Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model for intent
Sumandra Majee <S.Majee@F5.com> Fri, 05 June 2015 21:46 UTC
Return-Path: <S.Majee@f5.com>
X-Original-To: ibnemo@ietfa.amsl.com
Delivered-To: ibnemo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 2A5641A8782
for <ibnemo@ietfa.amsl.com>; Fri, 5 Jun 2015 14:46:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.811
X-Spam-Level:
X-Spam-Status: No, score=-3.811 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, J_CHICKENPOX_12=0.6, MANGLED_OFF=2.3,
MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001,
T_RP_MATCHES_RCVD=-0.01] autolearn=unavailable
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id kFcyRzirp6KB for <ibnemo@ietfa.amsl.com>;
Fri, 5 Jun 2015 14:46:31 -0700 (PDT)
Received: from mail.f5.com (mail.f5.com [208.85.209.139])
(using TLSv1 with cipher RC4-SHA (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 3292F1A1B5C
for <ibnemo@ietf.org>; Fri, 5 Jun 2015 14:46:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
d=f5.com; i=@f5.com; q=dns/txt; s=seattle;
t=1433540790; x=1465076790;
h=from:to:cc:subject:date:message-id:content-id:
content-transfer-encoding:mime-version;
bh=ZOf+dLO//FOWj1w2N2SZLlTQL5SJnksuFYxAoNZ+Q9g=;
b=AP3a95e+1IpGDJ+lGJNVN7iJNUQma3uQKHJMQhN1zxEDiM/zTX3z0xDc
agVX5dHbRHtjt8rPWwy/m9XuJ/QhmhxTe+3oyLiqgaQZZos3eECvRNPUW
/EPkLz6hzs6r6z3QCVI1opY/LGVte7+Mbo8xy1axnXZfYF/wpxzvKw2dB c=;
X-IronPort-AV: E=Sophos;i="5.13,560,1427760000"; d="scan'208";a="165216673"
X-IPAS-Result: A2DDBAA5GHJV/+sKqMBRCoNkXgaDGL0MGQqFLUoCHIFlAQEBAQEBgQuEIgEBAQEBAQEBAQEXCREgEQkEBxIBBgIRBAEBAQICERIDAgQlAgkUAQUDCgQBCQQFCRKIChWaWZ0Zo3MBAQEBAQEBAQEBAQEBAQEBAQEBAQEXgSGKIoQiAQYIAwEeGBsNBIJegUUFhm2JcoZ/glOCT4J1g3iCf4tWg1mCKAUcgVJvAYELOoEBAQEB
Received: from oracle-apps.f5net.com (HELO exchmail.f5net.com)
([192.168.10.235])
by mail.f5.com with ESMTP/TLS/AES256-SHA; 05 Jun 2015 21:46:28 +0000
Received: from SEAEXCHMBX06.olympus.F5Net.com (192.168.15.49) by
seaexchmbx01.olympus.F5Net.com (192.168.15.223) with Microsoft SMTP Server
(TLS) id 15.0.1044.25; Fri, 5 Jun 2015 14:46:27 -0700
Received: from SEAEXCHMBX06.olympus.F5Net.com ([fe80::b921:c8e9:b9b2:3e8a]) by
SEAEXCHMBX06.olympus.F5Net.com ([fe80::b921:c8e9:b9b2:3e8a%12]) with
mapi id 15.00.1044.021; Fri, 5 Jun 2015 14:46:27 -0700
From: Sumandra Majee <S.Majee@F5.com>
To: Xiayinben <xiayinben@huawei.com>, "Bert Wijnen (IETF)"
<bwietf@bwijnen.net>, Susan Hares <shares@ndzh.com>, Zhoutianran
<zhoutianran@huawei.com>, "'Natale, Bob'" <RNATALE@mitre.org>, "zhangyali
(D)" <zhangyali369@huawei.com>, 'PEDRO ANDRES ARANDA GUTIERREZ'
<pedroa.aranda@telefonica.com>, "nfvrg@irtf.org" <nfvrg@irtf.org>
Thread-Topic: =?utf-8?B?W05mdnJnXSDnrZTlpI06IFtJYm5lbW9dIERlZmluaW5nIGEgQ29tbW9uIE1v?=
=?utf-8?Q?del_for_intent?=
Thread-Index: AQHQn9kSosXehKqrLUSsHBTu16k0ww==
Date: Fri, 5 Jun 2015 21:46:27 +0000
Message-ID: <D1976655.3AEC7%s.majee@f5.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.3.9.131030
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.168.15.239]
Content-Type: text/plain; charset="utf-8"
Content-ID: <C1E4B907AD965A4A8ECC5A2389F3BCD3@F5.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/ibnemo/unUHhL1eRzcVVEloVD9wUmJbeCU>
X-Mailman-Approved-At: Mon, 08 Jun 2015 05:51:16 -0700
Cc: "draft-xia-ibnemo-icim@tools.ietf.org"
<draft-xia-ibnemo-icim@tools.ietf.org>, "ibnemo@ietf.org" <ibnemo@ietf.org>
Subject: Re: [Ibnemo] =?utf-8?b?W05mdnJnXSDnrZTlpI06ICBEZWZpbmluZyBhIENvbW1v?=
=?utf-8?q?n_Model_for_intent?=
X-BeenThere: ibnemo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of Nemo,
an intent-based North Bound \(NB\) interface consisting of an
application protocol running over HTTP \(RESTful interfaces\) to exchange
intent-based primitives between applications and meta-controllers controlling
virtual network resources \(networks, storage, CPU\)." <ibnemo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ibnemo>,
<mailto:ibnemo-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ibnemo/>
List-Help: <mailto:ibnemo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ibnemo>,
<mailto:ibnemo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jun 2015 21:46:35 -0000
While I think I get this picture I can not map to a use case using the picture. There are commercial products that uses various form of RBAC. Can you provide couple of concrete examples Regards. Sumandra On 6/5/15, 8:14 AM, "Xiayinben" <xiayinben@huawei.com> wrote: >Please let me draw my thought. >Here is current system which provide some functional >interfaces{f(1),f(2)...f(n)} for its support operation. > > f(1) f(2) ... f(n) > ^ ^ ^ ^ > | | | | > |----------------------------------------| > | current system operation | > |----------------------------------------| > >A user's role decides that what they really cared are some >result{r(1),r(2)...r(m)}. > > |-------------------------------------| > | Role really cared result | > |-------------------------------------| > | | | | > v v v v > r(1) r(2) ... r(m) > >There are some knowledge: r(x) can be achieved by a list of >f(a),f(b)..,f(t) in some context c(j),c(k),...,c(l). Maybe some users >have this knowledge and sometimes care a part of them. But no one wants >to give whole list. >Whole picture like this, > > |-------------------------------------| > | Role really cared result | > |-------------------------------------| > | | | | > v v v v > r(1) r(2) ... r(m) > |-------------------| > O c(1)<--| | > - - + - - | context | > + c(2)<--| | > / \ | | > c(p)<--| | > |--------------------| > f(1) f(2) ... f(n) > ^ ^ ^ ^ > | | | | > |----------------------------------------| > | current system operation | > |----------------------------------------| > >Pure intent is r(x) only; >Impure intent is r(x)+c(y)+f(z). f(z) is part of list of f(a),f(b)..,f(t) >Non intent is list of f(a),f(b)..,f(t). This is prescriptive way. > >Yinben > >-----邮件原件----- >发件人: Ibnemo [mailto:ibnemo-bounces@ietf.org] 代表 Bert Wijnen (IETF) >发送时间: 2015年6月5日 2:56 >收件人: Susan Hares; Zhoutianran; 'Natale, Bob'; zhangyali (D); 'PEDRO >ANDRES ARANDA GUTIERREZ'; nfvrg@irtf.org >抄送: draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org >主题: Re: [Ibnemo] Defining a Common Model for intent > >It may be jsut me, but adding "pure" intent and "impure" intent and >jetstreams etc, it does just become more vague for me. > >See also inline > >On 04/06/15 20:41, Susan Hares wrote: >> >> Tianran/ Terrence: >> >> Instinctively, I believe that role-based intent provides an ability to >> define and classify intent. I know how to identify the role >> relationships, and the actions between roles. However, I still do not >>really understand classify the relationship between intent and roles. >> >> My concern is that we are looking at general system theory where >>certain things are first order changes and other things are >> second-order changes. A first order change is like the wind blowing. >>A second order change is when the upper atmosphere jet >> stream changes causing a whole shift in weather patterns. >> >> If we classify intent by roles, will we find that roles are the “jet >> stream” that pushes a lot of intent. Or will we find some “pure” >>intent classes are the jet stream that pushes a lot of intent or “jet >>stream” ? >> >I cannot make heads or tails from that sentence. Again, it may be just me. > >Bert >> >> Best wishes, >> >> Sue >> >> *From:*Zhoutianran [mailto:zhoutianran@huawei.com] >> *Sent:* Thursday, June 04, 2015 2:36 AM >> *To:* Natale, Bob; Susan Hares; zhangyali (D); 'PEDRO ANDRES ARANDA >> GUTIERREZ'; nfvrg@irtf.org >> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org >> *Subject:* RE: [Ibnemo] Defining a Common Model for intent >> >> Hi Bob and Sue, >> >> The role based intent gives the methodology to define and classify >> intent. I think both Bob and me realize the identifying roles is >>important. And yes, it’s on the top. >> >> Of course, intent need to be implemented. We can do this compilation >> layer by layer, i.e., like policy continuum, from goal to fitness to >> ECA to …. By the way, it seems in policy continuum, everything is >>policy, and an intent can be compiled by policies all the way to device >>instructions. Please correct me if it is not. >> >> My idea is: >> >> On one hand, I would like a flat intent expression with many ways for >>both pure intent and the constrained intent. >> >> On the other hand, I think the intent can be implemented by many >> existing layered functions like the figure I showed. And a cross layer >>design will make the intent implementation more flexible. >> >> I am not going to create concepts but an operational solution. I think >> policy continuum is an option for intent implementation, but it’s not >>mandatory cannot escape. >> >> Best Regards, >> >> Terence >> >> *From:*Natale, Bob [mailto:RNATALE@mitre.org] >> *Sent:* Wednesday, June 03, 2015 10:45 PM >> *To:* Zhoutianran; Susan Hares; zhangyali (D); 'PEDRO ANDRES ARANDA >> GUTIERREZ'; nfvrg@irtf.org <mailto:nfvrg@irtf.org> >> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org >> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org >> <mailto:ibnemo@ietf.org> >> *Subject:* RE: [Ibnemo] Defining a Common Model for intent >> >> Hi Terence, >> >> As Bert has noted on a related thread today, it is sensible to focus on >>intent expression at the “top” layer first. >> >> However, work on that should be cognizant of two things: >> >> - Who/what are the intended consumers of such expressions? >> >> - What is the “distance” from the top level intent expressions to >>executable actions that affect network behavior? >> >> Those two things are interrelated and captured in the policy continuum >> concept and construct … you can conceptualize them differently, >> resulting in different constructs, and that is fine … but you cannot >>escape them. Any attempt to escape them will result, at best, in a >>beautiful language that will never be spoken in an operational context. >> >> Avanti, >> >> BobN >> >> *From:*Ibnemo [mailto:ibnemo-bounces@ietf.org] *On Behalf Of >> *Zhoutianran >> *Sent:* Wednesday, June 03, 2015 5:19 AM >> *To:* Natale, Bob; Susan Hares; zhangyali (D); 'PEDRO ANDRES ARANDA >> GUTIERREZ'; nfvrg@irtf.org <mailto:nfvrg@irtf.org> >> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org >> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org >> <mailto:ibnemo@ietf.org> >> *Subject:* Re: [Ibnemo] Defining a Common Model for intent >> >> Hi Bob, >> >> I agree with you that the intent expression is the first important >>step. And that’s what we are going to do. >> >> I think in this discussion group we will focus on the top layer >> intent. As I posted in the email on the “role based intent”, there >> will be only one intent layer and I do not think the “policy continuum” >>works or necessarily applied here. In contrast I would like a flat >>intent expression with many ways for both pure intent and the >>constrained intent. >> >> Regards, >> >> Terence >> >> *From:*Ibnemo [mailto:ibnemo-bounces@ietf.org] *On Behalf Of *Natale, >> Bob >> *Sent:* Wednesday, June 03, 2015 1:15 PM >> *To:* Susan Hares; zhangyali (D); 'PEDRO ANDRES ARANDA GUTIERREZ'; >> nfvrg@irtf.org <mailto:nfvrg@irtf.org> >> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org >> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org >> <mailto:ibnemo@ietf.org> >> *Subject:* Re: [Ibnemo] RE: Defining a Common Model for intent >> >> Hi Sue, >> >> Yes, the Formal Model paper is a very good source, but should be >>augmented with a few others for a more complete understanding. >> >> And it is very important to note that the policy continuum is not >> _/my/_ model … it is (to the best of my knowledge) John Strassner’s >> creation and I generally recommend Chap. 9, Examples of Using the >>Policy Continuum, in his book on /Policy-Based Network Management: >>Solutions for the Next Generation/ (2004) as an essential source. >> >> [Apologies for possibly rambling a bit in what follows … I am not an >> active contributor and I hate to take up the time of those who are >> just because I have a few minutes to post, but since Sue asked….] >> >> I would note that the specific layer labels used in the policy >> continuum literature should not be considered absolute … i.e., other >> formulations (with more or (ideally) fewer layers) are possible, with >>different labels, denoting (e.g.) some domain-, marketplace-, or >>business model-specificity. >> >> The key issue is the number and nature of the translations necessary >> from a statement of intent at the “top” layer to a set of actions at >> the “bottom” layer that serve to realize the intent. In John’s policy >> continuum the top layer is the “Business” layer and we might see >> policy expressions like “Optimize traffic flows for fairness to all >> active users” or “Optimize traffic flows for priority based on user >> account type” (e.g., the proverbial Platinum, Gold, Silver, Bronze >> casting). Those are deliberately stark examples … in reality, the >>Business layer promulgates enormous numbers of policies often >>overlapping and “frictional” … but take either stark example and >>consider how many translations it would take to result in a conforming >>set of actions in large-scale network of diverse devices, services, >>protocols, (and a very large) etc. In current technology (and for the >>foreseeable future, at my age at least!) at some point such statements >>of intent from the Business layer have to get translated to E-C-A type >>rules. >> >> I recognize an intent-based policy expression by its distance from a >> set of expression (usually “rules”) that execute actions that realize >> the outcome stated in the intent-based expression. In that view, it’s >> not an absolute (i.e., the diverse views of the Policy Continuum hold) >> and it’s also possible to envision cases where expressions of intent >>can be “directly” implemented by a resource or set of resources. SDN is >>a step in the direction of (1) reducing the number of translations >>necessary for a large class of intent-based policy expressions and (2) >>virtualizing the implementation actions from the perspective of the >>“upper” >> layers of the policy continuum (or continua). >> >> So, SDN and the ecosystem of changes around it represent a big >> opportunity to make progress on rationalizing policy management across >>the layers of the policy continuum. A necessary first step is having >>useful standards for policy-expressions from the “top” >> layer – and they typically talk in intent-based policy expressions >>there. >> >> Btw, I presume that IBNemo* contributors are also following John’s >> work in the SUPA area as well … very important that these efforts are >>totally complementary and synergistic, IMHO. >> >> [* - Is it “IBNemo”, “ibnemo”, “IB-nemo” or something else? … I see it >> written all of those ways, and possibly more....] >> >> Avanti, >> >> BobN >> >> *From:*Susan Hares [mailto:shares@ndzh.com] >> *Sent:* Tuesday, June 02, 2015 6:26 PM >> *To:* Natale, Bob; 'zhangyali (D)'; 'PEDRO ANDRES ARANDA GUTIERREZ'; >> nfvrg@irtf.org <mailto:nfvrg@irtf.org> >> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org >> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org >> <mailto:ibnemo@ietf.org> >> *Subject:* RE: [Ibnemo] RE: Defining a Common Model for intent >> >> Bob: >> >> Thank you for The Policy Continuum – A Formal Model (Steven Davy , >> Brendan Jennings and John Strassner). Is this the one you stated we >>should read? >> >> http://www.tssg.org/files/archives/2007_MACE_SDavy_Jennings_final.pdf >> >> Davy, Jenning and Strassner. In this continuum it suggests there are >> descending levels at: business, system (device and technology >> independent), administrator (device independent, technology dependent), >>device (device and technology specific), and instance (specific MIB, >>PIB, and CLI). The system level is what Yali and Yinben have talked >>about when they speak about a >> connection from London to Beijing. The administrator is a level of an >>L3VPN network with many devices. I have suggested a few >> more layers that related in a gap analysis for I2NSF. These layer >>match what the IETF is doing in the yang modules. >> >> +--------------------------------------------+ >> >> |Application Network Wide: Intent | >> >> +--------------------------------------------+ >> >> |Network-wide level: L3SM L3VPN service model| >> >> +--------------------------------------------+ >> >> |Device level: Protocol Independent: I2RS | >> >> | RIB, Topology, Filter-Based RIB | >> >> +--------------------------------------------+ >> >> |Device Level: Protocol Yang modules | >> >> | (ISIS, OSPF, BGP, EVPN, L2VPN, L3VPN, etc.)| >> >> +--------------------------------------------+ >> >> | Device level: IP and System: NETMOD Models | >> >> | (config and oper-state), tunnels | >> >> +--------------------------------------------+ >> >> Did I understand your policy continuum? >> >> The policy continuum paper states three axioms: >> >> “1) A policy may exist at any level of the continuum without the >> requirement of being associated to policies at other continuum levels. >> >> 2) A policy may reference a set of lower level policies. >> >> 3) A policy may be associated to more than one higher level policy” >> >> Can you explain your comment: >> >> “the “need” for multiple intermediate E-C-A translations at multiple >> layers of the policy continuum has heretofore been a major impediment >>to progress on policy-based management, IMHO.” >> >> Does this come out of the formal language in the paper? >> >> Sue >> >> *From:*Natale, Bob [mailto:RNATALE@mitre.org] >> *Sent:* Tuesday, June 02, 2015 1:25 AM >> *To:* zhangyali (D); PEDRO ANDRES ARANDA GUTIERREZ; Susan Hares; >> nfvrg@irtf.org <mailto:nfvrg@irtf.org> >> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org >> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org >> <mailto:ibnemo@ietf.org> >> *Subject:* RE: [Ibnemo]RE: Defining a Common Model for intent >> >> With all due respect: >> >> 1. I would recommend that anyone working on this topic, if he/she has >>not done so already, understand the “policy continuum” >> construct … a web search for ‘"policy continuum" Strassner’ will >> identify a good set of sources to start from for the network management >>domain. >> >> 2. Intents are statements of objectives or goals … they tend to >> originate at the “higher” levels of the policy continuum … at some >> point (at “lower” layers of the policy continuum) they are translated >>to E-C-A type rules (more deterministic than intents) for execution … >>much normally happens in between. >> >> 3. Designing solutions that minimize the number of translations >> between the statement of intent and the execution rules is essential .. >>and _/possibly/_ enabled by contemporary technologies via which “higher” >>layer intents can be translated to “lower” >> layer intents before hitting the ultimate E-C-A execution layer. This >>is a highly speculative statement on my part. But the “need” >> for multiple intermediate E-C-A translations at multiple layers of the >> policy continuum has heretofore been a major impediment to progress on >>policy-based management, IMHO. >> >> The “with all due respect” aspect refers to the fact that the work >> that the active contributors to this thread are doing is very positive >>even if none of my comments are acted upon. >> >> Avanti, >> >> BobN >> >> *From:*Ibnemo [mailto:ibnemo-bounces@ietf.org] *On Behalf Of >> *zhangyali (D) >> *Sent:* Monday, June 01, 2015 11:52 PM >> *To:* PEDRO ANDRES ARANDA GUTIERREZ; Susan Hares; nfvrg@irtf.org >> <mailto:nfvrg@irtf.org> >> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org >> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org >> <mailto:ibnemo@ietf.org> >> *Subject:* [Ibnemo] 答复: Defining a Common Model for intent >> >> Hi Pedro, >> >> Thanks for reviewing the draft and giving modification. >> >> The question you have mentioned is a very important point for the >> abstraction of intent model. Maybe we can propose the transport market >>as a analogy. >> >> 1.A customer wants to transport his goods from A to B. So his intent >> is getting his goods from A to B without carrying about how to do it. >>Then his intent is transferred to the transportation system. >> >> 2.This system analyzes customer’s requirement, and choose a suitable >> way to complete the requirement. For example, the system choose truck >>as the means. So the intent of transportation system is transferring the >>goods with truck. >> >> 3.The driver of this truck analyze the path from A to B, and choose a >> most appropriate path to complete this order which will save more >> time. So the intent of driver may be transferring the goods with the >>least time. Then the driver will start the engine, step on the gas, etc. >> >> From this analogy, the ultimate effect is the same, namely, transfer >> the goods from A to B. But the specific intent of different roles has >> some differences which depends on user’ role, knowledge, >>responsibility, etc. For example, transportation system is responsible >>for transporting goods, and he know the various ways. So he can form his >>intent by rendering the upper customer’s intent. >> >> Supposing we divide users into different layers according to the >> implementation series, users in upper layer expresses his intent as >> /what/ he want without having the knowledge about /how/ to do it. Then >> the /how/ procedure will be transferred to /what /in the lower layer >>according to knowledge and context. These transfer procedure lead to the >>completion of requirement. Same with the example in draft. Although the >>ultimate effect is same, the focus is different which will bring out the >>differentiation of intent. >> >> This is just my immature opinion about intent. Do you think the >> differentiation of intent to complete the same thing is important and >>reasonable? >> >> Best Regards, >> >> Yali >> >> *发件人**:*PEDRO ANDRES ARANDA GUTIERREZ >> [mailto:pedroa.aranda@telefonica.com] >> *发送时间:* 2015年6月1日 17:15 >> *收件人:* Susan Hares; nfvrg@irtf.org <mailto:nfvrg@irtf.org> >> *抄送:* draft-xia-ibnemo-icim@tools.ietf.org >> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org >> <mailto:ibnemo@ietf.org> >> *主题:* Re: [Ibnemo] Defining a Common Model for intent >> >> Hi, >> >> A small clarification proposal for draft >>https://datatracker.ietf.org/doc/draft-xia-ibnemo-icim/. >> >> In section 2.4, I would leave the following as a paragraph >> >> For example, in the network area the intent of end-users could be safe >> connectivity between two sites which a technology independent and >> device independent requirement. For business-based network designers, >> the network connectivity can be selected which is device- independent >> but technology specific. An example of the business-based technology >> is the L3VPN. >> And change: >> For network administrators, intent can be specific operations on a set >> of devices such as configuring IP addresses on network servers in a >> data center. >> >> To >> >> For network administrators, intent can be <new>defining a network >>topology like a router connected to a firewall, connected to a load >>balancer and this to two L2 networks where WWW servers sit or specifying >>the</new> operations on a set of devices such as configuring IP >>addresses on network servers in a data center. >> >> Rationale behind this is again, that intent should be anything that is >>invariant and that expresses/what/ a network operator/administrator may >>need to do, as opposed to/how/ he would do that, i.e. The router is a >>HW device from vendor X or a virtual machine running a specific routing >>daemon over a given data-path implementation. >> Best, /PA >> >> --- >> >> Dr. Pedro A. Aranda Gutiérrez >> >> Technology Exploration - >> >> Network Innovation & Virtualisation >> >> email: pedroa d0t aranda At telefonica d0t com >> >> Telefónica, Investigación y Desarrollo >> >> C/ D. Ramón de la Cruz,84 >> >> 28006 Madrid, Spain >> >> Fragen sind nicht da, um beantwortet zu werden. >> >> Fragen sind da, um gestellt zu werden. >> >> Georg Kreisler >> >> ---------------------------------------------------------------------- >> -------------------------------------------------------------- >> >> >> Este mensaje y sus adjuntos se dirigen exclusivamente a su >> destinatario, puede contener información privilegiada o confidencial y >> es para uso exclusivo de la persona o entidad de destino. Si no es >> usted. el destinatario indicado, queda notificado de que la lectura, >>utilización, divulgación y/o copia sin autorización puede estar >>prohibida en virtud de la legislación vigente. Si ha recibido este >>mensaje por error, le rogamos que nos lo comunique inmediatamente por >>esta misma vía y proceda a su destrucción. >> >> The information contained in this transmission is privileged and >> confidential information intended only for the use of the individual >> or entity named above. If the reader of this message is not the >> intended recipient, you are hereby notified that any dissemination, >>distribution or copying of this communication is strictly prohibited. If >>you have received this transmission in error, do not read it. Please >>immediately reply to the sender that you have received this >>communication in error and then delete it. >> >> Esta mensagem e seus anexos se dirigem exclusivamente ao seu >> destinatário, pode conter informação privilegiada ou confidencial e é >> para uso exclusivo da pessoa ou entidade de destino. Se não é vossa >> senhoria o destinatário indicado, fica notificado de que a leitura, >> utilização, divulgação e/ou cópia sem autorização pode estar proibida >> em virtude da legislação vigente. Se recebeu esta mensagem por erro, >> rogamos-lhe que nos o comunique imediatamente por esta mesma via e >> proceda a sua destruição >> >> >> >> _______________________________________________ >> Ibnemo mailing list >> Ibnemo@ietf.org >> https://www.ietf.org/mailman/listinfo/ibnemo > >_______________________________________________ >Ibnemo mailing list >Ibnemo@ietf.org >https://www.ietf.org/mailman/listinfo/ibnemo >_______________________________________________ >Nfvrg mailing list >Nfvrg@irtf.org >https://www.irtf.org/mailman/listinfo/nfvrg
- Re: [Ibnemo] 答复: Defining a Common Model for inte… PEDRO ANDRES ARANDA GUTIERREZ
- [Ibnemo] 答复: 答复: Defining a Common Model for inte… zhangyali (D)
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] 答复: 答复: Defining a Common Model for … Susan Hares
- [Ibnemo] 答复: 答复: 答复: Defining a Common Model for … zhangyali (D)
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … PEDRO ANDRES ARANDA GUTIERREZ
- [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model … Xiayinben
- Re: [Ibnemo] 答复: 答复: 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- [Ibnemo] 答复: 答复: 答复: 答复: Defining a Common Model … zhangyali (D)
- [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model … zhangyali (D)
- Re: [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] 答复: 答复: 答复: 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… DIEGO LOPEZ GARCIA
- [Ibnemo] 答复: 答复: 答复: 答复: 答复: Defining a Common Mo… zhangyali (D)
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Natale, Bob
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … PEDRO ANDRES ARANDA GUTIERREZ
- [Ibnemo] 答复: 答复: [Nfvrg] 答复: Defining a Common Mo… Xiayinben
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] 答复: 答复: 答复: 答复: 答复: Defining a Commo… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Gember-Jacobson, Aaron
- [Ibnemo] 答复: [Nfvrg] 答复: 答复: Defining a Common Mo… Xiayinben
- [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model … Xiayinben
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… PEDRO ANDRES ARANDA GUTIERREZ
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Zhoutianran
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … PEDRO ANDRES ARANDA GUTIERREZ
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Bert Wijnen (IETF)
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Sumandra Majee
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares