Re: [Ibnemo] role based intent

"Susan Hares" <shares@ndzh.com> Thu, 04 June 2015 02:13 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: ibnemo@ietfa.amsl.com
Delivered-To: ibnemo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 05F441B31A6 for <ibnemo@ietfa.amsl.com>; Wed, 3 Jun 2015 19:13:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.889
X-Spam-Level:
X-Spam-Status: No, score=-101.889 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, T_DOS_OUTLOOK_TO_MX_IMAGE=0.01, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1j1kADMSutXP for <ibnemo@ietfa.amsl.com>; Wed, 3 Jun 2015 19:13:07 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) by ietfa.amsl.com (Postfix) with ESMTP id F33BA1B31A4 for <ibnemo@ietf.org>; Wed, 3 Jun 2015 19:13:06 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=184.157.80.157;
From: "Susan Hares" <shares@ndzh.com>
To: "'Zhoutianran'" <zhoutianran@huawei.com>, "'Dave Hood'" <dave.hood@ericsson.com>, "'STUART VENTERS'" <stuart.venters@adtran.com>, "'Natale, Bob'" <RNATALE@mitre.org>
References: <BBA82579FD347748BEADC4C445EA0F2166BBFAC2@nkgeml512-mbx.china.huawei.com>
In-Reply-To: <BBA82579FD347748BEADC4C445EA0F2166BBFAC2@nkgeml512-mbx.china.huawei.com>
Date: Wed, 3 Jun 2015 22:12:42 -0400
Message-ID: <006301d09e6b$f1041410$d30c3c30$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/related; boundary="----=_NextPart_000_0064_01D09E4A.69F3FAB0"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQK4lThatEBSexjSTWCPbfPbfl8B25vLrDfA
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/ibnemo/Z-akoqQsGlSlFkXWdEUCjrKxuLg>
Cc: sdn@irtf.org, ibnemo@ietf.org
Subject: Re: [Ibnemo] role based intent
X-BeenThere: ibnemo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of Nemo, an intent-based North Bound \(NB\) interface consisting of an application protocol running over HTTP \(RESTful interfaces\) to exchange intent-based primitives between applications and meta-controllers controlling virtual network resources \(networks, storage, CPU\)." <ibnemo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ibnemo/>
List-Help: <mailto:ibnemo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Jun 2015 02:13:10 -0000

Tiaran/Terence: 

 

Very interesting concept.  It is the grouping of roles that make the intent
layer.  We look to this grouping the top of very specific acyclic graphs of
lower layer functions.  This emergence of the intent out of the essence of
being is a new thought.  Your theoretical examples are very interesting -
but can you give me an example. 

 

In another two field (organizational dynamics and general systems theory),
you are talking about groupings of functions emerging as systems.   Does
this  formal language John Strassner was suggesting something like this
idea? 

 

This is really insightful concept.  Can you give me  an example? 

 

Sue 

 

From: Ibnemo [mailto:ibnemo-bounces@ietf.org] On Behalf Of Zhoutianran
Sent: Wednesday, June 03, 2015 2:30 AM
To: Dave Hood; STUART VENTERS; Natale, Bob
Cc: sdn@irtf.org; ibnemo@ietf.org
Subject: [Ibnemo] role based intent

 

Hi Dave, Stuart, Bob and all,

 

I found many problems raised in the mailing list are coursed by the layered
intent thinking. Maybe we are tainted by the ISO model:-)

 

For the layered intent, intent is a spectrum, very abstract at the top
layer, more network specific and less abstract when the layer goes down. The
problem is that the boundary of intent and non intent is vague. Or there is
no boundary between this two, since one's what may be another one's how. And
consequently, it looks like everything is intent and no clear intent
definition.

 

The role based intent will provide only one intent layer. That is always the
top layer abstraction for each role, as shown in the following figure. The
functions can be layered as the implementation of the intent layer.



With the role based intent, although the end user's intent is much
abstracted then the network administrator's intent, they are not related
each other. I.e., the end user will not use the administrator's intent. And
the admin will not provide additional services/interfaces to the end user.

 

The essential of layering is that the lower layer will provide interface to
the higher layer. In order to fit up layer requirements, the lower layer
will provide adequate interfaces/capabilities. That also means too much
information for a dedicated up layer user/app.

 

For role based intent, we can firstly indentify various roles (no need to be
complete, but those with attention), and then figure out the intent of each
role. In this way, intent can be clear defined. That will also keep the
intent of each role to a small set on what they really cares about, without
expending to support other one's intent.

 

 

Best Regards,

Terence