Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model for intent

Sumandra Majee <S.Majee@F5.com> Fri, 05 June 2015 21:46 UTC

Return-Path: <S.Majee@f5.com>
X-Original-To: ibnemo@ietfa.amsl.com
Delivered-To: ibnemo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A5641A8782 for <ibnemo@ietfa.amsl.com>; Fri, 5 Jun 2015 14:46:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.811
X-Spam-Level:
X-Spam-Status: No, score=-3.811 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, J_CHICKENPOX_12=0.6, MANGLED_OFF=2.3, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=unavailable
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kFcyRzirp6KB for <ibnemo@ietfa.amsl.com>; Fri, 5 Jun 2015 14:46:31 -0700 (PDT)
Received: from mail.f5.com (mail.f5.com [208.85.209.139]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3292F1A1B5C for <ibnemo@ietf.org>; Fri, 5 Jun 2015 14:46:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=f5.com; i=@f5.com; q=dns/txt; s=seattle; t=1433540790; x=1465076790; h=from:to:cc:subject:date:message-id:content-id: content-transfer-encoding:mime-version; bh=ZOf+dLO//FOWj1w2N2SZLlTQL5SJnksuFYxAoNZ+Q9g=; b=AP3a95e+1IpGDJ+lGJNVN7iJNUQma3uQKHJMQhN1zxEDiM/zTX3z0xDc agVX5dHbRHtjt8rPWwy/m9XuJ/QhmhxTe+3oyLiqgaQZZos3eECvRNPUW /EPkLz6hzs6r6z3QCVI1opY/LGVte7+Mbo8xy1axnXZfYF/wpxzvKw2dB c=;
X-IronPort-AV: E=Sophos;i="5.13,560,1427760000"; d="scan'208";a="165216673"
X-IPAS-Result: A2DDBAA5GHJV/+sKqMBRCoNkXgaDGL0MGQqFLUoCHIFlAQEBAQEBgQuEIgEBAQEBAQEBAQEXCREgEQkEBxIBBgIRBAEBAQICERIDAgQlAgkUAQUDCgQBCQQFCRKIChWaWZ0Zo3MBAQEBAQEBAQEBAQEBAQEBAQEBAQEXgSGKIoQiAQYIAwEeGBsNBIJegUUFhm2JcoZ/glOCT4J1g3iCf4tWg1mCKAUcgVJvAYELOoEBAQEB
Received: from oracle-apps.f5net.com (HELO exchmail.f5net.com) ([192.168.10.235]) by mail.f5.com with ESMTP/TLS/AES256-SHA; 05 Jun 2015 21:46:28 +0000
Received: from SEAEXCHMBX06.olympus.F5Net.com (192.168.15.49) by seaexchmbx01.olympus.F5Net.com (192.168.15.223) with Microsoft SMTP Server (TLS) id 15.0.1044.25; Fri, 5 Jun 2015 14:46:27 -0700
Received: from SEAEXCHMBX06.olympus.F5Net.com ([fe80::b921:c8e9:b9b2:3e8a]) by SEAEXCHMBX06.olympus.F5Net.com ([fe80::b921:c8e9:b9b2:3e8a%12]) with mapi id 15.00.1044.021; Fri, 5 Jun 2015 14:46:27 -0700
From: Sumandra Majee <S.Majee@F5.com>
To: Xiayinben <xiayinben@huawei.com>, "Bert Wijnen (IETF)" <bwietf@bwijnen.net>, Susan Hares <shares@ndzh.com>, Zhoutianran <zhoutianran@huawei.com>, "'Natale, Bob'" <RNATALE@mitre.org>, "zhangyali (D)" <zhangyali369@huawei.com>, 'PEDRO ANDRES ARANDA GUTIERREZ' <pedroa.aranda@telefonica.com>, "nfvrg@irtf.org" <nfvrg@irtf.org>
Thread-Topic: =?utf-8?B?W05mdnJnXSDnrZTlpI06IFtJYm5lbW9dIERlZmluaW5nIGEgQ29tbW9uIE1v?= =?utf-8?Q?del_for_intent?=
Thread-Index: AQHQn9kSosXehKqrLUSsHBTu16k0ww==
Date: Fri, 5 Jun 2015 21:46:27 +0000
Message-ID: <D1976655.3AEC7%s.majee@f5.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.3.9.131030
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.168.15.239]
Content-Type: text/plain; charset="utf-8"
Content-ID: <C1E4B907AD965A4A8ECC5A2389F3BCD3@F5.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/ibnemo/unUHhL1eRzcVVEloVD9wUmJbeCU>
X-Mailman-Approved-At: Mon, 08 Jun 2015 05:51:16 -0700
Cc: "draft-xia-ibnemo-icim@tools.ietf.org" <draft-xia-ibnemo-icim@tools.ietf.org>, "ibnemo@ietf.org" <ibnemo@ietf.org>
Subject: Re: [Ibnemo] =?utf-8?b?W05mdnJnXSDnrZTlpI06ICBEZWZpbmluZyBhIENvbW1v?= =?utf-8?q?n_Model_for_intent?=
X-BeenThere: ibnemo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of Nemo, an intent-based North Bound \(NB\) interface consisting of an application protocol running over HTTP \(RESTful interfaces\) to exchange intent-based primitives between applications and meta-controllers controlling virtual network resources \(networks, storage, CPU\)." <ibnemo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ibnemo/>
List-Help: <mailto:ibnemo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jun 2015 21:46:35 -0000

While I think I get this picture I can not map to a use case using the
picture. There are commercial products that uses various form of RBAC.

Can you provide couple of concrete examples


Regards.

Sumandra

On 6/5/15, 8:14 AM, "Xiayinben" <xiayinben@huawei.com> wrote:

>Please let me draw my thought.
>Here is current system which provide some functional
>interfaces{f(1),f(2)...f(n)} for its support operation.
>
>	        f(1)   f(2)   ...    f(n)
>		    ^     ^     ^     ^
>		    |     |     |     |
>		|----------------------------------------|
>		| current system operation  |
>		|----------------------------------------|
>
>A user's role decides that what they really cared are some
>result{r(1),r(2)...r(m)}.
>
>		|-------------------------------------|
>		| Role really cared result  |
>		|-------------------------------------|
>          |     |     |     |
>	      v     v     v     v
>         r(1)   r(2)   ...   r(m)
>
>There are some knowledge: r(x) can be achieved by a list of
>f(a),f(b)..,f(t) in some context c(j),c(k),...,c(l). Maybe some users
>have this knowledge and sometimes care a part of them. But no one wants
>to give whole list.
>Whole picture like this,
>
>		|-------------------------------------|
>		| Role really cared result  |
>		|-------------------------------------|
>          |     |     |     |
>	      v     v     v     v
>         r(1)   r(2)   ...   r(m)
>									|-------------------|
>      O				           c(1)<--|           |
>    - - + - -				        	|  context   |
>      +      				   c(2)<--|           |
>	 /  \							|           |
>					  		   c(p)<--|           |
>									|--------------------|
>	     f(1)   f(2)   ...    f(n)
>	     ^     ^     ^     ^
>		 |     |     |     |
>	   |----------------------------------------|
>	   | current system operation  |
>	   |----------------------------------------|
>
>Pure intent is r(x) only;
>Impure intent is r(x)+c(y)+f(z).  f(z) is part of list of f(a),f(b)..,f(t)
>Non intent is list of f(a),f(b)..,f(t).  This is prescriptive way.
>
>Yinben
>
>-----邮件原件-----
>发件人: Ibnemo [mailto:ibnemo-bounces@ietf.org] 代表 Bert Wijnen (IETF)
>发送时间: 2015年6月5日 2:56
>收件人: Susan Hares; Zhoutianran; 'Natale, Bob'; zhangyali (D); 'PEDRO
>ANDRES ARANDA GUTIERREZ'; nfvrg@irtf.org
>抄送: draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org
>主题: Re: [Ibnemo] Defining a Common Model for intent
>
>It may be jsut me, but adding "pure" intent and "impure" intent and
>jetstreams etc, it does just become more vague for me.
>
>See also inline
>
>On 04/06/15 20:41, Susan Hares wrote:
>>
>> Tianran/ Terrence:
>>
>> Instinctively, I believe that role-based intent provides an ability to
>> define and classify intent.  I know how to identify the role
>> relationships, and the actions between roles.  However, I still do not
>>really understand classify the relationship between intent and roles.
>>
>> My concern is that we are looking at general system theory where
>>certain things are first order changes and other things are
>> second-order changes.   A first order change is like the wind blowing.
>>A second order change is when the upper atmosphere jet
>> stream changes causing a whole shift in weather patterns.
>>
>> If we classify intent by roles, will we find that roles are the “jet
>> stream” that pushes a lot of intent.  Or will we find some “pure”
>>intent classes are the jet stream that pushes a lot of intent or “jet
>>stream” ?
>>
>I cannot make heads or tails from that sentence. Again, it may be just me.
>
>Bert
>>
>> Best wishes,
>>
>> Sue
>>
>> *From:*Zhoutianran [mailto:zhoutianran@huawei.com]
>> *Sent:* Thursday, June 04, 2015 2:36 AM
>> *To:* Natale, Bob; Susan Hares; zhangyali (D); 'PEDRO ANDRES ARANDA
>> GUTIERREZ'; nfvrg@irtf.org
>> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org
>> *Subject:* RE: [Ibnemo] Defining a Common Model for intent
>>
>> Hi Bob and Sue,
>>
>> The role based intent gives the methodology to define and classify
>> intent. I think both Bob and me realize the identifying roles is
>>important. And yes, it’s on the top.
>>
>> Of course, intent need to be implemented. We can do this compilation
>> layer by layer, i.e., like policy continuum, from goal to fitness to
>> ECA to …. By the way, it seems in policy continuum, everything is
>>policy, and an intent can be compiled by policies all the way to device
>>instructions. Please correct me if it is not.
>>
>> My idea is:
>>
>> On one hand, I would like a flat intent expression with many ways for
>>both pure intent and the constrained intent.
>>
>> On the other hand, I think the intent can be implemented by many
>> existing layered functions like the figure I showed. And a cross layer
>>design will make the intent implementation more flexible.
>>
>> I am not going to create concepts but an operational solution. I think
>> policy continuum is an option for intent implementation, but it’s not
>>mandatory cannot escape.
>>
>> Best Regards,
>>
>> Terence
>>
>> *From:*Natale, Bob [mailto:RNATALE@mitre.org]
>> *Sent:* Wednesday, June 03, 2015 10:45 PM
>> *To:* Zhoutianran; Susan Hares; zhangyali (D); 'PEDRO ANDRES ARANDA
>> GUTIERREZ'; nfvrg@irtf.org <mailto:nfvrg@irtf.org>
>> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org
>> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org
>> <mailto:ibnemo@ietf.org>
>> *Subject:* RE: [Ibnemo] Defining a Common Model for intent
>>
>> Hi Terence,
>>
>> As Bert has noted on a related thread today, it is sensible to focus on
>>intent expression at the “top” layer first.
>>
>> However, work on that should be cognizant of two things:
>>
>> - Who/what are the intended consumers of such expressions?
>>
>> - What is the “distance” from the top level intent expressions to
>>executable actions that affect network behavior?
>>
>> Those two things are interrelated and captured in the policy continuum
>> concept and construct … you can conceptualize them differently,
>> resulting in different constructs, and that is fine … but you cannot
>>escape them. Any attempt to escape them will result, at best, in a
>>beautiful language that will never be spoken in an operational context.
>>
>> Avanti,
>>
>> BobN
>>
>> *From:*Ibnemo [mailto:ibnemo-bounces@ietf.org] *On Behalf Of
>> *Zhoutianran
>> *Sent:* Wednesday, June 03, 2015 5:19 AM
>> *To:* Natale, Bob; Susan Hares; zhangyali (D); 'PEDRO ANDRES ARANDA
>> GUTIERREZ'; nfvrg@irtf.org <mailto:nfvrg@irtf.org>
>> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org
>> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org
>> <mailto:ibnemo@ietf.org>
>> *Subject:* Re: [Ibnemo] Defining a Common Model for intent
>>
>> Hi Bob,
>>
>> I agree with you that the intent expression is the first important
>>step. And that’s what we are going to do.
>>
>> I think in this discussion group we will focus on the top layer
>> intent. As I posted in the email on the “role based intent”, there
>> will be only one intent layer and I do not think the “policy continuum”
>>works or necessarily applied here. In contrast I would like a flat
>>intent expression with many ways for both pure intent and the
>>constrained intent.
>>
>> Regards,
>>
>> Terence
>>
>> *From:*Ibnemo [mailto:ibnemo-bounces@ietf.org] *On Behalf Of *Natale,
>> Bob
>> *Sent:* Wednesday, June 03, 2015 1:15 PM
>> *To:* Susan Hares; zhangyali (D); 'PEDRO ANDRES ARANDA GUTIERREZ';
>> nfvrg@irtf.org <mailto:nfvrg@irtf.org>
>> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org
>> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org
>> <mailto:ibnemo@ietf.org>
>> *Subject:* Re: [Ibnemo] RE: Defining a Common Model for intent
>>
>> Hi Sue,
>>
>> Yes, the Formal Model paper is a very good source, but should be
>>augmented with a few others for a more complete understanding.
>>
>> And it is very important to note that the policy continuum is not
>> _/my/_ model … it is (to the best of my knowledge) John Strassner’s
>> creation and I generally recommend Chap. 9, Examples of Using the
>>Policy Continuum, in his book on /Policy-Based Network Management:
>>Solutions for the Next Generation/ (2004) as an essential source.
>>
>> [Apologies for possibly rambling a bit in what follows … I am not an
>> active contributor and I hate to take up the time of those who are
>> just because I have a few minutes to post, but since Sue asked….]
>>
>> I would note that the specific layer labels used in the policy
>> continuum literature should not be considered absolute … i.e., other
>> formulations (with more or (ideally) fewer layers) are possible, with
>>different labels, denoting (e.g.) some domain-, marketplace-, or
>>business model-specificity.
>>
>> The key issue is the number and nature of the translations necessary
>> from a statement of intent at the “top” layer to a set of actions at
>> the “bottom” layer that serve to realize the intent. In John’s policy
>> continuum the top layer is the “Business” layer and we might see
>> policy expressions like “Optimize traffic flows for fairness to all
>> active users” or “Optimize traffic flows for priority based on user
>> account type” (e.g., the proverbial Platinum, Gold, Silver, Bronze
>> casting). Those are deliberately stark examples … in reality, the
>>Business layer promulgates enormous numbers of policies often
>>overlapping and “frictional” … but take either stark example and
>>consider how many translations it would take to result in a conforming
>>set of actions in large-scale network of diverse devices, services,
>>protocols, (and a very large)  etc. In current technology (and for the
>>foreseeable future, at my age at least!) at some point such statements
>>of intent from the Business layer have to get translated to E-C-A type
>>rules.
>>
>> I recognize an intent-based policy expression by its distance from a
>> set of expression (usually “rules”) that execute actions that realize
>> the outcome stated in the intent-based expression. In that view, it’s
>> not an absolute (i.e., the diverse views of the Policy Continuum hold)
>> and it’s also possible to envision cases where expressions of intent
>>can be “directly” implemented by a resource or set of resources. SDN is
>>a step in the direction of (1) reducing the number of translations
>>necessary for a large class of intent-based policy expressions and (2)
>>virtualizing the implementation actions from the perspective of the
>>“upper”
>> layers of the policy continuum (or continua).
>>
>> So, SDN and the ecosystem of changes around it represent  a big
>> opportunity to make progress on rationalizing policy management across
>>the layers of the policy continuum. A necessary first step is having
>>useful standards for policy-expressions from the “top”
>> layer – and they typically talk in intent-based policy expressions
>>there.
>>
>> Btw, I presume that IBNemo* contributors are also following John’s
>> work in the SUPA area as well … very important that these efforts are
>>totally complementary and synergistic, IMHO.
>>
>> [* - Is it “IBNemo”, “ibnemo”, “IB-nemo” or something else? … I see it
>> written all of those ways, and possibly more....]
>>
>> Avanti,
>>
>> BobN
>>
>> *From:*Susan Hares [mailto:shares@ndzh.com]
>> *Sent:* Tuesday, June 02, 2015 6:26 PM
>> *To:* Natale, Bob; 'zhangyali (D)'; 'PEDRO ANDRES ARANDA GUTIERREZ';
>> nfvrg@irtf.org <mailto:nfvrg@irtf.org>
>> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org
>> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org
>> <mailto:ibnemo@ietf.org>
>> *Subject:* RE: [Ibnemo] RE: Defining a Common Model for intent
>>
>> Bob:
>>
>> Thank you for The Policy Continuum – A Formal Model (Steven Davy ,
>> Brendan Jennings and John Strassner). Is this the one you stated we
>>should read?
>>
>> http://www.tssg.org/files/archives/2007_MACE_SDavy_Jennings_final.pdf
>>
>> Davy, Jenning and Strassner.  In this continuum it suggests there are
>> descending levels at: business, system (device and technology
>> independent), administrator (device independent, technology dependent),
>>device (device and technology specific), and instance (specific MIB,
>>PIB, and CLI).  The system level is what Yali and Yinben have talked
>>about when they speak about a
>> connection from London to Beijing.  The administrator is a level of an
>>L3VPN network with many devices.   I have suggested a few
>> more layers that related in a gap analysis for I2NSF.  These layer
>>match what the IETF is doing in the yang modules.
>>
>> +--------------------------------------------+
>>
>> |Application Network Wide: Intent            |
>>
>> +--------------------------------------------+
>>
>> |Network-wide level: L3SM L3VPN service model|
>>
>> +--------------------------------------------+
>>
>> |Device level: Protocol Independent: I2RS    |
>>
>> | RIB, Topology, Filter-Based RIB            |
>>
>> +--------------------------------------------+
>>
>> |Device Level: Protocol Yang modules         |
>>
>> | (ISIS, OSPF, BGP, EVPN, L2VPN, L3VPN, etc.)|
>>
>> +--------------------------------------------+
>>
>> | Device level: IP and System: NETMOD Models |
>>
>> | (config and oper-state), tunnels           |
>>
>> +--------------------------------------------+
>>
>> Did I understand your policy continuum?
>>
>> The policy continuum paper states three axioms:
>>
>> “1) A policy may exist at any level of the continuum without the
>> requirement of being associated to policies at other continuum levels.
>>
>> 2) A policy may reference a set of lower level policies.
>>
>> 3) A policy may be associated to more than one higher level policy”
>>
>> Can you explain your comment:
>>
>> “the “need” for multiple intermediate E-C-A translations at multiple
>> layers of the policy continuum has heretofore been a major impediment
>>to progress on policy-based management, IMHO.”
>>
>> Does this come out of the formal language in the paper?
>>
>> Sue
>>
>> *From:*Natale, Bob [mailto:RNATALE@mitre.org]
>> *Sent:* Tuesday, June 02, 2015 1:25 AM
>> *To:* zhangyali (D); PEDRO ANDRES ARANDA GUTIERREZ; Susan Hares;
>> nfvrg@irtf.org <mailto:nfvrg@irtf.org>
>> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org
>> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org
>> <mailto:ibnemo@ietf.org>
>> *Subject:* RE: [Ibnemo]RE: Defining a Common Model for intent
>>
>> With all due respect:
>>
>> 1. I would recommend that anyone working on this topic, if he/she has
>>not done so already, understand the “policy continuum”
>> construct … a web search for ‘"policy continuum" Strassner’ will
>> identify a good set of sources to start from for the network management
>>domain.
>>
>> 2. Intents are statements of objectives or goals … they tend  to
>> originate at the “higher” levels of the policy continuum … at some
>> point (at “lower” layers of the policy continuum) they are translated
>>to E-C-A type rules (more deterministic than intents)  for execution …
>>much normally happens in between.
>>
>> 3. Designing solutions that minimize the number of translations
>> between the statement of intent and the execution rules is essential ..
>>and _/possibly/_ enabled by contemporary technologies via which “higher”
>>layer intents can be translated to “lower”
>> layer intents before hitting the ultimate E-C-A execution layer. This
>>is a highly speculative statement on my part. But the “need”
>> for multiple intermediate E-C-A translations at multiple layers of the
>> policy continuum has heretofore been a major impediment to progress on
>>policy-based management, IMHO.
>>
>> The “with all due respect” aspect refers to the fact that the work
>> that the active contributors to this thread are doing is very positive
>>even if none of my comments are acted upon.
>>
>> Avanti,
>>
>> BobN
>>
>> *From:*Ibnemo [mailto:ibnemo-bounces@ietf.org] *On Behalf Of
>> *zhangyali (D)
>> *Sent:* Monday, June 01, 2015 11:52 PM
>> *To:* PEDRO ANDRES ARANDA GUTIERREZ; Susan Hares; nfvrg@irtf.org
>> <mailto:nfvrg@irtf.org>
>> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org
>> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org
>> <mailto:ibnemo@ietf.org>
>> *Subject:* [Ibnemo] 答复: Defining a Common Model for intent
>>
>> Hi Pedro,
>>
>> Thanks for reviewing the draft and giving modification.
>>
>> The question you have mentioned is a very important point for the
>> abstraction of intent model. Maybe we can propose the transport market
>>as a analogy.
>>
>> 1.A customer wants to transport his goods from A to B. So his intent
>> is getting his goods from A to B without carrying about how to do it.
>>Then his intent is transferred to the transportation system.
>>
>> 2.This system analyzes customer’s requirement, and choose a suitable
>> way to complete the requirement. For example, the system choose truck
>>as the means. So the intent of transportation system is transferring the
>>goods with truck.
>>
>> 3.The driver of this truck analyze the path from A to B, and choose a
>> most appropriate path to complete this order which will save more
>> time. So  the intent of driver may be transferring the goods with the
>>least time. Then the driver will start the engine, step on the gas, etc.
>>
>> From this analogy, the ultimate effect is the same, namely, transfer
>> the goods from A to B. But the specific intent of different roles has
>> some differences which depends on user’ role, knowledge,
>>responsibility, etc. For example, transportation system is responsible
>>for transporting goods, and he know the various ways. So he can form his
>>intent by rendering the upper customer’s intent.
>>
>> Supposing we divide users into different layers according to the
>> implementation series, users in upper layer expresses his intent as
>> /what/ he want without having the knowledge about /how/ to do it. Then
>> the /how/ procedure will be transferred to /what /in the lower layer
>>according to knowledge and context. These transfer procedure lead to the
>>completion of requirement. Same with the example in draft. Although the
>>ultimate effect is same, the focus is different which will bring out the
>>differentiation of intent.
>>
>> This is just my immature opinion about intent. Do you think the
>> differentiation of intent to complete the same thing is important and
>>reasonable?
>>
>> Best Regards,
>>
>> Yali
>>
>> *发件人**:*PEDRO ANDRES ARANDA GUTIERREZ
>> [mailto:pedroa.aranda@telefonica.com]
>> *发送时间:* 2015年6月1日 17:15
>> *收件人:* Susan Hares; nfvrg@irtf.org <mailto:nfvrg@irtf.org>
>> *抄送:* draft-xia-ibnemo-icim@tools.ietf.org
>> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org
>> <mailto:ibnemo@ietf.org>
>> *主题:* Re: [Ibnemo] Defining a Common Model for intent
>>
>> Hi,
>>
>> A small clarification proposal for draft
>>https://datatracker.ietf.org/doc/draft-xia-ibnemo-icim/.
>>
>> In section 2.4, I would leave the following as a paragraph
>>
>> For example, in the network area the intent of end-users could be safe
>> connectivity between two sites which a technology independent and
>> device independent requirement. For business-based network designers,
>> the network connectivity can be selected which is device- independent
>> but technology specific. An example of the business-based technology
>> is the L3VPN.
>> And change:
>> For network administrators, intent can be specific operations on a set
>> of devices such as configuring IP addresses on network servers in a
>> data center.
>>
>> To
>>
>> For network administrators, intent can be <new>defining a network
>>topology like a router connected to a firewall, connected to a load
>>balancer and this to two L2 networks where WWW servers sit or specifying
>>the</new> operations on a set of devices such as configuring IP
>>addresses on network servers in a data center.
>>   
>> Rationale behind this is again, that intent should be anything that is
>>invariant and that expresses/what/  a network operator/administrator may
>>need to do, as opposed to/how/  he would do that, i.e. The router is a
>>HW device from vendor X or a virtual machine running a specific routing
>>daemon over a given data-path implementation.
>> Best, /PA
>>
>> ---
>>
>> Dr. Pedro A. Aranda Gutiérrez
>>
>> Technology Exploration -
>>
>> Network Innovation & Virtualisation
>>
>> email: pedroa d0t aranda At telefonica d0t com
>>
>> Telefónica, Investigación y Desarrollo
>>
>> C/ D. Ramón de la Cruz,84
>>
>> 28006 Madrid, Spain
>>
>> Fragen sind nicht da, um beantwortet zu werden.
>>
>> Fragen sind da, um gestellt zu werden.
>>
>> Georg Kreisler
>>
>> ----------------------------------------------------------------------
>> --------------------------------------------------------------
>>
>>
>> Este mensaje y sus adjuntos se dirigen exclusivamente a su
>> destinatario, puede contener información privilegiada o confidencial y
>> es para uso exclusivo de la persona o entidad de destino. Si no es
>> usted. el destinatario indicado, queda notificado de que la lectura,
>>utilización, divulgación y/o copia sin autorización puede estar
>>prohibida en virtud de la legislación vigente. Si ha recibido este
>>mensaje por error, le rogamos que nos lo comunique inmediatamente por
>>esta misma vía y proceda a su destrucción.
>>
>> The information contained in this transmission is privileged and
>> confidential information intended only for the use of the individual
>> or entity named above. If the reader of this message is not the
>> intended recipient, you are hereby notified that any dissemination,
>>distribution or copying of this communication is strictly prohibited. If
>>you have received this transmission in error, do not read it. Please
>>immediately reply to the sender that you have received this
>>communication in error and then delete it.
>>
>> Esta mensagem e seus anexos se dirigem exclusivamente ao seu
>> destinatário, pode conter informação privilegiada ou confidencial e é
>> para uso exclusivo da pessoa ou entidade de destino. Se não é vossa
>> senhoria o destinatário indicado, fica notificado de que a leitura,
>> utilização, divulgação e/ou cópia sem autorização pode estar proibida
>> em virtude da legislação vigente. Se recebeu esta mensagem por erro,
>> rogamos-lhe que nos o comunique imediatamente por esta mesma via e
>> proceda a sua destruição
>>
>>
>>
>> _______________________________________________
>> Ibnemo mailing list
>> Ibnemo@ietf.org
>> https://www.ietf.org/mailman/listinfo/ibnemo
>
>_______________________________________________
>Ibnemo mailing list
>Ibnemo@ietf.org
>https://www.ietf.org/mailman/listinfo/ibnemo
>_______________________________________________
>Nfvrg mailing list
>Nfvrg@irtf.org
>https://www.irtf.org/mailman/listinfo/nfvrg