Re: [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model for intent
"Susan Hares" <shares@ndzh.com> Fri, 05 June 2015 18:51 UTC
Return-Path: <shares@ndzh.com>
X-Original-To: ibnemo@ietfa.amsl.com
Delivered-To: ibnemo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 9498A1A1EF7
for <ibnemo@ietfa.amsl.com>; Fri, 5 Jun 2015 11:51:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -98.154
X-Spam-Level:
X-Spam-Status: No, score=-98.154 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001,
J_CHICKENPOX_45=0.6, MIME_8BIT_HEADER=0.3, USER_IN_WHITELIST=-100]
autolearn=no
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id jM_ELR85dmAW for <ibnemo@ietfa.amsl.com>;
Fri, 5 Jun 2015 11:51:46 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com
[64.9.205.143]) by ietfa.amsl.com (Postfix) with ESMTP id B9B951A3B9D
for <ibnemo@ietf.org>; Fri, 5 Jun 2015 11:51:45 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS))
x-ip-name=184.157.80.157;
From: "Susan Hares" <shares@ndzh.com>
To: "'Xiayinben'" <xiayinben@huawei.com>,
"'PEDRO ANDRES ARANDA GUTIERREZ'" <pedroa.aranda@telefonica.com>,
"'zhangyali \(D\)'" <zhangyali369@huawei.com>, <nfvrg@irtf.org>
References: <D19315B6.1D624%pedroa.aranda@telefonica.com>
<014801d09d86$46b6d4b0$d4247e10$@ndzh.com>
<D19460A3.1D73F%pedroa.aranda@telefonica.com>
<5FD31D8EDBF4EC468B36D86F04FDB2E8738281E9@nkgeml507-mbs.china.huawei.com>
<001401d09edb$2d6a1de0$883e59a0$@ndzh.com>
<5FD31D8EDBF4EC468B36D86F04FDB2E87382988C@nkgeml507-mbs.china.huawei.com>
In-Reply-To: <5FD31D8EDBF4EC468B36D86F04FDB2E87382988C@nkgeml507-mbs.china.huawei.com>
Date: Fri, 5 Jun 2015 14:51:34 -0400
Message-ID: <02b601d09fc0$a54f01a0$efed04e0$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="----=_NextPart_000_02B7_01D09F9F.1E468960"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQIyszWq5a5j3lzymrlGmCaVlNwkHQHyOFyyAiYPs3QCjjxcFAI6m0QdAewquu6cg6+aUA==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/ibnemo/WTorgowUU3CDrdPreoDRDAWwDD0>
Cc: draft-xia-ibnemo-icim@tools.ietf.org, ibnemo@ietf.org
Subject: Re: [Ibnemo] =?utf-8?b?562U5aSNOiBbTmZ2cmddIOetlOWkjTogIERlZmluaW5n?=
=?utf-8?q?_a_Common_Model_for_intent?=
X-BeenThere: ibnemo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of Nemo,
an intent-based North Bound \(NB\) interface consisting of an
application protocol running over HTTP \(RESTful interfaces\) to exchange
intent-based primitives between applications and meta-controllers controlling
virtual network resources \(networks, storage, CPU\)." <ibnemo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ibnemo>,
<mailto:ibnemo-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ibnemo/>
List-Help: <mailto:ibnemo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ibnemo>,
<mailto:ibnemo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jun 2015 18:51:51 -0000
Yinben:
I would suggest along with Bob that these are two business level intents.
a) Be a provider’s provider for AS2
b) Load Balance traffic to AS 2
Intent = object (AS2), result (be provider for AS2), constraint ((implied) SLAs)
Object (AS2), result (traffic load-balanced on connections), constraint (implied, SLAs)
What do you think? It matches your original definition of intent, and I think these can be two classes of intent (contract, network traffc).
Sue
From: Xiayinben [mailto:xiayinben@huawei.com]
Sent: Friday, June 05, 2015 9:02 AM
To: Susan Hares; 'PEDRO ANDRES ARANDA GUTIERREZ'; zhangyali (D); nfvrg@irtf.org
Cc: draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org
Subject: 答复: [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model for intent
Yes. According to Pedro’s word, one role belongs to “management floor” and another belongs to “Network Operation Centre”.
Yinben
发件人: Susan Hares [mailto:shares@ndzh.com]
发送时间: 2015年6月4日 23:29
收件人: Xiayinben; 'PEDRO ANDRES ARANDA GUTIERREZ'; zhangyali (D); nfvrg@irtf.org
抄送: draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org
主题: RE: [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model for intent
Yinben:
I agree that the intent is being expressed by two roles:
1) Provider’s provider – AS1 is a provider for AS 2.
2) Traffic balancer – AS 1 is traffic balance traffic to AS 2.
Is this what you meant?
Sue
From: Ibnemo [mailto:ibnemo-bounces@ietf.org] On Behalf Of Xiayinben
Sent: Wednesday, June 03, 2015 11:38 AM
To: PEDRO ANDRES ARANDA GUTIERREZ; Susan Hares; zhangyali (D); nfvrg@irtf.org
Cc: draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org
Subject: [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model for intent
HI Pedro,
In my understanding, your examples are two roles’ intent at same layer in infrastructure.
So I think that a intent is only related with what are role’s caring. Finding which layer it is in is not helpful.
Even in translating the intent to a set of real interfaces, it is not necessary to map layer by layer.
My 2 cents,
Yinben
发件人: Nfvrg [mailto:nfvrg-bounces@irtf.org] 代表 PEDRO ANDRES ARANDA GUTIERREZ
发送时间: 2015年6月3日 14:13
收件人: Susan Hares; zhangyali (D); nfvrg@irtf.org
抄送: draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org
主题: Re: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent
Hi,
So, let’s keep in one layer first. And since you mention my pet-topic (BGP), let’s stay there :-)
Ex.1
There is a lot of work on the relations between autonomous systems (provider, client, sibling, etc.)
So intent for me is the assertion "AS1 is a provider for AS2”; the implementation would use advertisements, route-maps etc. and that is not intent
Ex.2
AS1 is connected to AS2, he has several links and wants to implement load-balancing between them. “Load balancing" is the intent and advertisements, route-maps etc. is the implementation and that’s not intent.
>From an infrastructure point of view, we have two instances of intent at the same “layer”. However role-wise, the decision of entering a client-provider relationship between ASes is taken in the ‘management floor’ and the decision of load-balancing in taken in the Network Operation Centre. This is the reason for my double take at intent
Regarding whether intent @ layer N + context @ layer N —> something @ layer N-1 and from my example above depends how or whether we structure the role dimension into layers.
The policy continuum paper would somehow suggest that this mapping between layers somehow happens in the infrastructure dimension
My .2 cents,
/PA
De: Sue Hares <shares@ndzh.com>
Fecha: miércoles, 3 de junio de 2015 00:48
Para: PEDRO ANDRES ARANDA GUTIERREZ <pedroa.aranda@telefonica.com>om>, "'zhangyali (D)'" <zhangyali369@huawei.com>om>, "nfvrg@irtf.org" <nfvrg@irtf.org>
CC: "draft-xia-ibnemo-icim@tools.ietf.org" <draft-xia-ibnemo-icim@tools.ietf.org>rg>, "ibnemo@ietf.org" <ibnemo@ietf.org>
Asunto: RE: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent
Pedro and Yali:
It helps to keep in the networking domain where I am familiar with work! I agree that intent goes through the layers, but I still struggle to make the connections.
I know that instances of code (BGP) on devices create zones of connectivity (sub-domains/subnets, AS, Groups of AS), but I think there must be more in the intent discuss. Yinben and Yali’s comments that
User à intent à context
is still the key information. Is it Intent + context (layer n) to ? at layer n-1.
Sue
PS - Perhaps I am tainted by the ISO model that suggests lower layers provide services for lower layers.
From: Nfvrg [mailto:nfvrg-bounces@irtf.org] On Behalf Of PEDRO ANDRES ARANDA GUTIERREZ
Sent: Tuesday, June 02, 2015 2:38 AM
To: zhangyali (D); Susan Hares; nfvrg@irtf.org
Cc: draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org
Subject: Re: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent
Hi Yali,
let’s keep in the networking domain :-) I strongly believe that we need different levels or layers of intent. However, there are (at least) two different viewpoints:
If you follow the infrastructure view(which is where I feel more comfortable), I hope we agree that it is a completely different situation when you are designing a network element-by-element than when you are designing the network at a sub-domain level (for example levels in an IS-IS based network or areas if you use OSPF) or if you are defining the interconnections of a service provider’s AS (and dealing with BGP-4 policies) or if you are defining an end-to-end service. Although at the end, the upper layers will use all the features provided by the lower layers.
Now, I’m sure we can find the equivalent layering from a role point of view:
The user wants to access a service (for example a Web page), the provider of that Web page wants it to be served with the best quality of experience and so he chooses a specific provider – normally a CDN). The CDN provider will choose a given carrier to get access to the user’s service provider. The user’s service provider will dimension his network to fulfill a series of criteria. Within the service provider, the operators sitting at the Network Operations Centre will have to fulfill a series of KPIs, etc.
As you see, I’m more a ‘box’ thinker. However, if someone can complete the ‘role’ example we can compare both approaches and try to identify if we can do any mapping between the two views. Maybe we could come up at end with a set of common denominators we can use to continue this discussion.
Best,
/PA
De: "zhangyali (D)" <zhangyali369@huawei.com>
Fecha: martes, 2 de junio de 2015 05:52
Para: PEDRO ANDRES ARANDA GUTIERREZ <pedroa.aranda@telefonica.com>om>, Sue Hares <shares@ndzh.com>om>, "nfvrg@irtf.org" <nfvrg@irtf.org>
CC: "draft-xia-ibnemo-icim@tools.ietf.org" <draft-xia-ibnemo-icim@tools.ietf.org>rg>, "ibnemo@ietf.org" <ibnemo@ietf.org>
Asunto: 答复: [Ibnemo] Defining a Common Model for intent
Nuevo envío de: <zhangyali369@huawei.com>
Nuevo envío para: <draft-xia-ibnemo-icim@ietf.org>
Fecha de nuevo envío: martes, 2 de junio de 2015 05:52
Hi Pedro,
Thanks for reviewing the draft and giving modification.
The question you have mentioned is a very important point for the abstraction of intent model. Maybe we can propose the transport market as a analogy.
1. A customer wants to transport his goods from A to B. So his intent is getting his goods from A to B without carrying about how to do it. Then his intent is transferred to the transportation system.
2. This system analyzes customer’s requirement, and choose a suitable way to complete the requirement. For example, the system choose truck as the means. So the intent of transportation system is transferring the goods with truck.
3. The driver of this truck analyze the path from A to B, and choose a most appropriate path to complete this order which will save more time. So the intent of driver may be transferring the goods with the least time. Then the driver will start the engine, step on the gas, etc.
>From this analogy, the ultimate effect is the same, namely, transfer the goods from A to B. But the specific intent of different roles has some differences which depends on user’ role, knowledge, responsibility, etc. For example, transportation system is responsible for transporting goods, and he know the various ways. So he can form his intent by rendering the upper customer’s intent.
Supposing we divide users into different layers according to the implementation series, users in upper layer expresses his intent as what he want without having the knowledge about how to do it. Then the how procedure will be transferred to what in the lower layer according to knowledge and context. These transfer procedure lead to the completion of requirement. Same with the example in draft. Although the ultimate effect is same, the focus is different which will bring out the differentiation of intent.
This is just my immature opinion about intent. Do you think the differentiation of intent to complete the same thing is important and reasonable?
Best Regards,
Yali
发件人: PEDRO ANDRES ARANDA GUTIERREZ [mailto:pedroa.aranda@telefonica.com]
发送时间: 2015年6月1日 17:15
收件人: Susan Hares; nfvrg@irtf.org
抄送: draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org
主题: Re: [Ibnemo] Defining a Common Model for intent
Hi,
A small clarification proposal for draft <https://datatracker.ietf.org/doc/draft-xia-ibnemo-icim/> https://datatracker.ietf.org/doc/draft-xia-ibnemo-icim/ .
In section 2.4, I would leave the following as a paragraph
For example, in the network area the intent of end-users could be
safe connectivity between two sites which a technology independent
and device independent requirement. For business-based network
designers, the network connectivity can be selected which is device-
independent but technology specific. An example of the business-based
technology is the L3VPN.
And change:
For network administrators, intent can be
specific operations on a set of devices such as configuring IP
addresses on network servers in a data center.
To
For network administrators, intent can be <new>defining a network topology like a router connected to a firewall, connected to a load balancer and this to two L2 networks where WWW servers sit or specifying the</new> operations on a set of devices such as configuring IP addresses on network servers in a data center.
Rationale behind this is again, that intent should be anything that is invariant and that expresses what a network operator/administrator may need to do, as opposed to how he would do that, i.e. The router is a HW device from vendor X or a virtual machine running a specific routing daemon over a given data-path implementation.
Best, /PA
---
Dr. Pedro A. Aranda Gutiérrez
Technology Exploration -
Network Innovation & Virtualisation
email: pedroa d0t aranda At telefonica d0t com
Telefónica, Investigación y Desarrollo
C/ D. Ramón de la Cruz,84
28006 Madrid, Spain
Fragen sind nicht da, um beantwortet zu werden.
Fragen sind da, um gestellt zu werden.
Georg Kreisler
_____
Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.
The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.
Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição
---
Dr. Pedro A. Aranda Gutiérrez
Technology Exploration -
Network Innovation & Virtualisation
email: pedroa d0t aranda At telefonica d0t com
Telefónica, Investigación y Desarrollo
C/ D. Ramón de la Cruz,84
28006 Madrid, Spain
Fragen sind nicht da, um beantwortet zu werden.
Fragen sind da, um gestellt zu werden.
Georg Kreisler
_____
Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.
The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.
Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição
---
Dr. Pedro A. Aranda Gutiérrez
Technology Exploration -
Network Innovation & Virtualisation
email: pedroa d0t aranda At telefonica d0t com
Telefónica, Investigación y Desarrollo
C/ D. Ramón de la Cruz,84
28006 Madrid, Spain
Fragen sind nicht da, um beantwortet zu werden.
Fragen sind da, um gestellt zu werden.
Georg Kreisler
_____
Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.
The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.
Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição
- Re: [Ibnemo] 答复: Defining a Common Model for inte… PEDRO ANDRES ARANDA GUTIERREZ
- [Ibnemo] 答复: 答复: Defining a Common Model for inte… zhangyali (D)
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] 答复: 答复: Defining a Common Model for … Susan Hares
- [Ibnemo] 答复: 答复: 答复: Defining a Common Model for … zhangyali (D)
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … PEDRO ANDRES ARANDA GUTIERREZ
- [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model … Xiayinben
- Re: [Ibnemo] 答复: 答复: 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- [Ibnemo] 答复: 答复: 答复: 答复: Defining a Common Model … zhangyali (D)
- [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model … zhangyali (D)
- Re: [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] 答复: 答复: 答复: 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… DIEGO LOPEZ GARCIA
- [Ibnemo] 答复: 答复: 答复: 答复: 答复: Defining a Common Mo… zhangyali (D)
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Natale, Bob
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … PEDRO ANDRES ARANDA GUTIERREZ
- [Ibnemo] 答复: 答复: [Nfvrg] 答复: Defining a Common Mo… Xiayinben
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] 答复: 答复: 答复: 答复: 答复: Defining a Commo… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Gember-Jacobson, Aaron
- [Ibnemo] 答复: [Nfvrg] 答复: 答复: Defining a Common Mo… Xiayinben
- [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model … Xiayinben
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… PEDRO ANDRES ARANDA GUTIERREZ
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Zhoutianran
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … PEDRO ANDRES ARANDA GUTIERREZ
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Bert Wijnen (IETF)
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Sumandra Majee
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares