com>
X-Original-To: ibnemo@ietfa.amsl.com
Delivered-To: ibnemo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 151EF1A898A for <ibnemo@ietfa.amsl.com>; Tue, 2 Jun 2015 06:26:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=unavailable
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HYFiP3xEAwED for <ibnemo@ietfa.amsl.com>; Tue, 2 Jun 2015 06:26:19 -0700 (PDT)
Received: from usevmg20.ericsson.net (usevmg20.ericsson.net [198.24.6.45]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D8B2B1A898D for <ibnemo@ietf.org>; Tue, 2 Jun 2015 06:26:16 -0700 (PDT)
X-AuditID: c618062d-f79a96d000007fb1-b6-556d55a133cc
Received: from EUSAAHC006.ericsson.se (Unknown_Domain [147.117.188.90]) by usevmg20.ericsson.net (Symantec Mail Security) with SMTP id 08.FA.32689.1A55D655; Tue, 2 Jun 2015 09:05:06 +0200 (CEST)
Received: from EUSAAMB105.ericsson.se ([147.117.188.122]) by EUSAAHC006.ericsson.se ([147.117.188.90]) with mapi id 14.03.0210.002; Tue, 2 Jun 2015 09:26:13 -0400
From: Dave Hood <dave.hood@ericsson.com>
To: "Lifengkai (Fengkai)" <lifengkai@huawei.com>, Susan Hares <shares@ndzh.com>, "sdn@irtf.org" <sdn@irtf.org>
Thread-Topic: [Sdn] Defining a Common Model for intent
Thread-Index: AdCbEy9UHkEQylvfQJyfdpRUZhhXPwBfgiUQAB27oPAAC6JcEA==
Date: Tue, 2 Jun 2015 13:26:13 +0000
Message-ID: <8D15A2BAF93E9C49AB037A0647E5FA643F84AAA2@eusaamb105.ericsson.se>
References: <00f301d09b13$79cc2410$6d646c30$@ndzh.com> <8D15A2BAF93E9C49AB037A0647E5FA643F8490D8@eusaamb105.ericsson.se> <865C20BAAE8BBD4C89E7D6FE694F6B3B2D3CA540@nkgeml505-mbs.china.huawei.com>
In-Reply-To: <865C20BAAE8BBD4C89E7D6FE694F6B3B2D3CA540@nkgeml505-mbs.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [147.117.188.11]
Content-Type: multipart/alternative; boundary="_000_8D15A2BAF93E9C49AB037A0647E5FA643F84AAA2eusaamb105erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprKIsWRmVeSWpSXmKPExsUyuXRPlO6i0NxQg0sPuS1abz5isti5/j6j xfkFz1ks/rx5xWLx4+ldVosJJxcwO7B5tBx5y+qxZMlPJo/JGw+zecx+fZ01gCWKyyYlNSez LLVI3y6BK+Pqn0ksBe+WMlUc37CetYFxZyNTFyMnh4SAicS5H3tYIGwxiQv31rN1MXJxCAkc ZZR4cfQgE4SzjFHi0+cbbCBVbAIaEk8uTQbrFhEokFhyaAE7iM0sUChx6HgTK4gtLGAqsWfH OhaIGjOJlRdXMHYxcgDZThKbL2WBmCwCKhItP0pBTF4BX4mWE5oQm44xSlzbNR2sk1MgTOLM 67dgNiPQbd9PrWGC2CQucevJfKj7BSSW7DnPDGGLSrx8/I8VwlaS+Ph7PjvIfGaBfIkZH3RA wrwCghInZz5hmcAoOgvJpFkIVbOQVEGU6Egs2P2JDcLWlli28DUzjH3mwGMmZPEFjOyrGDlK i1PLctONDDYxAuPxmASb7g7GPS8tDzEKcDAq8fAumJsTKsSaWFZcmXuIUZqDRUmc95thSKiQ QHpiSWp2ampBalF8UWlOavEhRiYOTqkGRtHn/jq7P3V435gQHqHdohoandVde+IEd8S2bbm7 586f2VK7Z0uH3/ynLO1zbnEt3BF8XMJ9XsXWaWdPvfMX/Xjpj+FzT86uVblVznmcjlm2lvuZ itWf1p+Nm2B1JsF/ZaueB4+6kNT3Bhk5DUf3d7cM/pgm/bCbvbS47aHvPcFlmpt/v5htosRS nJFoqMVcVJwIAOp1O0eoAgAA
Archived-At: <http://mailarchive.ietf.org/arch/msg/ibnemo/Mz_b19rotI3LwIDd9E7nJZaQfzE>
Cc: "ibnemo@ietf.org" <ibnemo@ietf.org>
Subject: Re: [Ibnemo] [Sdn] Defining a Common Model for intent
X-BeenThere: ibnemo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of Nemo, an intent-based North Bound \(NB\) interface consisting of an application protocol running over HTTP \(RESTful interfaces\) to exchange intent-based primitives between applications and meta-controllers controlling virtual network resources \(networks, storage, CPU\)." <ibnemo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ibnemo/>
List-Help: <mailto:ibnemo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jun 2015 13:26:25 -0000

I agree that the context matters, Fengkai (and Susan in earlier response). What the I-D appears to be saying is that any interaction across an NBI is intent: otherwise the app/tenant/customer wouldn't do it. That's the root of my question from the beginning: how would we know what is *not* intent?

If I ask for some particular microscopically detailed configuration (a "how"), it's because I care, for some reason, about that level of detail. It is in fact part of my intent.

In my IT example, I argue that intent need not be independent of protocols and ports, and that it need not be portable. Your response about context appears to agree.

So as best I can tell, we can say precisely what an intent is, and we can't say what an intent is not. If intent is just the latest buzzword, which it certainly appears to be, can we just say so and leave it to the marketing people?

Dave

From: Lifengkai (Fengkai) [mailto:lifengkai@huawei.com]
Sent: Tuesday, June 02, 2015 12:47 AM
To: Dave Hood; Susan Hares; sdn@irtf.org
Cc: Zhoutianran; Xiayinben; ibnemo@ietf.org
Subject: RE: [Sdn] Defining a Common Model for intent

Hi Dave and all,

Thanks for proposing the two valuable intent use cases.

For the use case 2, I agree that the IT employee needs to include the details of ports/protocols into his/her intent descriptions, but those may not be in the intent context scope of a non-IT employee. Have a further consideration with this, different users of the network have their own intent in a specific domain. Then the roles/actors of network users, such as end users, application developers, tenant IT/network administrators, operator network administrators, are valuable to be identified and distinguished, thus fitting the intent requirements of the network users with different roles.

Any thoughts about this consideration?


Best Regards,
Fengkai

From: sdn [mailto:sdn-bounces@irtf.org] On Behalf Of Dave Hood
Sent: Tuesday, June 02, 2015 1:38 AM
To: Susan Hares; sdn@irtf.org<mailto:sdn@irtf.org>
Cc: Zhoutianran; Xiayinben; ibnemo@ietf.org<mailto:ibnemo@ietf.org>
Subject: Re: [Sdn] Defining a Common Model for intent

An excerpt from an email I sent on the ONF NBI list, which may contain some useful thoughts:

I have always had trouble understanding what an intent really is, so I am looking forward to making the concept more precise.

When I click a link on a web page, I express an intent to invoke whatever that link offers. Completely below the surface is a layer stack, on-demand session establishment, DNS look-ups, server load balancers, and any number of other technological features that are of no interest to me. Why not use that as an example of intent?

Better yet, we talk about negotiation and selection. Suppose I want to buy a widget. I probably already have some idea whether I want to go to Amazon or EBay or somewhere else. Suppose it's Amazon. I search Amazon's catalog and receive an offer of several widgets, some new, some used, some with a choice of colour or other pertinent features. If I see nothing I like, I may open a new browser window and check out Best Buy or EBay (lots more hidden technology to make that happen!). Maybe I come back to the Amazon page, having found nothing I liked better somewhere else. Now I accept one of the offered widgets and go through the checkout process.

Do we agree that this is a fairly pure expression of intent as conceptualized in the paper? (If not, let's talk about making a Skype call.)

Ok, that's my intent as an internet user. Let's assume the network is all SDN of one kind or another. I invoke my intent through a GUI onto software local to my PC, but I don't think we can call the PC an SDN controller. It's more an active mediator, a client to an SDN. As far as the network is concerned, the client makes DNS queries and swaps opaque TCP packets over a forwarding path that may already exist, or may need to be learned and set up on demand. This is about right, because the session content may well be encrypted end to end, and rightly.

To the SDN controller, my intent is satisfied by directing DNS queries to a known DNS server somewhere, and ensuring IP connectivity for the subsequent session. Hmmm... what happened to our intent-based NBI? The SDN offered my PC a packet interface with the properties of knowing how to recognize and route DNS queries specially, and general IP connectivity. My PC accepted the service offer implicitly by offering traffic to the data-plane interface. The network could be performing associated auxiliary services such as usage-based billing (think wireless roaming), so it's more than just a dumb pipe.

If this is not a legitimate example of intent, it would be good to write the white paper in such a way that clearly excludes such cases.

Use case 2: suppose I am a corporate IT employee, and suppose that my intent is to have an E-Line between two of my campi. I necessarily care about ports and protocols; talk about intent being portable and protocol independent continues to confuse me completely. How can I order an E-line without caring about such details? [Nor is this intent portable.]

Obviously, an SDN controller is going to expose whatever actions and elements of information are germane to the service it offers, and if ports and protocols are germane to the service, so be it.

The SDN architecture, being recursive, models the north side of any controller as exposing an instance of an information model, customized for the intended client/customer/app/user. That being the case, how do we distinguish an NBI API that conveys intent (service: same thing?) from one that does not?

I have recently come to the view that granularity is the criterion by which an intent or service invocation is distinguished. Colloquially speaking, a service invocation is a single invocation across the API: give me E-Line. Now of course this turns into constraint negotiation, offer and acceptance, but what happens across the API is effectively one transaction. In contrast, what we might agree is *not* an intent or a service is the manipulation of a granular information model, the explicit visibility of multiple objects, how they are interrelated, their attributes, and the like.


*         Network as a single lump vs some non-trivial topology.


*         Chauffeur vs driving a car. Legitimate reasons to choose one option or the other, but the level of granularity is quite different. Shall we agree that driving is too granular to be considered intent?

This idea of granularity and detailed operations on the components (which of course may be complex entities themselves, virtualized into simple-appearing lumps) seems to me to capture the essence of what people are talking about when they say intent or service. I am not comfortable with the way I am expressing it, so if this is a step in a productive direction, or even if it's not, I welcome suggestions to clarify the concept.

Dave

From: sdn [mailto:sdn-bounces@irtf.org] On Behalf Of Susan Hares
Sent: Saturday, May 30, 2015 1:02 PM
To: sdn@irtf.org<mailto:sdn@irtf.org>
Cc: 'Zhoutianran'; 'Xiayinben'; ibnemo@ietf.org<mailto:ibnemo@ietf.org>
Subject: [Sdn] Defining a Common Model for intent

On this mail list, there has been a discussion of two types of information for Intent and Nemo: (http://www.ietf.org/mail-archive/web/sdn/current/msg00646.html) :


1)      What information is needed to represent a service request,

2)      How to represent and transport the information for a request.

In order to define what information is needed to represent a 1) service request that signals Intent from an application to a controller, it is important to define Intent, and provide a clear model of Intent.  Also, in describing real use-cases it is important that one uses the same definition and model for Intent in each use case.

In the current forums examining Intent (ODL NIC, ODL Nemo, OF NBI and Keystone, OPNFV Movie, OpenStack) there is a realization that Intent occurs at multiple layers.  The authors of draft-xia-ibnemo-icim have created a definition for intent and a unified model for defining intent which can handle 1 or multiple layers. The model suggest that:

1)      A user has a intent that is expressed in a context.

2)      Intent (usually) involves an object with a result, and optionally includes operations toward that result.

3)      Operations conditions perform actions within/modified by constraints.

We believe this defines clearly what others are calling "pure intent" (objects + results) versus "constrained intent" (objects + operations + constraints).   The draft can be found at:   https://datatracker.ietf.org/doc/draft-xia-ibnemo-icim/ .   The authors are looking for feedback on the concepts in the draft.

Sue Hares