Re: [Ibnemo] some clarification questions about IBnemo
"Natale, Bob" <RNATALE@mitre.org> Wed, 11 February 2015 03:31 UTC
Return-Path: <RNATALE@mitre.org>
X-Original-To: ibnemo@ietfa.amsl.com
Delivered-To: ibnemo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 48D001A001A
for <ibnemo@ietfa.amsl.com>; Tue, 10 Feb 2015 19:31:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, T_RP_MATCHES_RCVD=-0.01]
autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id tCJKWTnjZJXM for <ibnemo@ietfa.amsl.com>;
Tue, 10 Feb 2015 19:31:31 -0800 (PST)
Received: from smtpvbsrv1.mitre.org (smtpvbsrv1.mitre.org [198.49.146.234])
by ietfa.amsl.com (Postfix) with ESMTP id A2FDA1A00F5
for <ibnemo@ietf.org>; Tue, 10 Feb 2015 19:31:31 -0800 (PST)
Received: from smtpvbsrv1.mitre.org (localhost.localdomain [127.0.0.1])
by localhost (Postfix) with SMTP id CB74AB2E0CB;
Tue, 10 Feb 2015 22:31:30 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78])
by smtpvbsrv1.mitre.org (Postfix) with ESMTP id BE466B2E0B3;
Tue, 10 Feb 2015 22:31:30 -0500 (EST)
Received: from IMCMBX01.MITRE.ORG ([169.254.1.185]) by IMCCAS01.MITRE.ORG
([129.83.29.68]) with mapi id 14.03.0224.002; Tue, 10 Feb 2015 22:31:31 -0500
From: "Natale, Bob" <RNATALE@mitre.org>
To: Susan Hares <shares@ndzh.com>
Thread-Topic: [Ibnemo] some clarification questions about IBnemo
Thread-Index: AdBBJot8KCIWKNkkRKWxBg/YA63rTABXauIAAKNJ9UAAKDPoAAAB25Gg
Date: Wed, 11 Feb 2015 03:31:29 +0000
Message-ID: <A65E21691881E64DBF058A66E53068ED4C8B1185@IMCMBX01.MITRE.ORG>
References: <C5034E44CD620A44971BAAEB372655DC014D808F@lhreml502-mbs.china.huawei.com>
<02d401d04284$381d6070$a8582150$@ndzh.com>
<C5034E44CD620A44971BAAEB372655DC014D8E1D@lhreml502-mbs.china.huawei.com>
<041d01d04588$476207a0$d62616e0$@ndzh.com>
In-Reply-To: <041d01d04588$476207a0$d62616e0$@ndzh.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.140.19.249]
Content-Type: multipart/alternative;
boundary="_000_A65E21691881E64DBF058A66E53068ED4C8B1185IMCMBX01MITREOR_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/ibnemo/_QInYDFVXedIdwqapi9QBW9O6io>
Cc: "ibnemo@ietf.org" <ibnemo@ietf.org>
Subject: Re: [Ibnemo] some clarification questions about IBnemo
X-BeenThere: ibnemo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of Nemo,
an intent-based North Bound \(NB\) interface consisting of an
application protocol running over HTTP \(RESTful interfaces\) to exchange
intent-based primitives between applications and meta-controllers controlling
virtual network resources \(networks, storage, CPU\)." <ibnemo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ibnemo>,
<mailto:ibnemo-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ibnemo/>
List-Help: <mailto:ibnemo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ibnemo>,
<mailto:ibnemo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Feb 2015 03:31:38 -0000
Hi Sue, Wrt "Would it be helpful, if I describe a potential security DSL?" ... yes (for me, at least) ... I would appreciate seeing what it might look like ... outline of possible fit with SUPA and I2NSF would be helpful too ... expectation only high-level and rough draft at this stage, of course. Avanti, BobN From: Ibnemo [mailto:ibnemo-bounces@ietf.org] On Behalf Of Susan Hares Sent: Tuesday, February 10, 2015 6:21 PM To: 'Georgios Karagiannis' Cc: ibnemo@ietf.org Subject: Re: [Ibnemo] some clarification questions about IBnemo Georgios: Nemo is a high level DSL North Bound Interface (NBI) for applications can use to talk to controller at the network layer. Application || Nemo DSL ---------- Controller (with Nemo Engine with nemo model) || || (SBI) || netconf (I2RS/config) Yang Is a descriptive rather than an intent based interface. It is extremely words and will change a functions change in the network. Nemo as a DSL will provide functions the user application wants. Yang modules will be 10,000s different items in at least 100+ module. Nemo 15 primitives with options. Would it be helpful, if I describe a potential security DSL? Sue From: Georgios Karagiannis [mailto:georgios.karagiannis@huawei.com] Sent: Tuesday, February 10, 2015 4:15 AM To: Susan Hares Cc: ibnemo@ietf.org<mailto:ibnemo@ietf.org> Subject: RE: [Ibnemo] some clarification questions about IBnemo Hi Sue, Thank you very much for the answers. Regarding the listed work items: c) Standardize Intent-Based Nemo DSL (domain-specific language) for virtual networks. IB-Nemo runs over a RESTful (http) interface. d) Standardize Intent-Based Nemo DSL for Security devices e) Standardize Intent-Based Nemo DSL for compute devices. What are the main differences between Intent-Based Nemo domain-specific language and YANG? By focusing on these three areas, the scope of the WG might be quite large. If it is to focus only on one of these three work items, which one of them will you choose? Best regards, Georgios From: Susan Hares [mailto:shares@ndzh.com] Sent: Saturday, February 07, 2015 4:15 AM To: Georgios Karagiannis Cc: ibnemo@ietf.org<mailto:ibnemo@ietf.org> Subject: RE: [Ibnemo] some clarification questions about IBnemo Gergios: Thank you for these great questions. 1) What is the motivation of starting this working group? The motivation for starting this group comes out three things: a) desire to maximum usage of Network devices, b) Intent-Based theory and c) an 80/20 rule of interfaces. Desire to maximum network devices: Today's networks connect data centers to mobile users. The Data Centers operate to maximize the use of server's compute cycle, storage devices, and networks. A research study (2011-2012) examined how to maximize usage of compute, storage, and networks using theoretical models. This study showed that if you optimize for any one facet (compute, storage, network) you obtain 66% utilization of all facets. However, if the applications can communicate and negotiate their intent for compute, storage, or network - the theoretical utilization can reach 95% or higher. The potential higher utilization combined with the lowering of costs due to with the virtualization of network devices creates an economic environment that radically changes the cost dynamics of IT technology. Intent-Based Networks The signaling of the network changes via applications that direct SDN-based networks via descriptive commands requires a large data flow between applications and networks. The application does not really want or need the full description of the networks. For example, a database application simply needs to signal that it needs to connect to two other database locations and exchange data with some maximum flow rate. Intent-based network signal this minimum required information, and let the network set-up the rest. 80/20 rules of applications Some SDN orchestrators are "god-boxes" that need to know and direct everything. However, most applications really need only to signal intent. The network engineers designing SDN orchestrators are 20% or less of the total applications. The other 80% of applications use the 20% of total commands that request the high-level requests. Intent based Domain Specific languages (E.g. focused on network) allow simple commands to be exchanged between the application and the SDN controller across a RESTful interface (http protocol). This simpler interface for applications can enable a large class of new applications to utilize the SDN controller. 2) Are there use cases defined that are motivating this work? The use case motivating this work: a) Simple interfaces for a new class of monitoring and manage applications for the new NFV controllers controlling Carrier access networks or Cable networks, b) Simple interfaces for the network-based application store that can load query or load things on mobile networks, c) Large Database applications desiring to signal the network to set-up a Virtual network to link database sites. The set-up/tear down of this network is controlled by the Application. d) Security devices seeking a short-term set-up of application layer connection to exchange data. 3) What are the work items? a) Problem statement and use cases document b) Intent Framework Description for Networks, Security, Storage, Compute c) Standardize Intent-Based Nemo DSL (domain-specific language) for virtual networks. IB-Nemo runs over a RESTful (http) interface. d) Standardize Intent-Based Nemo DSL for Security devices e) Standardize Intent-Based Nemo DSL for compute devices. 4) Is the main goal of the WG to standardize a new protocol, or to extend an existing one? The main goal is to standardize a series of Domain-Specific languages which run over RESTful interface (http). 5) What is the relation of IBnemo with existing IETF WGs? NBI SDN SBI IB-Nemo (application) ---- controller --- I2rs, netconf/netmod, SACM NBI - north bound interface SBI - south bound interface Application protocols work such as CoApp (CORE) produce http constrained to small environment as a specialized application protocol. However, these protocols are not focused on enabling an Intent-Based application protocols that will utilize NFV architectures. Before I launch into more details, please let me know if you have questions. Sue Hares -----Original Message----- From: Ibnemo [mailto:ibnemo-bounces@ietf.org] On Behalf Of Georgios Karagiannis Sent: Thursday, February 05, 2015 4:32 AM To: Susan Hares Cc: ibnemo@ietf.org<mailto:ibnemo@ietf.org> Subject: [Ibnemo] some clarification questions about IBnemo Hi Sue, Hi all, In a previous email it is mentioned that: "The Nemo-project group seeks to create a simple Intent-Based inter-operable application protocol that forms a simple NorthBound API (NB) for applications on any platform to control the following : a) setup and take down of virtual networks between virtual nodes, b) control transfer of data toward storage, and c) handle compute devices with a the minimal set of intent-based primitives." Can you please provide some clarifications on the following points? o) What is the motivation of starting this working group? Are there use cases defined that are motivating this work? o) What are the work items? Is the main goal of the WG to standardize a new protocol, or to extend an existing one? o) What is the relation of IBnemo with existing IETF WGs? Best regards, Georgios _______________________________________________ Ibnemo mailing list Ibnemo@ietf.org<mailto:Ibnemo@ietf.org> https://www.ietf.org/mailman/listinfo/ibnemo
- Re: [Ibnemo] some clarification questions about I… Susan Hares
- [Ibnemo] some clarification questions about IBnemo Georgios Karagiannis
- Re: [Ibnemo] some clarification questions about I… Georgios Karagiannis
- Re: [Ibnemo] some clarification questions about I… Zhoutianran
- Re: [Ibnemo] some clarification questions about I… Georgios Karagiannis
- Re: [Ibnemo] some clarification questions about I… Susan Hares
- Re: [Ibnemo] some clarification questions about I… Susan Hares
- Re: [Ibnemo] some clarification questions about I… Zhoutianran
- Re: [Ibnemo] some clarification questions about I… Natale, Bob