Re: [Ibnemo] [Sdn] Defining a Common Model for intent
"Bert Wijnen (IETF)" <bwietf@bwijnen.net> Tue, 23 June 2015 06:38 UTC
Return-Path: <bwietf@bwijnen.net>
X-Original-To: ibnemo@ietfa.amsl.com
Delivered-To: ibnemo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 789191A8908 for <ibnemo@ietfa.amsl.com>; Mon, 22 Jun 2015 23:38:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.201
X-Spam-Level: ***
X-Spam-Status: No, score=3.201 tagged_above=-999 required=5 tests=[BAYES_50=0.8, J_CHICKENPOX_16=0.6, J_CHICKENPOX_24=0.6, J_CHICKENPOX_25=0.6, J_CHICKENPOX_29=0.6, LOTS_OF_MONEY=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P-6zKYVKhKf1 for <ibnemo@ietfa.amsl.com>; Mon, 22 Jun 2015 23:38:50 -0700 (PDT)
Received: from lb1-smtp-cloud2.xs4all.net (lb1-smtp-cloud2.xs4all.net [194.109.24.21]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 374501A8907 for <ibnemo@ietf.org>; Mon, 22 Jun 2015 23:38:49 -0700 (PDT)
Received: from Macintosh-6.fritz.box ([83.163.239.181]) by smtp-cloud2.xs4all.net with ESMTP id jiej1q00C3vXPcr01iekMy; Tue, 23 Jun 2015 08:38:48 +0200
Message-ID: <5588FEF2.2010905@bwijnen.net>
Date: Tue, 23 Jun 2015 08:38:42 +0200
From: "Bert Wijnen (IETF)" <bwietf@bwijnen.net>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.6.0
MIME-Version: 1.0
To: DIEGO LOPEZ GARCIA <diego.r.lopez@telefonica.com>
References: <00f301d09b13$79cc2410$6d646c30$@ndzh.com> <865C20BAAE8BBD4C89E7D6FE694F6B3B2D3CD945@nkgeml505-mbs.china.huawei.com> <013e01d09ef5$190b6e20$4b224a60$@ndzh.com> <865C20BAAE8BBD4C89E7D6FE694F6B3B2D3CDF47@nkgeml505-mbs.china.huawei.com> <021a01d09fb6$e1c51c00$a54f5400$@ndzh.com> <80B0B523-E50E-46F8-9FDC-CC861D2BF96E@telefonica.com> <A747A0713F56294D8FBE33E5C6B8F58129514E55@szxeml513-mbx.china.huawei.com> <1BCA2E06-E15A-46C5-9ED5-7A1042CB3DAE@telefonica.com> <A747A0713F56294D8FBE33E5C6B8F58129515001@szxeml513-mbx.china.huawei.com> <50DE494F-5E08-426A-AAA0-3D9269CC131F@telefonica.com> <A747A0713F56294D8FBE33E5C6B8F581295151A1@szxeml513-mbx.china.huawei.com> <7DA15C94-271A-412E-A4C7-F7F15AABEB1E@telefonica.com> <A747A0713F56294D8FBE33E5C6B8F58129515677@szxeml513-mbx.china.huawei.com> <557FBE42.3020900@bwijnen.net> <F3EEC221-1179-4503-9DE5-D2880FF102D5@telefonica.com> <5580134D.9020003@bwijnen.net> <D5B19D8D-30AB-487A-AB30-5E74E4D16F4C@telefonica.com>
In-Reply-To: <D5B19D8D-30AB-487A-AB30-5E74E4D16F4C@telefonica.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/ibnemo/t8-46c_9vw5-fi8hn1OjXxktpsU>
Cc: "sdn@irtf.org" <sdn@irtf.org>, "zhangyali (D)" <zhangyali369@huawei.com>, Dave Hood <dave.hood@ericsson.com>, Susan Hares <shares@ndzh.com>, "ibnemo@ietf.org" <ibnemo@ietf.org>
Subject: Re: [Ibnemo] [Sdn] Defining a Common Model for intent
X-BeenThere: ibnemo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of Nemo, an intent-based North Bound \(NB\) interface consisting of an application protocol running over HTTP \(RESTful interfaces\) to exchange intent-based primitives between applications and meta-controllers controlling virtual network resources \(networks, storage, CPU\)." <ibnemo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ibnemo/>
List-Help: <mailto:ibnemo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Jun 2015 06:38:57 -0000
Diego, not sure I understand what you are trying to say, but I think my conclusion is that w.r.t. aspects of roles, we agree that - The various roles will have different sets of functions at their disposal - Access to those function is controlled via an RBAC system which takes these roles into account I think we also agree (and did express so in our postings) that the roles should not be hard-coded into the system, and that the we should be able to dynamically define them. I still have concerns about the term "view". I think we agree that each role has its own set of function at its disposal. The exact set of such function would also be better dynamic and not be hard-coded. Are we in sync now? Bert On 22/06/15 09:29, DIEGO LOPEZ GARCIA wrote: > Hi Bert, > > Reviewing my pending e-mail I have noticed I did not reply to this. The discussion has been ongoing and may be I come a little > late to this, but just let me note I was trying to highlight that when talking about roles we were talking about two different > aspects (access control and functional) and that I did not think it was a good idea to predefine them in any case, but to make the > language we used and its underlying formalism support those two aspects. > > If the common use of the term role is essentially associated with access control I agree is wiser to restrict it to that > environment. For the other aspect I'd prefer to use the term "view", but again if there is another term in widest use I'd be happy > to endorse it. But, let me insist, let's define mechanisms for supporting them, and not go and predefine them. > > Be goode, > > On 16 Jun 2015, at 14:15 , Bert Wijnen (IETF) <bwietf@bwijnen.net <mailto:bwietf@bwijnen.net>> wrote: > >> Hi Diego. >> >> So I wonder why we try to define two TYPES of roles. What you call "views" below or what I call "sets of intent expressions" >> are probably the same. They indeed consist of sets of objects and actions which can be used. But I do not call them roles. >> At lest, that triggers something in my brain that gets me confused. >> >> Why would we confuse anyone by using terms like "functional roles" and "access roles". >> >> As I have stated a few times. I think: >> - people or applications act in a certain role (end-user, network architect, operator, trouble shooter) >> - they can use expressions of intent. Based on the role they assume/play, they can use a set >> of (dynamically defined, fine by me, actually best indeed) they have a set of objects that they can >> specify intention for/with. >> - Based on their role they get access (are allowed to) use such objects in their intent expressions. >> The access control for that is (in my view) called or based on an RBAC system/mechanism. >> So if we have objects like "link", "node', "router", "security-mechanism" >> I would think that someone in the end-user role would not be allowed to express intent >> about routers or security mechanism, whereas an operator probably would >> So if a user or program in the end-user role, tries to express intent for a router, >> the access control system would deny that based on the role (so RBAC). >> If someone in an operator role tries to express intent for a router, then the access control >> system would allow that based on the role (again, RBAC). >> >> I think we should use "roles" only for "functions" like end-user, network architect, operator, >> trouble shooter... there may be a few more. Again we would allow to define them dynamically >> so we can add roles if needed easily. I can see that in ICIM we define an abstract class of Role >> from which we derive specific classes like EndUser, Operator, NetworkArchitect. >> I can see that in ICIM we define a class User, which gets a reference to one or more >> specific roles, which then identifies that user to be allowed to play in that role. >> >> If you want to use the word "views" for "sets of intent expressions", then fine. >> I would strongly suggest not to use "functional roles". As you can already see from our discussions >> here, we have a lot of confusion and misunderstanding. How would people new to our ICIM >> understand the differenes. Would they not get confused too quickly? >> >> I am not sure "views" is the best term for it either . >> "set of intent expressions" also is not the ideal term. >> If we could agree on an easy to understand term for that concept, that would be great. >> >> Some thoughts/ideas for that term/concept: >> - IntentElements >> - IntentTargets >> - IntentAttributes >> >> So one would have an IntentElement that is composed of targets and attributes >> I could think of roles having access/no-access to specific targets >> I could think of roles having access/no-access to specific attributes of specific targets >> And since an IntentElement is composed of targets and attributes, that is a set of >> targets and attributes that allows a defined set if "intent-expressions" So one could >> give access maybe at that level of IntentElement, which would mean the role is >> allowed to express intent in terms of wanted attributes (states?) on the set of targets, >> all defined in the IntentElement. >> >> Just thinking aloud to see/hear if we are converting on a common way of thinking about this. >> >> Bert >> >> >> >> On 16/06/15 12:21, DIEGO LOPEZ GARCIA wrote: >>> Hi Bert, >>> >>> I am trying to consistently refer to functional roles as "network views" (in the same way SQL defines views for databases), so >>> we keep the term "role" for identifying the access control applicable to a certain user, very much in the RBAC approach you >>> mention. Let me try to rephrase it again so we can find some common ground on this: >>> >>> 1) Views (functional roles) define how a certain user can express intent, by means of identifying the network objects and >>> operations the user can interact with >>> >>> 2) Roles (access roles) define which of the view objects and actions a user can invoke by applying access control rules on those >>> objects and actions. >>> >>> Be goode, >>> >>> On 16 Jun 2015, at 07:12 , Bert Wijnen (IETF) <bwietf@bwijnen.net <mailto:bwietf@bwijnen.net> <mailto:bwietf@bwijnen.net>> wrote: >>> >>>> Sorry, but I suspect I am getting confused again. >>>> >>>> Roles are roles in my view. And based on your role, you get access to ceratin things >>>> (types of intent expressions you can tell to the system). >>>> The access control to the various "intent expressions" will be based on a role. >>>> And so you have RBAC. Or am I still confused here? >>>> >>>> Bert >>>> >>>> >>>> >>>> On 16/06/15 04:40, zhangyali (D) wrote: >>>>> >>>>> Hi, Diego, >>>>> >>>>> Definitely agree with you. Ore-defining general roles is difficult and unreasonable because of the diversity of systems and >>>>> variability of dividing perspective. However, pre-defining some typical roles that consist with most network system will be >>>>> helpful for us to analyze intent common information model. >>>>> >>>>> As you have explained the difference of functional roles and access roles, I think they are two dimensions of roles, that is, >>>>> access roles defines the scope of functional roles. But I have a doubt is that access roles just define scope of network >>>>> abstraction who would not express intent. In ICIM (Intent Common Information Model), user own one or more roles and express >>>>> intent, so user is the combination of functional roles, do you agree that? >>>>> >>>>> Best, >>>>> >>>>> Yali >>>>> >>>>> *发件人:*DIEGO LOPEZ GARCIA [mailto:diego.r.lopez@telefonica.com] >>>>> *发送时间:*2015年6月14日18:41 >>>>> *收件人:*zhangyali (D) >>>>> *抄送:*Susan Hares; sdn@irtf.org <mailto:sdn@irtf.org> <mailto:sdn@irtf.org>; Dave Hood; ibnemo@ietf.org >>>>> <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> >>>>> *主题:*Re: [Ibnemo] [Sdn] Defining a Common Model for intent >>>>> >>>>> Hi Yali, >>>>> >>>>> Defining some typical roles and their pre-defined views (in terms of actions that are available to them) makes sense to me. >>>>> What I'd like to avoid is to freeze that set of predefined roles as the only ones suitable to be used from the functional >>>>> point of view. >>>>> >>>>> Be goode, >>>>> >>>>> On 11 Jun 2015, at 04:28 , zhangyali (D) <zhangyali369@huawei.com <mailto:zhangyali369@huawei.com> >>>>> <mailto:zhangyali369@huawei.com> <mailto:zhangyali369@huawei.com>> wrote: >>>>> >>>>> >>>>> >>>>> Hi Diego, >>>>> >>>>> Agree with you. We do not need to predefine roles in a system because of the diversity of systems and roles. And if a user >>>>> could tie multiply roles, it needs a rule to restrict the combination. >>>>> >>>>> But when we consider a common intent model, maybe we can try to define some typical roles in network system and analyze the >>>>> real intent of each role. For example, Pedro has provided some typical roles, such as, end-user, service provider, network >>>>> architecture, network operator, etc. Do you think this way make sense? >>>>> >>>>> Best, >>>>> >>>>> Yali >>>>> >>>>> *发件人:*DIEGO LOPEZ GARCIA [mailto:diego.r.lopez@telefonica.com] >>>>> *发送时间:*2015年6月11日0:49 >>>>> *收件人:*zhangyali (D) >>>>> *抄送:*Susan Hares; sdn@irtf.org <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> <mailto:sdn@irtf.org>; Dave Hood; ibnemo@ietf.org >>>>> <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> >>>>> *主题:*Re: [Ibnemo] [Sdn] Defining a Common Model for intent >>>>> >>>>> Hi Yali, >>>>> >>>>> Nothing to excuse about. We are discussing here to understand one another. >>>>> >>>>> I don't think we should predefine the roles by any means, just provide support in the language to define the, What I refer to >>>>> when talking about compositional semantics was about defining how the views (available objects or invariants as Pedro says) or >>>>> permissions (operations allowed) for a user can be built by combining the different roles a user can have. We'd need to define >>>>> precedence rules (or a similar mechanism) to solve conflicts and avoid inconsistencies, which may become a source of serious >>>>> security breaches. >>>>> >>>>> Be goode, >>>>> >>>>> On 10 Jun 2015, at 04:17 , zhangyali (D) <zhangyali369@huawei.com <mailto:zhangyali369@huawei.com> >>>>> <mailto:zhangyali369@huawei.com> <mailto:zhangyali369@huawei.com>> wrote: >>>>> >>>>> >>>>> >>>>> >>>>> Hi Diego, >>>>> >>>>> Sorry for mistake your idea, and thanks for giving me a clarification. I do think these mapping of roles are important in >>>>> designing intent modeling. >>>>> >>>>> For you said that “we should a clear role compositional semantics”, do you have some consideration about what roles we should >>>>> have or the principle of classification? >>>>> >>>>> Best, >>>>> >>>>> Yali >>>>> >>>>> *发件人:*DIEGO LOPEZ GARCIA [mailto:diego.r.lopez@telefonica.com] >>>>> *发送时 间:*2015年6月10日5:33 >>>>> *收件人:*zhangyali (D) >>>>> *抄送:*Susan Hares;sdn@irtf.org <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> <mailto:sdn@irtf.org>; Dave Hood;ibnemo@ietf.org >>>>> <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> >>>>> *主题:*Re: [Ibnemo] [Sdn] Defining a Common Model for intent >>>>> >>>>> Hi Yali, >>>>> >>>>> I'd not say there are two classifications of roles, but two mapping of roles onto the intended modeling language. One related >>>>> to the abstraction available to each role, and the other in terms of a security model that identifies which operations a role >>>>> can invoke. >>>>> >>>>> And yes, roles define a different dimension than users. A role, for sure, can be assigned to several users. And a user can >>>>> have several roles, though in that case we should a clear role compositional semantics. >>>>> >>>>> Be goode, >>>>> >>>>> On 9 Jun 2015, at 04:03 , zhangyali (D) <zhangyali369@huawei.com <mailto:zhangyali369@huawei.com> >>>>> <mailto:zhangyali369@huawei.com> <mailto:zhangyali369@huawei.com>> wrote: >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> Hi Diego, >>>>> >>>>> Thanks for your consideration about the concept of role. From my understanding about your type of role (please point it out if >>>>> my understanding is not right), you think there are two classification methods of roles overall. One method is distinguish >>>>> roles depending on their operation scope, which focus on which roles are restricted to do some specific operations. Another >>>>> method for distinguish roles by network abstraction model layer, and in any abstraction model, user could express specific intent. >>>>> >>>>> In my opinion, these two methods are important to understand the meaning of roles. The constraint of intent content is related >>>>> with user’s roles. For example, database in the whole system could not be deleted by non-administrators. So >>>>> non-administrators’intent could not express the intent of deleting system. So users’role will constraint users’intent. >>>>> >>>>> In one network abstraction view, users roles could express their intent which depend on this abstraction view. While in some >>>>> cases, one user may contain several roles, so one user can express various view of intent. Do you have any comments about this? >>>>> >>>>> Best, >>>>> >>>>> Yali >>>>> >>>>> *发件人:*DIEGO LOPEZ GARCIA [mailto:diego.r.lopez@telefonica.com] >>>>> *发送时间:*2015年6月7日1:41 >>>>> *收件人:*Susan Hares >>>>> *抄送:*sdn@irtf.org <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> <mailto:sdn@irtf.org>; Dave Hood;ibnemo@ietf.org >>>>> <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> >>>>> *主题:*Re: [Ibnemo] [Sdn] Defining a Common Model for intent >>>>> >>>>> Hi Sue, >>>>> >>>>> I tend to agree with your idea of roles, though I'd say that in the concept of role we are discussing here I see two aspects >>>>> that could (should?) be addressed separately. >>>>> >>>>> On the one hand, we have the role as a security concept, defining what a particular user is allowed to do or not do, and >>>>> therefore RBAC would become the natural solution for the security model to be applied to intent expressions. The language >>>>> should support mechanisms to define such roles and to associate these roles to users and to intent expressions by identifying >>>>> the objects, results or conditions that can be invoked in a expression by a certain role. >>>>> >>>>> On the other, we have role as modeling element: depending on the role they have, users would be able to see a different >>>>> network model, and to employ different intent expressions. This has to do with the particular network abstraction being >>>>> accessible to each role, and would require the modeling language to support the definition of "abstraction views" and >>>>> associating them with roles. >>>>> >>>>> I hope it is clear to all that in both cases the ability to make specific expressions for a certain role is limited, though >>>>> limitations are enforced at different points in the processing of the expressions, and they imply different requirements on >>>>> the modeling language and the platform(s) supporting it. And, as far as I can tell, supporting both would be highly desirable... >>>>> >>>>> Be goode, >>>>> >>>>> On 5 Jun 2015, at 19:41 , Susan Hares <shares@ndzh.com <mailto:shares@ndzh.com> <mailto:shares@ndzh.com> >>>>> <mailto:shares@ndzh.com>> wrote: >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> Fengkai: >>>>> >>>>> The key point about roles is where do they fit within the network-SQL Diego talks about. The basic concepts from >>>>> draft-xia-ibnemo-icim-00 make sense to me as part of the SQL >>>>> >>>>> Usersà(have) intentà(expressed) in context >>>>> >>>>> Intent (is made of) == object (constraint in node, connection, flow ), results (constraint in expect/avoid), operation >>>>> (constraint, in condition and action) >>>>> >>>>> If Roles are a type of intent, then there must be a qualifier on our intent definition above). >>>>> >>>>> If role are constraints that impact object, result, and operation, then we can model roles by simply indicating what >>>>> constraint the role plays. In Nemo, we create a model that provides a model for network objects (nodes, connection, and data >>>>> flows/action. If a role forms a grouping of constraints (or class), you can translate roles to a set of pre-defined >>>>> properties that can be associated with a pre-defined type of objects (Node, link, and dataflow/action), or results >>>>> (Expect/Avoid p2pconnect or mp2mpconnect), or operations (Flows of 1 Gbps). >>>>> >>>>> What does this mean for the user? The network SQL sets up libraries to define roles because it is simply constraints on the >>>>> components of intent. >>>>> >>>>> What do you think of my idea of roles? I can give this as business (non-network, or Provider business), or as a end-user role. >>>>> >>>>> Sue >>>>> >>>>> *From:*Lifengkai (Fengkai) [mailto:lifengkai@huawei.com] >>>>> *Sent:*Thursday, June 04, 2015 8:48 PM >>>>> *To:*Susan Hares; 'Dave Hood';sdn@irtf.org <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> >>>>> *Cc:*ibnemo@ietf.org <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> >>>>> *Subject:*RE: [Ibnemo] [Sdn] Defining a Common Model for intent >>>>> >>>>> Sue and all, >>>>> >>>>> Yes, they are concepts with roles taken into consideration. Here a little further explanation: >>>>> >>>>> I think grouping of roles by level is just one way, but not should be, and the key point here is roles. We are trying to >>>>> define intent with the role classifications (the other thread in this mail list). >>>>> >>>>> For the accurate intent for each categories of different networks users, theirs roles appears fundamentally important and are >>>>> the basis for the definition. >>>>> >>>>> I think role identification and distinguishing should be the potential work. >>>>> >>>>> Sue, any thoughts about this potential work? And how about others? >>>>> >>>>> Thanks. >>>>> >>>>> Best Regards, >>>>> >>>>> Fengkai >>>>> >>>>> *From:*Susan Hares [mailto:shares@ndzh.com] >>>>> *Sent:*Friday, June 05, 2015 2:35 AM >>>>> *To:*Lifengkai (Fengkai); 'Dave Hood';sdn@irtf.org <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> >>>>> *Cc:*ibnemo@ietf.org <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> >>>>> *Subject:*RE: [Ibnemo] [Sdn] Defining a Common Model for intent >>>>> >>>>> Fengkai and all: >>>>> >>>>> I agree with Yali that context is often omitted. Thank you for filling in these business roles to the 2 site example. In >>>>> all of these, I believe we have grouping of roles by level under the users intent >>>>> >>>>> HQ manager userànetwork manager(s)àindividual user(s) >>>>> >>>>> It appears that at each level the intent is related, but at each level the intent’s (object, result and constraint) is refined >>>>> into a different concept due to different roles. Is this what it appears to you? >>>>> >>>>> Sue >>>>> >>>>> *From:*Ibnemo [mailto:ibnemo-bounces@ietf.org]*On Behalf Of*Lifengkai (Fengkai) >>>>> *Sent:*Thursday, June 04, 2015 12:42 AM >>>>> *To:*Susan Hares; 'Dave Hood';sdn@irtf.org <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> >>>>> *Cc:*ibnemo@ietf.org <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> >>>>> *Subject:*Re: [Ibnemo] [Sdn] Defining a Common Model for intent >>>>> >>>>> Hi Sue and all, >>>>> >>>>> For the example, I see Yali has given one in her email, just copying here: >>>>> >>>>> “For example, an end-user wants to make the communication between two sites is the minimum. For this intent, price is the >>>>> context. Though context is omitted usually, it is really an important factor to affect the decision.” >>>>> >>>>> I would like to add one more example for better understanding of the concept, and I would like to elaborate it from the point >>>>> of user’s roles. >>>>> >>>>> Enterprise A has one headquarter and three branches located separately, and the product department within enterprise A has one >>>>> sub-department in headquarter and each branch. >>>>> >>>>> Based on the product division, the product department manager wants: >>>>> >>>>> 1.sub-department in each branch can communicate with sub-department in headquarter >>>>> >>>>> 2.sub-department in each branch cannot communicate with each other >>>>> >>>>> 3.product department want to enjoy better quality of experience with a budget limit of $50,000 >>>>> >>>>> Then for the “User-intent-context” format, >>>>> >>>>> ØUser, enterprise user with department manager role >>>>> >>>>> ØIntent, sub-department connection between headquarter and braches >>>>> >>>>> ØContext, better of quality of experience within the budget >>>>> >>>>> For the network manager of the enterprise A, based on the product department manager’s requirements, the network manager wants: >>>>> >>>>> 1.connects the product sub-departments via: a) full mesh topology with ACLs for communication constraints between subnets; >>>>> b)leased line between subnets. >>>>> >>>>> 2.SLA parameters configuration for guarantee the quality of experience >>>>> >>>>> Then for the “user-intent-context” format, >>>>> >>>>> ØUser, enterprise user with network manager role >>>>> >>>>> ØIntent, topology set up for communication connection between subnets >>>>> >>>>> ØContext, SLA parameters for quality of experience guaranteeing >>>>> >>>>> Here is the example that I proposed for the illustration, more specially with roles involved. >>>>> >>>>> Thanks. >>>>> >>>>> Best Regards, >>>>> >>>>> Fengkai >>>>> >>>>> *From:*Susan Hares [mailto:shares@ndzh.com] >>>>> *Sent:*Wednesday, June 03, 2015 7:09 AM >>>>> *To:*Lifengkai (Fengkai); 'Dave Hood';sdn@irtf.org <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> >>>>> *Cc:*ibnemo@ietf.org <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> >>>>> *Subject:*RE: [Ibnemo] [Sdn] Defining a Common Model for intent >>>>> >>>>> Fengkai: >>>>> >>>>> In this you are talking about the difference between the IT and Non-IT person’s context of an intent within a role. I believe >>>>> your examples show that >>>>> >>>>> Useràintentàcontext >>>>> >>>>> is very important as https://datatracker.ietf.org/doc/draft-xia-ibnemo-icim/states. I am still struggling to understand how >>>>> the “fitting” works. Can you provide additional examples? >>>>> >>>>> Sue >>>>> >>>>> *From:*Ibnemo [mailto:ibnemo-bounces@ietf.org]*On Behalf Of*Lifengkai (Fengkai) >>>>> *Sent:*Tuesday, June 02, 2015 3:47 AM >>>>> *To:*Dave Hood; Susan Hares;sdn@irtf.org <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> >>>>> *Cc:*ibnemo@ietf.org <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> >>>>> *Subject:*Re: [Ibnemo] [Sdn] Defining a Common Model for intent >>>>> >>>>> Hi Dave and all, >>>>> >>>>> Thanks for proposing the two valuable intent use cases. >>>>> >>>>> For the use case 2, I agree that the IT employee needs to include the details of ports/protocols into his/her intent >>>>> descriptions, but those may not be in the intent context scope of a non-IT employee. Have a further consideration with this, >>>>> different users of the network have their own intent in a specific domain. Then the roles/actors of network users, such as end >>>>> users, application developers, tenant IT/network administrators, operator network administrators, are valuable to be >>>>> identified and distinguished, thus fitting the intent requirements of the network users with different roles. >>>>> >>>>> Any thoughts about this consideration? >>>>> >>>>> Best Regards, >>>>> >>>>> Fengkai >>>>> >>>>> *From:*sdn [mailto:sdn-bounces@irtf.org]*On Behalf Of*Dave Hood >>>>> *Sent:*Tuesday, June 02, 2015 1:38 AM >>>>> *To:*Susan Hares;sdn@irtf.org <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> >>>>> *Cc:*Zhoutianran; Xiayinben;ibnemo@ietf.org <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> >>>>> *Subject:*Re: [Sdn] Defining a Common Model for intent >>>>> >>>>> An excerpt from an email I sent on the ONF NBI list, which may contain some useful thoughts: >>>>> >>>>> I have always had trouble understanding what an intent really is, so I am looking forward to making the concept more precise. >>>>> >>>>> When I click a link on a web page, I express an intent to invoke whatever that link offers. Completely below the surface is a >>>>> layer stack, on-demand session establishment, DNS look-ups, server load balancers, and any number of other technological >>>>> features that are of no interest to me. Why not use that as an example of intent? >>>>> >>>>> Better yet, we talk about negotiation and selection. Suppose I want to buy a widget. I probably already have some idea whether >>>>> I want to go to Amazon or EBay or somewhere else. Suppose it’s Amazon. I search Amazon’s catalog and receive an offer of >>>>> several widgets, some new, some used, some with a choice of colour or other pertinent features. If I see nothing I like, I may >>>>> open a new browser window and check out Best Buy or EBay (lots more hidden technology to make that happen!). Maybe I come back >>>>> to the Amazon page, having found nothing I liked better somewhere else. Now I accept one of the offered widgets and go through >>>>> the checkout process. >>>>> >>>>> Do we agree that this is a fairly pure expression of intent as conceptualized in the paper? (If not, let’s talk about making a >>>>> Skype call.) >>>>> >>>>> Ok, that’s my intent as an internet user. Let’s assume the network is all SDN of one kind or another. I invoke my intent >>>>> through a GUI onto software local to my PC, but I don’t think we can call the PC an SDN controller. It’s more an active >>>>> mediator, a client to an SDN. As far as the network is concerned, the client makes DNS queries and swaps opaque TCP packets >>>>> over a forwarding path that may already exist, or may need to be learned and set up on demand. This is about right, because >>>>> the session content may well be encrypted end to end, and rightly. >>>>> >>>>> To the SDN controller, my intent is satisfied by directing DNS queries to a known DNS server somewhere, and ensuring IP >>>>> connectivity for the subsequent session. Hmmm… what happened to our intent-based NBI? The SDN offered my PC a packet interface >>>>> with the properties of knowing how to recognize and route DNS queries specially, and general IP connectivity. My PC accepted >>>>> the service offer implicitly by offering traffic to the data-plane interface. The network could be performing associated >>>>> auxiliary services such as usage-based billing (think wireless roaming), so it’s more than just a dumb pipe. >>>>> >>>>> If this is not a legitimate example of intent, it would be good to write the white paper in such a way that clearly excludes >>>>> such cases. >>>>> >>>>> Use case 2: suppose I am a corporate IT employee, and suppose that my intent is to have an E-Line between two of my campi. I >>>>> necessarily care about ports and protocols; talk about intent being portable and protocol independent continues to confuse me >>>>> completely. How can I order an E-line without caring about such details? [Nor is this intent portable.] >>>>> >>>>> Obviously, an SDN controller is going to expose whatever actions and elements of information are germane to the service it >>>>> offers, and if ports and protocols are germane to the service, so be it. >>>>> >>>>> The SDN architecture, being recursive, models the north side of any controller as exposing an instance of an information >>>>> model, customized for the intended client/customer/app/user. That being the case, how do we distinguish an NBI API that >>>>> conveys intent (service: same thing?) from one that does not? >>>>> >>>>> I have recently come to the view that granularity is the criterion by which an intent or service invocation is distinguished. >>>>> Colloquially speaking, a service invocation is a single invocation across the API: give me E-Line. Now of course this turns >>>>> into constraint negotiation, offer and acceptance, but what happens across the API is effectively one transaction. In >>>>> contrast, what we might agree is **not** an intent or a service is the manipulation of a granular information model, the >>>>> explicit visibility of multiple objects, how they are interrelated, their attributes, and the like. >>>>> >>>>> ·Network as a single lump vs some non-trivial topology. >>>>> >>>>> ·Chauffeur vs driving a car. Legitimate reasons to choose one option or the other, but the level of granularity is quite >>>>> different. Shall we agree that driving is too granular to be considered intent? >>>>> >>>>> This idea of granularity and detailed operations on the components (which of course may be complex entities themselves, >>>>> virtualized into simple-appearing lumps) seems to me to capture the essence of what people are talking about when they say >>>>> intent or service. I am not comfortable with the way I am expressing it, so if this is a step in a productive direction, or >>>>> even if it’s not, I welcome suggestions to clarify the concept. >>>>> >>>>> Dave >>>>> >>>>> *From:*sdn [mailto:sdn-bounces@irtf.org]*On Behalf Of*Susan Hares >>>>> *Sent:*Saturday, May 30, 2015 1:02 PM >>>>> *To:*sdn@irtf.org <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> <mailto:sdn@irtf.org> >>>>> *Cc:*'Zhoutianran'; 'Xiayinben';ibnemo@ietf.org <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> <mailto:ibnemo@ietf.org> >>>>> *Subject:*[Sdn] Defining a Common Model for intent >>>>> >>>>> On this mail list, there has been a discussion of two types of information for Intent and Nemo: >>>>> (http://www.ietf.org/mail-archive/web/sdn/current/msg00646.html) : >>>>> >>>>> 1)What information is needed to represent a service request, >>>>> >>>>> 2)How to represent and transport the information for a request. >>>>> >>>>> In order to define what information is needed to represent a 1) service request that signals Intent from an application to a >>>>> controller, it is important to define Intent, and provide a clear model of Intent. Also, in describing real use-cases it is >>>>> important that one uses the same definition and model for Intent in each use case. >>>>> >>>>> In the current forums examining Intent (ODL NIC, ODL Nemo, OF NBI and Keystone, OPNFV Movie, OpenStack) there is a realization >>>>> that Intent occurs at multiple layers. The authors of draft-xia-ibnemo-icim have created a definition for intent and a >>>>> unified model for defining intent which can handle 1 or multiple layers. The model suggest that: >>>>> >>>>> 1)A user has a intent that is expressed in a context. >>>>> >>>>> 2)Intent (usually) involves an object with a result, and optionally includes operations toward that result. >>>>> >>>>> 3)Operations conditions perform actions within/modified by constraints. >>>>> >>>>> We believe this defines clearly what others are calling “pure intent” (objects + results) versus “constrained intent” (objects >>>>> + operations + constraints). The draft can be found at: https://datatracker.ietf.org/doc/draft-xia-ibnemo-icim/. The >>>>> authors are looking for feedback on the concepts in the draft. >>>>> >>>>> Sue Hares >>>>> >>>>> _______________________________________________ >>>>> Ibnemo mailing list >>>>> Ibnemo@ietf.org <mailto:Ibnemo@ietf.org> <mailto:Ibnemo@ietf.org> <mailto:Ibnemo@ietf.org> >>>>> https://www.ietf.org/mailman/listinfo/ibnemo >>>>> >>>>> -- >>>>> "Esta vez no fallaremos, Doctor Infierno" >>>>> >>>>> Dr Diego R. Lopez >>>>> Telefonica I+D >>>>> http://people.tid.es/diego.lopez/ >>>>> >>>>> e-mail:diego.r.lopez@telefonica.com <mailto:diego.r.lopez@telefonica.com> >>>>> Tel: +34 913 129 041 >>>>> Mobile: +34 682 051 091 >>>>> ---------------------------------- >>>>> >>>>> ------------------------------------------------------------------------------------------------------------------------------------ >>>>> >>>>> >>>>> Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o >>>>> confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda >>>>> notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la >>>>> legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía >>>>> y proceda a su destrucción. >>>>> >>>>> The information contained in this transmission is privileged and confidential information intended only for the use of the >>>>> individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that >>>>> any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this >>>>> transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in >>>>> error and then delete it. >>>>> >>>>> Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial >>>>> e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de >>>>> que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se >>>>> recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição >>>>> >>>>> -- >>>>> "Esta vez no fallaremos, Doctor Infierno" >>>>> >>>>> Dr Diego R. Lopez >>>>> Telefonica I+D >>>>> http://people.tid.es/diego.lopez/ >>>>> >>>>> e-mail:diego.r.lopez@telefonica.com <mailto:diego.r.lopez@telefonica.com> >>>>> Tel: +34 913 129 041 >>>>> Mobile: +34 682 051 091 >>>>> ---------------------------------- >>>>> >>>>> ------------------------------------------------------------------------------------------------------------------------------------ >>>>> >>>>> >>>>> Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o >>>>> confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda >>>>> notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la >>>>> legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía >>>>> y proceda a su destrucción. >>>>> >>>>> The information contained in this transmission is privileged and confidential information intended only for the use of the >>>>> individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that >>>>> any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this >>>>> transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in >>>>> error and then delete it. >>>>> >>>>> Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial >>>>> e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de >>>>> que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se >>>>> recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição >>>>> >>>>> -- >>>>> "Esta vez no fallaremos, Doctor Infierno" >>>>> >>>>> Dr Diego R. Lopez >>>>> Telefonica I+D >>>>> http://people.tid.es/diego.lopez/ >>>>> >>>>> e-mail:diego.r.lopez@telefonica.com <mailto:diego.r.lopez@telefonica.com> >>>>> Tel: +34 913 129 041 >>>>> Mobile: +34 682 051 091 >>>>> ---------------------------------- >>>>> >>>>> ------------------------------------------------------------------------------------------------------------------------------------ >>>>> >>>>> >>>>> Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o >>>>> confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda >>>>> notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la >>>>> legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía >>>>> y proceda a su destrucción. >>>>> >>>>> The information contained in this transmission is privileged and confidential information intended only for the use of the >>>>> individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that >>>>> any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this >>>>> transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in >>>>> error and then delete it. >>>>> >>>>> Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial >>>>> e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de >>>>> que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se >>>>> recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição >>>>> >>>>> -- >>>>> "Esta vez no fallaremos, Doctor Infierno" >>>>> >>>>> Dr Diego R. Lopez >>>>> Telefonica I+D >>>>> http://people.tid.es/diego.lopez/ >>>>> >>>>> e-mail: diego.r.lopez@telefonica.com <mailto:diego.r.lopez@telefonica.com> >>>>> Tel: +34 913 129 041 >>>>> Mobile: +34 682 051 091 >>>>> ---------------------------------- >>>>> >>>>> ------------------------------------------------------------------------------------------------------------------------------------ >>>>> >>>>> >>>>> Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o >>>>> confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda >>>>> notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la >>>>> legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía >>>>> y proceda a su destrucción. >>>>> >>>>> The information contained in this transmission is privileged and confidential information intended only for the use of the >>>>> individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that >>>>> any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this >>>>> transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in >>>>> error and then delete it. >>>>> >>>>> Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial >>>>> e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de >>>>> que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se >>>>> recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição >>>>> >>>>> >>>>> >>>>> _______________________________________________ >>>>> Ibnemo mailing list >>>>> Ibnemo@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/ibnemo >>>> >>> >>> -- >>> "Esta vez no fallaremos, Doctor Infierno" >>> >>> Dr Diego R. Lopez >>> Telefonica I+D >>> http://people.tid.es/diego.lopez/ >>> >>> e-mail: diego.r.lopez@telefonica.com >>> Tel: +34 913 129 041 >>> Mobile: +34 682 051 091 >>> ---------------------------------- >>> >>> >>> ------------------------------------------------------------------------------------------------------------------------------------ >>> >>> Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial >>> y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la >>> lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha >>> recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción. >>> >>> The information contained in this transmission is privileged and confidential information intended only for the use of the >>> individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any >>> dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in >>> error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it. >>> >>> Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e >>> é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a >>> leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta >>> mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição >> > > -- > "Esta vez no fallaremos, Doctor Infierno" > > Dr Diego R. Lopez > Telefonica I+D > http://people.tid.es/diego.lopez/ > > e-mail: diego.r.lopez@telefonica.com > Tel: +34 913 129 041 > Mobile: +34 682 051 091 > ---------------------------------- > > > ------------------------------------------------------------------------------------------------------------------------------------ > > Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y > es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la > lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha > recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción. > > The information contained in this transmission is privileged and confidential information intended only for the use of the > individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any > dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in > error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it. > > Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é > para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a > leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta > mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição
- [Ibnemo] Defining a Common Model for intent Susan Hares
- [Ibnemo] Defining a Common Model for intent Susan Hares
- Re: [Ibnemo] Defining a Common Model for intent PEDRO ANDRES ARANDA GUTIERREZ
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Dave Hood
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Susan Hares
- Re: [Ibnemo] Defining a Common Model for intent Susan Hares
- [Ibnemo] 答复: Defining a Common Model for intent Xiayinben
- [Ibnemo] 答复: Defining a Common Model for intent zhangyali (D)
- Re: [Ibnemo] 答复: Defining a Common Model for inte… Natale, Bob
- Re: [Ibnemo] 答复: Defining a Common Model for inte… Bert Wijnen (IETF)
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Lifengkai (Fengkai)
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Dave Hood
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] Defining a Common Model for intent Susan Hares
- Re: [Ibnemo] 答复: Defining a Common Model for inte… Susan Hares
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Susan Hares
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Susan Hares
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Susan Hares
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Dave Hood
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Susan Hares
- Re: [Ibnemo] 答复: Defining a Common Model for inte… Natale, Bob
- Re: [Ibnemo] Defining a Common Model for intent Zhoutianran
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Lifengkai (Fengkai)
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Zhoutianran
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Bert Wijnen (IETF)
- Re: [Ibnemo] Defining a Common Model for intent Natale, Bob
- [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model … Xiayinben
- [Ibnemo] 答复: Defining a Common Model for intent Xiayinben
- Re: [Ibnemo] 答复: Defining a Common Model for inte… Natale, Bob
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… STUART VENTERS
- Re: [Ibnemo] 答复: Defining a Common Model for inte… Susan Hares
- Re: [Ibnemo] Defining a Common Model for intent Susan Hares
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Susan Hares
- Re: [Ibnemo] Defining a Common Model for intent Natale, Bob
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Lifengkai (Fengkai)
- Re: [Ibnemo] Defining a Common Model for intent Zhoutianran
- Re: [Ibnemo] 答复: Defining a Common Model for inte… Romascanu, Dan (Dan)
- Re: [Ibnemo] Defining a Common Model for intent Zhoutianran
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Zhoutianran
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Susan Hares
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Bert Wijnen (IETF)
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Bert Wijnen (IETF)
- Re: [Ibnemo] Defining a Common Model for intent Susan Hares
- Re: [Ibnemo] 答复: Defining a Common Model for inte… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] 答复: Defining a Common Model for inte… Susan Hares
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Susan Hares
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Susan Hares
- Re: [Ibnemo] Defining a Common Model for intent Susan Hares
- Re: [Ibnemo] Defining a Common Model for intent Susan Hares
- Re: [Ibnemo] Defining a Common Model for intent Bert Wijnen (IETF)
- Re: [Ibnemo] Defining a Common Model for intent Susan Hares
- Re: [Ibnemo] Defining a Common Model for intent Bert Wijnen (IETF)
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Lifengkai (Fengkai)
- Re: [Ibnemo] Defining a Common Model for intent Natale, Bob
- Re: [Ibnemo] 答复: Defining a Common Model for inte… Natale, Bob
- Re: [Ibnemo] 答复: Defining a Common Model for inte… Tina TSOU
- Re: [Ibnemo] Defining a Common Model for intent Natale, Bob
- Re: [Ibnemo] Defining a Common Model for intent Natale, Bob
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… PEDRO ANDRES ARANDA GUTIERREZ
- Re: [Ibnemo] Defining a Common Model for intent Zhoutianran
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Zhoutianran
- Re: [Ibnemo] Defining a Common Model for intent Natale, Bob
- Re: [Ibnemo] 答复: Defining a Common Model for inte… PEDRO ANDRES ARANDA GUTIERREZ
- [Ibnemo] 答复: [Sdn] Defining a Common Model for in… Xiayinben
- [Ibnemo] 答复: [Sdn] Defining a Common Model for in… Xiayinben
- [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model … Xiayinben
- [Ibnemo] 答复: Defining a Common Model for intent Xiayinben
- Re: [Ibnemo] Defining a Common Model for intent Susan Hares
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Susan Hares
- Re: [Ibnemo] Defining a Common Model for intent Susan Hares
- Re: [Ibnemo] 答复: Defining a Common Model for inte… Susan Hares
- Re: [Ibnemo] Defining a Common Model for intent Susan Hares
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Susan Hares
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Susan Hares
- Re: [Ibnemo] 答复: [Sdn] Defining a Common Model fo… Susan Hares
- Re: [Ibnemo] 答复: Defining a Common Model for inte… Natale, Bob
- [Ibnemo] 答复: 答复: Defining a Common Model for inte… Xiayinben
- [Ibnemo] 答复: Defining a Common Model for intent Xiayinben
- [Ibnemo] 答复: 答复: Defining a Common Model for inte… Xiayinben
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… DIEGO LOPEZ GARCIA
- Re: [Ibnemo] 答复: Defining a Common Model for inte… PEDRO ANDRES ARANDA GUTIERREZ
- Re: [Ibnemo] Defining a Common Model for intent Zhoutianran
- Re: [Ibnemo] Defining a Common Model for intent PEDRO ANDRES ARANDA GUTIERREZ
- Re: [Ibnemo] Defining a Common Model for intent Zhoutianran
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Zhoutianran
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Susan Hares
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… STUART VENTERS
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Natale, Bob
- Re: [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Susan Hares
- Re: [Ibnemo] 答复: Defining a Common Model for inte… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] 答复: Defining a Common Model for inte… Susan Hares
- Re: [Ibnemo] Defining a Common Model for intent Susan Hares
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Susan Hares
- [Ibnemo] 答复: [Sdn] Defining a Common Model for in… zhangyali (D)
- [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model … Xiayinben
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… DIEGO LOPEZ GARCIA
- [Ibnemo] 答复: [Sdn] Defining a Common Model for in… zhangyali (D)
- Re: [Ibnemo] 答复: [Sdn] Defining a Common Model fo… PEDRO ANDRES ARANDA GUTIERREZ
- Re: [Ibnemo] 答复: [Sdn] Defining a Common Model fo… Zhoutianran
- Re: [Ibnemo] 答复: [Sdn] Defining a Common Model fo… PEDRO ANDRES ARANDA GUTIERREZ
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… DIEGO LOPEZ GARCIA
- [Ibnemo] 答复: [Sdn] Defining a Common Model for in… zhangyali (D)
- [Ibnemo] 答复: [Sdn] Defining a Common Model for in… zhangyali (D)
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Zhoutianran
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… PEDRO ANDRES ARANDA GUTIERREZ
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… DIEGO LOPEZ GARCIA
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… DIEGO LOPEZ GARCIA
- [Ibnemo] 答复: [Sdn] Defining a Common Model for in… zhangyali (D)
- Re: [Ibnemo] 答复: [Sdn] Defining a Common Model fo… Bert Wijnen (IETF)
- [Ibnemo] 答复: 答复: [Sdn] Defining a Common Model fo… zhangyali (D)
- Re: [Ibnemo] 答复: 答复: [Sdn] Defining a Common Mode… Bert Wijnen (IETF)
- Re: [Ibnemo] 答复: 答复: [Sdn] Defining a Common Mode… PEDRO ANDRES ARANDA GUTIERREZ
- [Ibnemo] 答复: 答复: 答复: [Sdn] Defining a Common Mode… zhangyali (D)
- Re: [Ibnemo] 答复: 答复: [Sdn] Defining a Common Mode… Bert Wijnen (IETF)
- Re: [Ibnemo] 答复: [Sdn] Defining a Common Model fo… DIEGO LOPEZ GARCIA
- Re: [Ibnemo] 答复: 答复: [Sdn] Defining a Common Mode… DIEGO LOPEZ GARCIA
- Re: [Ibnemo] 答复: 答复: [Sdn] Defining a Common Mode… PEDRO ANDRES ARANDA GUTIERREZ
- Re: [Ibnemo] 答复: [Sdn] Defining a Common Model fo… Bert Wijnen (IETF)
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… DIEGO LOPEZ GARCIA
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… Bert Wijnen (IETF)
- Re: [Ibnemo] [Sdn] Defining a Common Model for in… DIEGO LOPEZ GARCIA