[nmrg] Will's review for draft-clemm-nmrg-dist-intent-02, 1st part

"Liushucheng (Will Liu)" <liushucheng@huawei.com> Sat, 20 July 2019 01:59 UTC

Return-Path: <liushucheng@huawei.com>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 42A3F120108 for <nmrg@ietfa.amsl.com>; Fri, 19 Jul 2019 18:59:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level:
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qtdF9nFS8Dzm for <nmrg@ietfa.amsl.com>; Fri, 19 Jul 2019 18:59:19 -0700 (PDT)
Received: from huawei.com (szxga08-in.huawei.com [45.249.212.255]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 58D23120130 for <nmrg@irtf.org>; Fri, 19 Jul 2019 18:59:19 -0700 (PDT)
Received: from DGGEML402-HUB.china.huawei.com (unknown [172.30.72.55]) by Forcepoint Email with ESMTP id DABAF854B5F32214C06F for <nmrg@irtf.org>; Sat, 20 Jul 2019 09:59:15 +0800 (CST)
Received: from DGGEML529-MBX.china.huawei.com ([169.254.6.87]) by DGGEML402-HUB.china.huawei.com ([fe80::fca6:7568:4ee3:c776%31]) with mapi id 14.03.0439.000; Sat, 20 Jul 2019 09:59:12 +0800
From: "Liushucheng (Will Liu)" <liushucheng@huawei.com>
To: "draft-clemm-nmrg-dist-intent@ietf.org" <draft-clemm-nmrg-dist-intent@ietf.org>
CC: "nmrg@irtf.org" <nmrg@irtf.org>
Thread-Topic: Will's review for draft-clemm-nmrg-dist-intent-02, 1st part
Thread-Index: AdU+MqD1k4t1oUQVQd6/MA+GStxWVQ==
Date: Sat, 20 Jul 2019 01:59:11 +0000
Message-ID: <C9B5F12337F6F841B35C404CF0554ACB8BE72907@dggeml529-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.45.87.176]
Content-Type: multipart/alternative; boundary="_000_C9B5F12337F6F841B35C404CF0554ACB8BE72907dggeml529mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/nmrg/CoyjtuTqJiKg7Pa7muUfvddLv28>
Subject: [nmrg] Will's review for draft-clemm-nmrg-dist-intent-02, 1st part
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sat, 20 Jul 2019 01:59:23 -0000

Hi,

I took some time to read and learn -02 version, which updated a lot of content from -01. I have below comments and questions:

Section 4.2.3
>   Summarized differences:
…
>   o  Policy is a set of rules, typically modeled around a variation of
>      events/conditions/actions, used to express simple control loops
>      that can be rendered by devices themselves, without requiring
…
>   o  Intent is a higher-level declarative policy that operates at the
>      level of a network and services it provides, not individual
>      devices.  It is used to define outcomes and high-level operational


IMOH, these “summarized differences” may be still not clear enough as if we simplify these two sentences and put together, “policy is xxx rules, intent is xxx policy”. In SUPA we defined two types of policy, imperative policy(ECA) and declarative policy (Intent policy).

In this doc, if intent policy is one kind of policy, you may need to change the definition of policy. In addition, service may also be expressed in an “intent” way, like “service intent” at the end of this draft. If intent is going to be defined as a kind of policy, then shall we put “service intent” as a subset of policy?


>   One analogy to capture the difference between policy and intent
>   systems is that of Expert Systems and Learning Systems in the field
>   of Artificial Intelligence...

From the description I know authors wanted to use analogy to describe the relationship, however, may lead to even more confusing if we compare policy - expert system vs intent - learning system.


Section 5
>       Single Source of Truth (SSoT) and Single Version/View of Truth
>       (SVoT).

The paragraph of SSoT and SVoT was new, however, is this necessary principle as there was no related info in the two figures in section 6 and other parts of the doc.

>   2.  One touch but not one shot.  In an ideal intent-based system, the
>       user expresses its intents in one form or another and then the
>       system takes over all subsequent operations (one touch).  A zero-
>       touch approach could also be imagined in case where the intent-
>       based system has the capabilities or means to recognize
>       intentions in any form of data.  However, the zero- or one-touch
>       approach should not be mistaken the fact that reaching the state
>       of a well-formed and valid intent expression is not a one-shot
>       process.  On the contrary, the interfacing between the user and
>       the intent-based system could be designed as an interactive and
>       interactive process.  Depending on the level of abstraction, the


“One touch but not one shot”, I can guess the meaning. However, as a non-native speaker, I am not sure  as I searched in google there is no other article writing in this way. Is this term invented by this doc? :)
As the concept of ‘zero-touch’ was not defined in this doc or referred to any existing publication, I am not sure why ‘recognize intentions in any form of data’ can support ‘Zero-touch’. And what is the difference between one-touch and zero-touch.


“an interactive and interactive process”, typo?

>   3. Autonomy and Oversight.  A desirable goal for an intent-based
>       system is to offer a high degree of flexibility and freedom on
…
>      to be added: description for feedback, reporting,
>       guarantee scope (check points, guard rails, dynamically
>       provisioned, context rich, regular operation vs. exception/
>       abnormal, information zoom in-out, and link to SVoT…

“to be added…”, I guess this part is editor note?


>   5.  Explainability.  Need expressive network capabilities,
>       requirements and constraints to be able to compose/decompose
>       intents, map user's expectation to system capabilities.
>       capability exposure.  not just automation of steps that need to
>       be taken, but of bridging the semantic gap between "intent" and
>       actionable levels of instructions Context: multi providers, need
>       discovery and semantic descriptions Explainability: why is a
>       network doing what it is doing

This paragraph seem to be difficult to read as some sentences (from third one) are not complete.

I have a couple of comments and questions to the two figures in section 6, and will try to provide in next email.


Regards,  / 致礼!
Will LIU   / 刘树成
----------------------------------------------------------------------------------------------
Shucheng LIU (Will, 刘树成), Ph.D.
Director of Standard Area
Huawei Technologies Co.,Ltd
liushucheng@huawei.com<mailto:liushucheng@huawei.com>
http://www.linkedin.com/in/shucheng
----------------------------------------------------------------------------------------------