[Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model for intent

Xiayinben <xiayinben@huawei.com> Sat, 06 June 2015 13:22 UTC

Return-Path: <xiayinben@huawei.com>
X-Original-To: ibnemo@ietfa.amsl.com
Delivered-To: ibnemo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A23D31B2D60 for <ibnemo@ietfa.amsl.com>; Sat, 6 Jun 2015 06:22:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: YES
X-Spam-Score: 5.577
X-Spam-Level: *****
X-Spam-Status: Yes, score=5.577 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FB_WORD1_END_DOLLAR=3.294, FB_WORD2_END_DOLLAR=3.294, J_CHICKENPOX_12=0.6, MANGLED_OFF=2.3, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id twqS1uNmGs9B for <ibnemo@ietfa.amsl.com>; Sat, 6 Jun 2015 06:22:26 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A6F8D1ABD3C for <ibnemo@ietf.org>; Sat, 6 Jun 2015 06:22:23 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml401-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BTM29223; Sat, 06 Jun 2015 13:22:21 +0000 (GMT)
Received: from NKGEML403-HUB.china.huawei.com (10.98.56.34) by lhreml401-hub.china.huawei.com (10.201.5.240) with Microsoft SMTP Server (TLS) id 14.3.158.1; Sat, 6 Jun 2015 14:22:19 +0100
Received: from NKGEML507-MBS.china.huawei.com ([169.254.6.7]) by nkgeml403-hub.china.huawei.com ([10.98.56.34]) with mapi id 14.03.0158.001; Sat, 6 Jun 2015 21:22:07 +0800
From: Xiayinben <xiayinben@huawei.com>
To: Sumandra Majee <S.Majee@F5.com>, "Bert Wijnen (IETF)" <bwietf@bwijnen.net>, Susan Hares <shares@ndzh.com>, Zhoutianran <zhoutianran@huawei.com>, "'Natale, Bob'" <RNATALE@mitre.org>, "zhangyali (D)" <zhangyali369@huawei.com>, "'PEDRO ANDRES ARANDA GUTIERREZ'" <pedroa.aranda@telefonica.com>, "nfvrg@irtf.org" <nfvrg@irtf.org>
Thread-Topic: =?utf-8?B?W05mdnJnXSDnrZTlpI06IFtJYm5lbW9dIERlZmluaW5nIGEgQ29tbW9uIE1v?= =?utf-8?Q?del_for_intent?=
Thread-Index: AQHQn9kSosXehKqrLUSsHBTu16k0w52ehwKA
Date: Sat, 6 Jun 2015 13:22:06 +0000
Message-ID: <5FD31D8EDBF4EC468B36D86F04FDB2E87382A681@nkgeml507-mbs.china.huawei.com>
References: <D1976655.3AEC7%s.majee@f5.com>
In-Reply-To: <D1976655.3AEC7%s.majee@f5.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.45.29.109]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <http://mailarchive.ietf.org/arch/msg/ibnemo/Y72XKmfBSBVyZ2ZAxeAMjb315rQ>
Cc: "ibnemo@ietf.org" <ibnemo@ietf.org>
Subject: [Ibnemo] =?utf-8?b?562U5aSNOiBbTmZ2cmddIOetlOWkjTogIERlZmluaW5n?= =?utf-8?q?_a_Common_Model_for_intent?=
X-BeenThere: ibnemo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of Nemo, an intent-based North Bound \(NB\) interface consisting of an application protocol running over HTTP \(RESTful interfaces\) to exchange intent-based primitives between applications and meta-controllers controlling virtual network resources \(networks, storage, CPU\)." <ibnemo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ibnemo/>
List-Help: <mailto:ibnemo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 06 Jun 2015 13:22:30 -0000

Hi Sumandra,

RBAC is a very good system based on role. But it is limited on access control. If we use this thinking to network interface design, I think it should be used by intent interface.

Let me give an example to explain the meaning of that diagrm:
A network system has some executable function interfaces
f(1)..f(n): a series of interfaces to create a TE tunnel;
f(1')..f(n'):a series of interfaces to create a simple tunnel;
f(m):bind type a fw(antivirus) component to a tunnel;
f(m'): bind type b fw(antivirus) component to a tunnel;

context in a specific SP
c(1)price for tunnel:100$/GB*day for connectivity with share bandwidth; 1000$/GB for bandwidth guarantee;
c(2)price for fw:500$ for type a, 1000$ for type b

ender user input is: 
pure intent type:  get an antivirus connection between A and B;
impure intent type: get an antivirus connection between A and B and cost less than 1000$/day for 5GB;
impure intent type: get an antivirus connection between A and B and configure f(m);
non intent(prescriptive)type: f(1)..f(n),f(m).

Yinben

-----邮件原件-----
发件人: Sumandra Majee [mailto:S.Majee@F5.com] 
发送时间: 2015年6月6日 5:46
收件人: Xiayinben; Bert Wijnen (IETF); Susan Hares; Zhoutianran; 'Natale, Bob'; zhangyali (D); 'PEDRO ANDRES ARANDA GUTIERREZ'; nfvrg@irtf.org
抄送: draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org
主题: Re: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent

While I think I get this picture I can not map to a use case using the picture. There are commercial products that uses various form of RBAC.

Can you provide couple of concrete examples


Regards.

Sumandra

On 6/5/15, 8:14 AM, "Xiayinben" <xiayinben@huawei.com> wrote:

>Please let me draw my thought.
>Here is current system which provide some functional 
>interfaces{f(1),f(2)...f(n)} for its support operation.
>
>	        f(1)   f(2)   ...    f(n)
>		    ^     ^     ^     ^
>		    |     |     |     |
>		|----------------------------------------|
>		| current system operation  |
>		|----------------------------------------|
>
>A user's role decides that what they really cared are some 
>result{r(1),r(2)...r(m)}.
>
>		|-------------------------------------|
>		| Role really cared result  |
>		|-------------------------------------|
>          |     |     |     |
>	      v     v     v     v
>         r(1)   r(2)   ...   r(m)
>
>There are some knowledge: r(x) can be achieved by a list of
>f(a),f(b)..,f(t) in some context c(j),c(k),...,c(l). Maybe some users 
>have this knowledge and sometimes care a part of them. But no one wants 
>to give whole list.
>Whole picture like this,
>
>		|-------------------------------------|
>		| Role really cared result  |
>		|-------------------------------------|
>          |     |     |     |
>	      v     v     v     v
>         r(1)   r(2)   ...   r(m)
>									|-------------------|
>      O				           c(1)<--|           |
>    - - + - -				        	|  context   |
>      +      				   c(2)<--|           |
>	 /  \							|           |
>					  		   c(p)<--|           |
>									|--------------------|
>	     f(1)   f(2)   ...    f(n)
>	     ^     ^     ^     ^
>		 |     |     |     |
>	   |----------------------------------------|
>	   | current system operation  |
>	   |----------------------------------------|
>
>Pure intent is r(x) only;
>Impure intent is r(x)+c(y)+f(z).  f(z) is part of list of 
>f(a),f(b)..,f(t) Non intent is list of f(a),f(b)..,f(t).  This is prescriptive way.
>
>Yinben
>
>-----邮件原件-----
>发件人: Ibnemo [mailto:ibnemo-bounces@ietf.org] 代表 Bert Wijnen (IETF)
>发送时间: 2015年6月5日 2:56
>收件人: Susan Hares; Zhoutianran; 'Natale, Bob'; zhangyali (D); 'PEDRO 
>ANDRES ARANDA GUTIERREZ'; nfvrg@irtf.org
>抄送: draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org
>主题: Re: [Ibnemo] Defining a Common Model for intent
>
>It may be jsut me, but adding "pure" intent and "impure" intent and 
>jetstreams etc, it does just become more vague for me.
>
>See also inline
>
>On 04/06/15 20:41, Susan Hares wrote:
>>
>> Tianran/ Terrence:
>>
>> Instinctively, I believe that role-based intent provides an ability 
>>to  define and classify intent.  I know how to identify the role  
>>relationships, and the actions between roles.  However, I still do not 
>>really understand classify the relationship between intent and roles.
>>
>> My concern is that we are looking at general system theory where 
>>certain things are first order changes and other things are
>> second-order changes.   A first order change is like the wind blowing.
>>A second order change is when the upper atmosphere jet  stream changes 
>>causing a whole shift in weather patterns.
>>
>> If we classify intent by roles, will we find that roles are the “jet  
>>stream” that pushes a lot of intent.  Or will we find some “pure”
>>intent classes are the jet stream that pushes a lot of intent or “jet 
>>stream” ?
>>
>I cannot make heads or tails from that sentence. Again, it may be just me.
>
>Bert
>>
>> Best wishes,
>>
>> Sue
>>
>> *From:*Zhoutianran [mailto:zhoutianran@huawei.com]
>> *Sent:* Thursday, June 04, 2015 2:36 AM
>> *To:* Natale, Bob; Susan Hares; zhangyali (D); 'PEDRO ANDRES ARANDA 
>> GUTIERREZ'; nfvrg@irtf.org
>> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org
>> *Subject:* RE: [Ibnemo] Defining a Common Model for intent
>>
>> Hi Bob and Sue,
>>
>> The role based intent gives the methodology to define and classify  
>>intent. I think both Bob and me realize the identifying roles is 
>>important. And yes, it’s on the top.
>>
>> Of course, intent need to be implemented. We can do this compilation  
>>layer by layer, i.e., like policy continuum, from goal to fitness to  
>>ECA to …. By the way, it seems in policy continuum, everything is 
>>policy, and an intent can be compiled by policies all the way to 
>>device instructions. Please correct me if it is not.
>>
>> My idea is:
>>
>> On one hand, I would like a flat intent expression with many ways for 
>>both pure intent and the constrained intent.
>>
>> On the other hand, I think the intent can be implemented by many  
>>existing layered functions like the figure I showed. And a cross layer 
>>design will make the intent implementation more flexible.
>>
>> I am not going to create concepts but an operational solution. I 
>>think  policy continuum is an option for intent implementation, but 
>>it’s not mandatory cannot escape.
>>
>> Best Regards,
>>
>> Terence
>>
>> *From:*Natale, Bob [mailto:RNATALE@mitre.org]
>> *Sent:* Wednesday, June 03, 2015 10:45 PM
>> *To:* Zhoutianran; Susan Hares; zhangyali (D); 'PEDRO ANDRES ARANDA 
>> GUTIERREZ'; nfvrg@irtf.org <mailto:nfvrg@irtf.org>
>> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org
>> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org 
>> <mailto:ibnemo@ietf.org>
>> *Subject:* RE: [Ibnemo] Defining a Common Model for intent
>>
>> Hi Terence,
>>
>> As Bert has noted on a related thread today, it is sensible to focus 
>>on intent expression at the “top” layer first.
>>
>> However, work on that should be cognizant of two things:
>>
>> - Who/what are the intended consumers of such expressions?
>>
>> - What is the “distance” from the top level intent expressions to 
>>executable actions that affect network behavior?
>>
>> Those two things are interrelated and captured in the policy 
>>continuum  concept and construct … you can conceptualize them 
>>differently,  resulting in different constructs, and that is fine … 
>>but you cannot escape them. Any attempt to escape them will result, at 
>>best, in a beautiful language that will never be spoken in an operational context.
>>
>> Avanti,
>>
>> BobN
>>
>> *From:*Ibnemo [mailto:ibnemo-bounces@ietf.org] *On Behalf Of 
>> *Zhoutianran
>> *Sent:* Wednesday, June 03, 2015 5:19 AM
>> *To:* Natale, Bob; Susan Hares; zhangyali (D); 'PEDRO ANDRES ARANDA 
>> GUTIERREZ'; nfvrg@irtf.org <mailto:nfvrg@irtf.org>
>> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org
>> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org 
>> <mailto:ibnemo@ietf.org>
>> *Subject:* Re: [Ibnemo] Defining a Common Model for intent
>>
>> Hi Bob,
>>
>> I agree with you that the intent expression is the first important 
>>step. And that’s what we are going to do.
>>
>> I think in this discussion group we will focus on the top layer  
>>intent. As I posted in the email on the “role based intent”, there  
>>will be only one intent layer and I do not think the “policy continuum”
>>works or necessarily applied here. In contrast I would like a flat 
>>intent expression with many ways for both pure intent and the 
>>constrained intent.
>>
>> Regards,
>>
>> Terence
>>
>> *From:*Ibnemo [mailto:ibnemo-bounces@ietf.org] *On Behalf Of *Natale, 
>> Bob
>> *Sent:* Wednesday, June 03, 2015 1:15 PM
>> *To:* Susan Hares; zhangyali (D); 'PEDRO ANDRES ARANDA GUTIERREZ'; 
>> nfvrg@irtf.org <mailto:nfvrg@irtf.org>
>> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org
>> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org 
>> <mailto:ibnemo@ietf.org>
>> *Subject:* Re: [Ibnemo] RE: Defining a Common Model for intent
>>
>> Hi Sue,
>>
>> Yes, the Formal Model paper is a very good source, but should be 
>>augmented with a few others for a more complete understanding.
>>
>> And it is very important to note that the policy continuum is not  
>>_/my/_ model … it is (to the best of my knowledge) John Strassner’s  
>>creation and I generally recommend Chap. 9, Examples of Using the 
>>Policy Continuum, in his book on /Policy-Based Network Management:
>>Solutions for the Next Generation/ (2004) as an essential source.
>>
>> [Apologies for possibly rambling a bit in what follows … I am not an 
>> active contributor and I hate to take up the time of those who are 
>> just because I have a few minutes to post, but since Sue asked….]
>>
>> I would note that the specific layer labels used in the policy  
>>continuum literature should not be considered absolute … i.e., other  
>>formulations (with more or (ideally) fewer layers) are possible, with 
>>different labels, denoting (e.g.) some domain-, marketplace-, or 
>>business model-specificity.
>>
>> The key issue is the number and nature of the translations necessary  
>>from a statement of intent at the “top” layer to a set of actions at  
>>the “bottom” layer that serve to realize the intent. In John’s policy  
>>continuum the top layer is the “Business” layer and we might see  
>>policy expressions like “Optimize traffic flows for fairness to all  
>>active users” or “Optimize traffic flows for priority based on user  
>>account type” (e.g., the proverbial Platinum, Gold, Silver, Bronze  
>>casting). Those are deliberately stark examples … in reality, the 
>>Business layer promulgates enormous numbers of policies often 
>>overlapping and “frictional” … but take either stark example and 
>>consider how many translations it would take to result in a conforming 
>>set of actions in large-scale network of diverse devices, services, 
>>protocols, (and a very large)  etc. In current technology (and for the 
>>foreseeable future, at my age at least!) at some point such statements 
>>of intent from the Business layer have to get translated to E-C-A type 
>>rules.
>>
>> I recognize an intent-based policy expression by its distance from a  
>>set of expression (usually “rules”) that execute actions that realize  
>>the outcome stated in the intent-based expression. In that view, it’s  
>>not an absolute (i.e., the diverse views of the Policy Continuum hold)  
>>and it’s also possible to envision cases where expressions of intent 
>>can be “directly” implemented by a resource or set of resources. SDN 
>>is a step in the direction of (1) reducing the number of translations 
>>necessary for a large class of intent-based policy expressions and (2) 
>>virtualizing the implementation actions from the perspective of the 
>>“upper”
>> layers of the policy continuum (or continua).
>>
>> So, SDN and the ecosystem of changes around it represent  a big  
>>opportunity to make progress on rationalizing policy management across 
>>the layers of the policy continuum. A necessary first step is having 
>>useful standards for policy-expressions from the “top”
>> layer – and they typically talk in intent-based policy expressions 
>>there.
>>
>> Btw, I presume that IBNemo* contributors are also following John’s  
>>work in the SUPA area as well … very important that these efforts are 
>>totally complementary and synergistic, IMHO.
>>
>> [* - Is it “IBNemo”, “ibnemo”, “IB-nemo” or something else? … I see 
>> it written all of those ways, and possibly more....]
>>
>> Avanti,
>>
>> BobN
>>
>> *From:*Susan Hares [mailto:shares@ndzh.com]
>> *Sent:* Tuesday, June 02, 2015 6:26 PM
>> *To:* Natale, Bob; 'zhangyali (D)'; 'PEDRO ANDRES ARANDA GUTIERREZ'; 
>> nfvrg@irtf.org <mailto:nfvrg@irtf.org>
>> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org
>> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org 
>> <mailto:ibnemo@ietf.org>
>> *Subject:* RE: [Ibnemo] RE: Defining a Common Model for intent
>>
>> Bob:
>>
>> Thank you for The Policy Continuum – A Formal Model (Steven Davy ,  
>>Brendan Jennings and John Strassner). Is this the one you stated we 
>>should read?
>>
>> http://www.tssg.org/files/archives/2007_MACE_SDavy_Jennings_final.pdf
>>
>> Davy, Jenning and Strassner.  In this continuum it suggests there are  
>>descending levels at: business, system (device and technology  
>>independent), administrator (device independent, technology 
>>dependent), device (device and technology specific), and instance 
>>(specific MIB, PIB, and CLI).  The system level is what Yali and 
>>Yinben have talked about when they speak about a  connection from 
>>London to Beijing.  The administrator is a level of an
>>L3VPN network with many devices.   I have suggested a few
>> more layers that related in a gap analysis for I2NSF.  These layer 
>>match what the IETF is doing in the yang modules.
>>
>> +--------------------------------------------+
>>
>> |Application Network Wide: Intent            |
>>
>> +--------------------------------------------+
>>
>> |Network-wide level: L3SM L3VPN service model|
>>
>> +--------------------------------------------+
>>
>> |Device level: Protocol Independent: I2RS    |
>>
>> | RIB, Topology, Filter-Based RIB            |
>>
>> +--------------------------------------------+
>>
>> |Device Level: Protocol Yang modules         |
>>
>> | (ISIS, OSPF, BGP, EVPN, L2VPN, L3VPN, etc.)|
>>
>> +--------------------------------------------+
>>
>> | Device level: IP and System: NETMOD Models |
>>
>> | (config and oper-state), tunnels           |
>>
>> +--------------------------------------------+
>>
>> Did I understand your policy continuum?
>>
>> The policy continuum paper states three axioms:
>>
>> “1) A policy may exist at any level of the continuum without the 
>> requirement of being associated to policies at other continuum levels.
>>
>> 2) A policy may reference a set of lower level policies.
>>
>> 3) A policy may be associated to more than one higher level policy”
>>
>> Can you explain your comment:
>>
>> “the “need” for multiple intermediate E-C-A translations at multiple  
>>layers of the policy continuum has heretofore been a major impediment 
>>to progress on policy-based management, IMHO.”
>>
>> Does this come out of the formal language in the paper?
>>
>> Sue
>>
>> *From:*Natale, Bob [mailto:RNATALE@mitre.org]
>> *Sent:* Tuesday, June 02, 2015 1:25 AM
>> *To:* zhangyali (D); PEDRO ANDRES ARANDA GUTIERREZ; Susan Hares; 
>> nfvrg@irtf.org <mailto:nfvrg@irtf.org>
>> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org
>> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org 
>> <mailto:ibnemo@ietf.org>
>> *Subject:* RE: [Ibnemo]RE: Defining a Common Model for intent
>>
>> With all due respect:
>>
>> 1. I would recommend that anyone working on this topic, if he/she has 
>>not done so already, understand the “policy continuum”
>> construct … a web search for ‘"policy continuum" Strassner’ will  
>>identify a good set of sources to start from for the network 
>>management domain.
>>
>> 2. Intents are statements of objectives or goals … they tend  to  
>>originate at the “higher” levels of the policy continuum … at some  
>>point (at “lower” layers of the policy continuum) they are translated 
>>to E-C-A type rules (more deterministic than intents)  for execution … 
>>much normally happens in between.
>>
>> 3. Designing solutions that minimize the number of translations  
>>between the statement of intent and the execution rules is essential ..
>>and _/possibly/_ enabled by contemporary technologies via which “higher”
>>layer intents can be translated to “lower”
>> layer intents before hitting the ultimate E-C-A execution layer. This 
>>is a highly speculative statement on my part. But the “need”
>> for multiple intermediate E-C-A translations at multiple layers of 
>>the  policy continuum has heretofore been a major impediment to 
>>progress on policy-based management, IMHO.
>>
>> The “with all due respect” aspect refers to the fact that the work  
>>that the active contributors to this thread are doing is very positive 
>>even if none of my comments are acted upon.
>>
>> Avanti,
>>
>> BobN
>>
>> *From:*Ibnemo [mailto:ibnemo-bounces@ietf.org] *On Behalf Of 
>> *zhangyali (D)
>> *Sent:* Monday, June 01, 2015 11:52 PM
>> *To:* PEDRO ANDRES ARANDA GUTIERREZ; Susan Hares; nfvrg@irtf.org 
>> <mailto:nfvrg@irtf.org>
>> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org
>> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org 
>> <mailto:ibnemo@ietf.org>
>> *Subject:* [Ibnemo] 答复: Defining a Common Model for intent
>>
>> Hi Pedro,
>>
>> Thanks for reviewing the draft and giving modification.
>>
>> The question you have mentioned is a very important point for the  
>>abstraction of intent model. Maybe we can propose the transport market 
>>as a analogy.
>>
>> 1.A customer wants to transport his goods from A to B. So his intent  
>>is getting his goods from A to B without carrying about how to do it.
>>Then his intent is transferred to the transportation system.
>>
>> 2.This system analyzes customer’s requirement, and choose a suitable  
>>way to complete the requirement. For example, the system choose truck 
>>as the means. So the intent of transportation system is transferring 
>>the goods with truck.
>>
>> 3.The driver of this truck analyze the path from A to B, and choose a  
>>most appropriate path to complete this order which will save more  
>>time. So  the intent of driver may be transferring the goods with the 
>>least time. Then the driver will start the engine, step on the gas, etc.
>>
>> From this analogy, the ultimate effect is the same, namely, transfer  
>>the goods from A to B. But the specific intent of different roles has  
>>some differences which depends on user’ role, knowledge, 
>>responsibility, etc. For example, transportation system is responsible 
>>for transporting goods, and he know the various ways. So he can form 
>>his intent by rendering the upper customer’s intent.
>>
>> Supposing we divide users into different layers according to the  
>>implementation series, users in upper layer expresses his intent as  
>>/what/ he want without having the knowledge about /how/ to do it. Then  
>>the /how/ procedure will be transferred to /what /in the lower layer 
>>according to knowledge and context. These transfer procedure lead to 
>>the completion of requirement. Same with the example in draft. 
>>Although the ultimate effect is same, the focus is different which 
>>will bring out the differentiation of intent.
>>
>> This is just my immature opinion about intent. Do you think the  
>>differentiation of intent to complete the same thing is important and 
>>reasonable?
>>
>> Best Regards,
>>
>> Yali
>>
>> *发件人**:*PEDRO ANDRES ARANDA GUTIERREZ 
>> [mailto:pedroa.aranda@telefonica.com]
>> *发送时间:* 2015年6月1日 17:15
>> *收件人:* Susan Hares; nfvrg@irtf.org <mailto:nfvrg@irtf.org>
>> *抄送:* draft-xia-ibnemo-icim@tools.ietf.org
>> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org 
>> <mailto:ibnemo@ietf.org>
>> *主题:* Re: [Ibnemo] Defining a Common Model for intent
>>
>> Hi,
>>
>> A small clarification proposal for draft 
>>https://datatracker.ietf.org/doc/draft-xia-ibnemo-icim/.
>>
>> In section 2.4, I would leave the following as a paragraph
>>
>> For example, in the network area the intent of end-users could be 
>> safe connectivity between two sites which a technology independent 
>> and device independent requirement. For business-based network 
>> designers, the network connectivity can be selected which is device- 
>> independent but technology specific. An example of the business-based 
>> technology is the L3VPN.
>> And change:
>> For network administrators, intent can be specific operations on a 
>> set of devices such as configuring IP addresses on network servers in 
>> a data center.
>>
>> To
>>
>> For network administrators, intent can be <new>defining a network 
>>topology like a router connected to a firewall, connected to a load 
>>balancer and this to two L2 networks where WWW servers sit or 
>>specifying the</new> operations on a set of devices such as 
>>configuring IP addresses on network servers in a data center.
>>   
>> Rationale behind this is again, that intent should be anything that 
>>is invariant and that expresses/what/  a network 
>>operator/administrator may need to do, as opposed to/how/  he would do 
>>that, i.e. The router is a HW device from vendor X or a virtual 
>>machine running a specific routing daemon over a given data-path implementation.
>> Best, /PA
>>
>> ---
>>
>> Dr. Pedro A. Aranda Gutiérrez
>>
>> Technology Exploration -
>>
>> Network Innovation & Virtualisation
>>
>> email: pedroa d0t aranda At telefonica d0t com
>>
>> Telefónica, Investigación y Desarrollo
>>
>> C/ D. Ramón de la Cruz,84
>>
>> 28006 Madrid, Spain
>>
>> Fragen sind nicht da, um beantwortet zu werden.
>>
>> Fragen sind da, um gestellt zu werden.
>>
>> Georg Kreisler
>>
>> ---------------------------------------------------------------------
>> -
>> --------------------------------------------------------------
>>
>>
>> Este mensaje y sus adjuntos se dirigen exclusivamente a su  
>>destinatario, puede contener información privilegiada o confidencial y  
>>es para uso exclusivo de la persona o entidad de destino. Si no es  
>>usted. el destinatario indicado, queda notificado de que la lectura, 
>>utilización, divulgación y/o copia sin autorización puede estar 
>>prohibida en virtud de la legislación vigente. Si ha recibido este 
>>mensaje por error, le rogamos que nos lo comunique inmediatamente por 
>>esta misma vía y proceda a su destrucción.
>>
>> The information contained in this transmission is privileged and  
>>confidential information intended only for the use of the individual  
>>or entity named above. If the reader of this message is not the  
>>intended recipient, you are hereby notified that any dissemination, 
>>distribution or copying of this communication is strictly prohibited. 
>>If you have received this transmission in error, do not read it. 
>>Please immediately reply to the sender that you have received this 
>>communication in error and then delete it.
>>
>> Esta mensagem e seus anexos se dirigem exclusivamente ao seu 
>> destinatário, pode conter informação privilegiada ou confidencial e é 
>> para uso exclusivo da pessoa ou entidade de destino. Se não é vossa 
>> senhoria o destinatário indicado, fica notificado de que a leitura, 
>> utilização, divulgação e/ou cópia sem autorização pode estar proibida 
>> em virtude da legislação vigente. Se recebeu esta mensagem por erro, 
>> rogamos-lhe que nos o comunique imediatamente por esta mesma via e 
>> proceda a sua destruição
>>
>>
>>
>> _______________________________________________
>> Ibnemo mailing list
>> Ibnemo@ietf.org
>> https://www.ietf.org/mailman/listinfo/ibnemo
>
>_______________________________________________
>Ibnemo mailing list
>Ibnemo@ietf.org
>https://www.ietf.org/mailman/listinfo/ibnemo
>_______________________________________________
>Nfvrg mailing list
>Nfvrg@irtf.org
>https://www.irtf.org/mailman/listinfo/nfvrg