Re: [nmrg] [External] RE: [NMRG] review of draft-li-nmrg-intent-classification-03.txt

"Bezahaf, Mehdi" <mehdi.bezahaf@lancaster.ac.uk> Thu, 04 June 2020 17:58 UTC

Return-Path: <mehdi.bezahaf@lancaster.ac.uk>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A03B3A0A6E for <nmrg@ietfa.amsl.com>; Thu, 4 Jun 2020 10:58:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=livelancsac.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aKwQtQDmTI3n for <nmrg@ietfa.amsl.com>; Thu, 4 Jun 2020 10:58:40 -0700 (PDT)
Received: from GBR01-CWL-obe.outbound.protection.outlook.com (mail-eopbgr110132.outbound.protection.outlook.com [40.107.11.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7B4A23A0E3D for <nmrg@irtf.org>; Thu, 4 Jun 2020 10:58:32 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=C7M5GE6Px4OsGDJ2LKS++ewSlPZCmamPHgkja8TJsyck6KGfXm/0rZmI0cJEiuj9OOlgZdhXqfp7CHS1aM8zWUB2uMs9iVCb4BA4hHuWmXH5utsD21nwP8i6HtlgL1g4XIQI4IYWJFfuxNdsB0pSt3tKk+HYiA35vh09zpJ9JNX+zTs/NRYcDNCBCdQacYPNDRSXmISbVu1lBenpyOyBH7ruW1+J2RsmcoEUuH8yG3LJbjYRmVC86YmmkU4g3O4ybkYY8uBht8CU18RB4viN+uhOBiH9jZQGTE8ToC8Lm8FFiZrVvuy8RdmP/pSYt2kVoSN6qijmBQtWjU8TTeYtnw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=N4manaaAYAoQPMdWxm6V3KWmuG9b3MbfGX7BzmhItM8=; b=ZiqEuaG7ahPPDSrkQP7RcSG9pAkiUMRz1qBUV2M8M6c8RJM4MTQpzGhG7d8RyJk67VGxONdFD04wuqcxJS2jA8+Gae6g2W7N+kBaMy/UPxx0aHpcVjbwy6H36RZyu/8tD28TMTbqUWHHYqDgQi+c9soOedpB4JYXz3Z3YfRYrswVEyxiHD3Tvo4sj2EgiFToPRvpe+OdvPSn6Jb9kzhtNeVrXIot++YAaYZ0mbbcSD0wVvT/Kg8kP9EmPC6W/v278EesAxkSUFfKPPgFw4ysGcrlPb0uvOjLJob8oQgUpmEHN9b2ssMVSWKD8KrtNuHh/3BFGMoX2nGltVTqVMCZVA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=lancaster.ac.uk; dmarc=pass action=none header.from=lancaster.ac.uk; dkim=pass header.d=lancaster.ac.uk; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=livelancsac.onmicrosoft.com; s=selector2-livelancsac-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=N4manaaAYAoQPMdWxm6V3KWmuG9b3MbfGX7BzmhItM8=; b=v3sng/x3Oa72r/LehWMiYRtcxV5Lg2VKK0yiOyktHueI6MuRGJOEHrg1A8Ddyy4cyd/C6JbhSAefoQ01so8beByhtoR7JulLodnrZ/HiBlOeIPPh3uRxj1/HUFoc9lDLYXWrgJZYSxKhZNqOV5FYFF4CLUd+ga4quyu5gc3bwf4=
Received: from LNXP265MB1513.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:83::16) by LNXP265MB1611.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:79::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3045.17; Thu, 4 Jun 2020 17:58:29 +0000
Received: from LNXP265MB1513.GBRP265.PROD.OUTLOOK.COM ([fe80::6dc1:69bd:ac87:a995]) by LNXP265MB1513.GBRP265.PROD.OUTLOOK.COM ([fe80::6dc1:69bd:ac87:a995%7]) with mapi id 15.20.3066.019; Thu, 4 Jun 2020 17:58:29 +0000
From: "Bezahaf, Mehdi" <mehdi.bezahaf@lancaster.ac.uk>
To: "lichen6@chinatelecom.cn" <lichen6@chinatelecom.cn>, nmrg <nmrg@irtf.org>
CC: draft-li-nmrg-intent-classification <draft-li-nmrg-intent-classification@ietf.org>
Thread-Topic: [External] RE:[nmrg] [NMRG] review of draft-li-nmrg-intent-classification-03.txt
Thread-Index: AQHWM8jojXrv+VATKkWfOVfaXT3GjajIpbYw
Date: Thu, 04 Jun 2020 17:58:29 +0000
Message-ID: <LNXP265MB1513CD852959E00911D097E4A7890@LNXP265MB1513.GBRP265.PROD.OUTLOOK.COM>
References: <2020052709474006652343@chinatelecom.cn>
In-Reply-To: <2020052709474006652343@chinatelecom.cn>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: chinatelecom.cn; dkim=none (message not signed) header.d=none;chinatelecom.cn; dmarc=none action=none header.from=lancaster.ac.uk;
x-originating-ip: [2a00:23c4:a533:eb00:a85b:6aad:dd27:51b]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ab3ef838-389b-49fc-15af-08d808b0e33d
x-ms-traffictypediagnostic: LNXP265MB1611:
x-microsoft-antispam-prvs: <LNXP265MB16117068D475DF344EF46C8BA7890@LNXP265MB1611.GBRP265.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 04244E0DC5
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: unfCS6pS12TLo2HqeAsRUHKztVJ65aho8xs+zG/aK/oZeWtbKqZA2NJDXPxUC448v1UoN506hfh8Up5jK2cfk03M5LmEZ4TTjJHlJdXIdHbVyqxSSCSi4NW0o0wqzVSwrqosIzIrWAqOcLSXmrpujsv10PrFgcr0N9GDKC9mVzsdveIjIdB6eMKXnHCw3bWvTcGcNGiAeXCu0IaVRN4unrQE7Pths+Wsx62mOo1OnZwD3ggbDksi078IWVDXzlP430HQbS8dH4z6cxKN0V85D8+4nTz4SH7RZTyMBFfcn2ckRZmiMTgGJzyLdIwwzUEt
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:LNXP265MB1513.GBRP265.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(346002)(396003)(366004)(376002)(136003)(39860400002)(4326008)(8676002)(6506007)(316002)(66946007)(66556008)(7696005)(5660300002)(64756008)(8936002)(66446008)(66476007)(33656002)(52536014)(86362001)(76116006)(55016002)(53546011)(110136005)(186003)(9686003)(71200400001)(478600001)(786003)(2906002)(30864003)(83380400001)(579004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_LNXP265MB1513CD852959E00911D097E4A7890LNXP265MB1513GBRP_"
MIME-Version: 1.0
X-OriginatorOrg: lancaster.ac.uk
X-MS-Exchange-CrossTenant-Network-Message-Id: ab3ef838-389b-49fc-15af-08d808b0e33d
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Jun 2020 17:58:29.2153 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 9c9bcd11-977a-4e9c-a9a0-bc734090164a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: YCx5aJ8e8ADFat7ZesKevXMyT3HSRDtiCys0DQ6AoJaR2HYsp2+hpRbUB7W6B7Y7vEShVsIvFpdnLitSpK/qBMOCUyd/b9VLssQeuRAyvUs=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: LNXP265MB1611
Archived-At: <https://mailarchive.ietf.org/arch/msg/nmrg/7Kbd1pwZ44zUQPcZt1RhSC2CZLE>
Subject: Re: [nmrg] [External] RE: [NMRG] review of draft-li-nmrg-intent-classification-03.txt
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Jun 2020 17:58:45 -0000

Dear Chen,

First of all, I want to thank the authors for their detailed reply to my comments (sorry if I sounded harsh, it is not my purpose) and support the adoption of the current draft.

Please find below more questions/remarks for the next round ☺

All the best,

Mehdi

•         Section 3.3
•         The title of this section is "current problems and requirements".. I wouldn't say 'problems' as it is defined in this section but more as possible improvement or intent benefits! I guess there are still some technical people that they want/need to use APIs/CLI to fix/access/interact with the system on specific issues!

The manual errors (and downtime cause by them) & cost (OPEX)/time needed to configure new services / network as a result of complex imperative Network APIs is one of the core problems identified by Service Providers. Also, it will not be possible for humans to manually make decisions in the future networks and comprehend the impact of any manual changes on the existing users, applications and services.

I completely agree with you that misconfiguration by the human being is one of the core problems. It might be true that in the future, humans will not be able to manually configure the whole network. But the title of the section is ``current problems``, and I think the word ``problems`` is maybe too strong for how the section is written. Most of the App developers or network engineers currently interact with the network manually due to the lack of automation. This is why I think that a title like Intent`s benefits or possible improvements fit better this section`s text.


•         Section 5.1
•         The figure in this section is a bit confusing! Does the classification process follow this order (R1-U1, R2-U2,…..)? I think this picture can be deleted!

This is the core picture that we added to explain the methodology for intent classification, based on previous draft comments. We can try in the next version to improve the description and the appearance of the diagram, but we believe the problem is in the txt version. We previously shared a ppt document with the picture, we will send the latest ppt slides to you as well.

I think it will be a good idea to describe (in the text) the steps of the classification process and define if there is an order in the actions.

I am sorry to ask this question but are we talking about classifying an existing intent (it is already implemented) or an intent that we want to implement, so we look to its classification to have a better idea of how to implement it?

The Intent classification methodology takes as an input the solution knowledge, which is described as the knowledge about solution requirements, targeted use cases, available technologies and networks, actors, and the intent requirements. I think the solution knowledge needs to be better introduced and how do we obtain it. It is even confusing to have as an input, for example, the actors (described in Section 4.2 as the intent user type) and later on in your classification process identify intent user types (R2-U2)!! Definitively, section 5.1 needs clarification.

Solution requirements, lifecycle requirements and intent requirements are not clearly defined. Intent requirements and solution requirements are used as an input to the classification methodology but how can they be expressed/obtained..

Tables in 5.3.2, 5.4.2, 5.5.2 need to be filled right?


Mehdi Bezahaf, PhD
Senior Research Associate
D31, InfoLab21
School of Computing & Communications
Lancaster University
+44 (0) 1524 510384


From: lichen6@chinatelecom.cn <lichen6@chinatelecom.cn>
Sent: Wednesday, May 27, 2020 2:48 AM
To: Bezahaf, Mehdi <mehdi.bezahaf@lancaster.ac.uk>; nmrg <nmrg@irtf.org>
Cc: draft-li-nmrg-intent-classification <draft-li-nmrg-intent-classification@ietf.org>
Subject: [External] RE:[nmrg] [NMRG] review of draft-li-nmrg-intent-classification-03.txt


This email originated outside the University. Check before clicking links or attachments.
Dear Mehdi,

Thank you very much for your comments. Please see the replies below. We propose to address in the next version of the document those comments with reply “Added to the list of updates for the next version”. For others, we added some clarification – please let us know if you need additional clarification.

Best Regards,
Chen

________________________________
李  晨  Li Chen
中国电信战略与创新研究院 战略与规划研究所 网络规划中心
电话:010-50902891/18910853955
邮箱:lichen6@chinatelecom.cn/18910853955@chinatelecom.cn<mailto:lichen6@chinatelecom.cn/18910853955@chinatelecom.cn>
只为成功找方法,不为失败找借口
==============================
Chen  Li
Network Evolution and Planning Center
Network Technology & Planning Department
Email:lichen6@chinatelecom.cn<mailto:lichen6@chinatelecom.cn> /18910853955@chinatelecom.cn<mailto:/18910853955@chinatelecom.cn>
Tel: +86-10-50902891
Mobile: +86-18910853955

From: nmrg [mailto:nmrg-bounces@irtf.org] On Behalf Of Bezahaf, Mehdi
Sent: Friday, May 15, 2020 1:05 AM
To: nmrg@irtf.org<mailto:nmrg@irtf.org>
Subject: [nmrg] [NMRG] review of draft-li-nmrg-intent-classification-03.txt

Dear all,

I hope this email finds you all safe and sound. Please find below my review of the last version of Draft-li-nmrg-intent-classification-03.txt.

•         Lifecycle or life-cycle, keep it consistent

Added to the list of updates for the next version. We will update it in all places to lifecycle.

•         Add NBI, API, VNF, PNF, AI and GBP to the acronym section

Added to the list of updates for the next version. We will add NBI, API, VNF, PNF, AI, GBP and any other missing acronym to the acronym section.

•         In section 3.1
•         The authors mentioned that "Intent is very often just a synonym for policy". I am sure that the authors meant that for the wider audience confusing intent and policy. Probably need to link this sentence with the one just before it.

Added to the list of updates for the next version. We will link the sentence to the one just before.

•         Section 3.2
•         It is a bit confusing because the authors are talking about intent solutions and they present as an example carrier networks, DC networks, and Enterprise networks, which for me are more as situations, scenarios or contexts than a solution

Added to the list of updates for the next version. We were referring here to what solutions does the Intent Engine support – Carrier Network Solutions, DC Network Solutions, Enterprise Network Solution.
They could be further split and new solutions could be added, through the methodology presented in section 5.1 that can be used for extensions. We will reiterate in the next section that these are the example solutions, and that methodology could be used to extend. It is mentioned later, but may be mentioned here as well for clarity purposes.

•         Does the table cover all the possibilities or just some examples (if it is the case, it needs to be clear in the text)?

Added to the list of updates for the next version. The table covers the starting point for the intent classification. The methodology section 5.1 describes how we can extend for future scenarios. We will update with clarification.

•         I don't agree. I guess if we pick the scenario (carrier networks for example) and a user (network operator), you will probably have different intent types depending on the use-case. What I mean is that just the user and the context does not describe or define the intent type
Could you please refer to what part in Section 3.2 you do not agree with? We do say that we would have different intent types and different use cases for each user. The user requirements and use cases would be the starting point to define what intent types are needed. I am not sure that use case would solely determine intent.
We believe your statement is covered in table 5.3.1, for example. In that table, the scenario is carrier network, and a user can be Customer, and indeed we have different intent types.

•         Section 3.1 and 3.2 are related. If you can pick the actor, the context, and the use case, you can have a clear definition of your intent!
Are there not potentially multiple use cases that can refer to the same intent? For example, the use case 1 can be activating network intent on the network, and use case 2 can be accessing the report for the network intent. Some would consider the action as being intent (activate, view), while others would consider an entity to be intent (network service?). Therefore , we have different categories there that corresponds to both. So, in your case, you will identify only those intent types you consider part of your scope.

•         Section 3.3
•         The title of this section is "current problems and requirements".. I wouldn't say 'problems' as it is defined in this section but more as possible improvement or intent benefits! I guess there are still some technical people that they want/need to use APIs/CLI to fix/access/interact with the system on specific issues!

The manual errors (and downtime cause by them) & cost (OPEX)/time needed to configure new services / network as a result of complex imperative Network APIs is one of the core problems identified by Service Providers. Also, it will not be possible for humans to manually make decisions in the future networks and comprehend the impact of any manual changes on the existing users, applications and services.

•         Section 5.1
•         The figure in this section is a bit confusing! Does the classification process follow this order (R1-U1, R2-U2,…..)? I think this picture can be deleted!

This is the core picture that we added to explain the methodology for intent classification, based on previous draft comments. We can try in the next version to improve the description and the appearance of the diagram, but we believe the problem is in the txt version. We previously shared a ppt document with the picture, we will send the latest ppt slides to you as well.

•         Section 5.2
•         In section 4.2, three different intent user types were defined (customers, App dev, and Management). However, in section 5.2, the authors mentioned other intent user types such as Network or service operator, Enterprise administrator, cloud administrator, underlay network administrator. There is a difference between intent user and intent user type.


 Added to the list of updates for the next version. We are talking about user types and not users.
In 4.2 we do mention that network operators are a type of management personnel.
We will update to make this explicit and consistent everywhere , by updating or moving 4.2 to 3.2.

•         Section 5.3.1
•         In the first table, the authors duplicated some entries twice (probably by mistake).

Added to the list of updates for the next version. Thanks for the comments, it seems that the last version of formatting somehow ended up with duplicated rows.

•         In section 3.4, the authors define a list of intent types that should be supported but in section 5.3.1, 5.4.1, and 5.5.1 new intent types are defined such as "strategy intent".

Added to the list of updates for the next version. Thanks for this, we would add strategy intent into the intent types in section 3.4 as well.

•         Section 6
•         I don't see the point of having this section (at least as it is) in this document. What I mean, is that I cannot see how AI will impact the classification!
•         I don't agree with the authors when they support that intent determined by AI-based will have a format closer to machine language structures than natural language structures to avoid misconception. One way to do it is to have multiple exchanges between the user (human) and the system (the first loop) to be sure about the user request and that the AI-based agent gets the user's intention.

Added to the list of updates for the next version. Our main meaning  in section 6 is : AI could be an aid to the intent classification method, through a large number of interactions between the user(humen) and the system(the first loop), extract the key feature values of the intent to help the intent classification . In the next update, we will focus on improving this description.





Best Regards,
Mehdi


Mehdi Bezahaf, PhD
Senior Research Associate
D31, InfoLab21
School of Computing & Communications
Lancaster University
+44 (0) 1524 510384

________________________________
李  晨  Li Chen
中国电信战略与创新研究院 战略与规划研究所 网络规划中心
电话:010-50902891/18910853955
邮箱:lichen6@chinatelecom.cn/18910853955@chinatelecom.cn<mailto:lichen6@chinatelecom.cn/18910853955@chinatelecom.cn>
只为成功找方法,不为失败找借口
==============================
Chen  Li
Network Evolution and Planning Center
Network Technology & Planning Department
Email:lichen6@chinatelecom.cn<mailto:lichen6@chinatelecom.cn> /18910853955@chinatelecom.cn<mailto:/18910853955@chinatelecom.cn>
Tel: +86-10-50902891
Mobile: +86-18910853955