rfc9316.original | rfc9316.txt | |||
---|---|---|---|---|
Network Working Group C. Li | ||||
Internet Draft China Telecom | ||||
Intended status: Informational O. Havel | ||||
Expires: November 2022 A. Olariu | ||||
Huawei Technologies | ||||
P. Martinez-Julia | ||||
NICT | ||||
J. Nobre | ||||
UFRGS | ||||
D. Lopez | ||||
Telefonica, I+D | ||||
May 18, 2022 | ||||
Intent Classification | Internet Research Task Force (IRTF) C. Li | |||
draft-irtf-nmrg-ibn-intent-classification-08 | Request for Comments: 9316 China Telecom | |||
Category: Informational O. Havel | ||||
ISSN: 2070-1721 A. Olariu | ||||
Huawei Technologies | ||||
P. Martinez-Julia | ||||
NICT | ||||
J. Nobre | ||||
UFRGS | ||||
D. Lopez | ||||
Telefonica, I+D | ||||
October 2022 | ||||
Intent Classification | ||||
Abstract | Abstract | |||
Intent is an abstract, high-level policy used to operate the network. | Intent is an abstract, high-level policy used to operate a network. | |||
Intent-based management system includes an interface for users to | An intent-based management system includes an interface for users to | |||
input requests and an engine to translate the intents into the | input requests and an engine to translate the intents into the | |||
network configuration and manage their life-cycle. | network configuration and manage their life cycle. | |||
This document discusses mostly the concept of network intents, but | This document mostly discusses the concept of network intents, but | |||
other types of intents are also being considered. Specifically, it | other types of intents are also considered. Specifically, this | |||
highlights stakeholder perspectives of intent, methods to classify | document highlights stakeholder perspectives of intent, methods to | |||
and encode intent, the associated intent taxonomy, and defines | classify and encode intent, and the associated intent taxonomy; it | |||
relevant intent terms where necessary. This document provides a | also defines relevant intent terms where necessary, provides a | |||
foundation for intent related research and facilitates solution | foundation for intent-related research, and facilitates solution | |||
development. | development. | |||
This document is a product of the IRTF Network Management Research | This document is a product of the IRTF Network Management Research | |||
Group (NMRG). | Group (NMRG). | |||
Status of this Memo | Status of This Memo | |||
This Internet-Draft is submitted in full conformance with the | ||||
provisions of BCP 78 and BCP 79. | ||||
Internet-Drafts are working documents of the Internet Engineering | This document is not an Internet Standards Track specification; it is | |||
Task Force (IETF). Note that other groups may also distribute | published for informational purposes. | |||
working documents as Internet-Drafts. The list of current Internet- | ||||
Drafts is at http://datatracker.ietf.org/drafts/current/. | ||||
Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Research Task Force | |||
and may be updated, replaced, or obsoleted by other documents at any | (IRTF). The IRTF publishes the results of Internet-related research | |||
time. It is inappropriate to use Internet-Drafts as reference | and development activities. These results might not be suitable for | |||
material or to cite them other than as "work in progress." | deployment. This RFC represents the consensus of the Network | |||
Management Research Group of the Internet Research Task Force (IRTF). | ||||
Documents approved for publication by the IRSG are not candidates for | ||||
any level of Internet Standard; see Section 2 of RFC 7841. | ||||
This Internet-Draft will expire on November 18, 2022. | Information about the current status of this document, any errata, | |||
and how to provide feedback on it may be obtained at | ||||
https://www.rfc-editor.org/info/rfc9316. | ||||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2022 IETF Trust and the persons identified as the | Copyright (c) 2022 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
to this document. Code Components extracted from this document must | to this document. | |||
include Simplified BSD License text as described in Section 4.e of | ||||
the Trust Legal Provisions and are provided without warranty as | ||||
described in the Simplified BSD License. | ||||
Table of Contents | Table of Contents | |||
1. Introduction...................................................4 | 1. Introduction | |||
1.1. Research activities..........................................4 | 1.1. Research Activities | |||
1.2. Standards and open source activities.........................5 | 1.2. Standards and Open-Source Activities | |||
1.3. Scope........................................................6 | 1.3. Scope | |||
2. Acronyms.......................................................7 | 2. Abbreviations | |||
3. Definitions....................................................8 | 3. Definitions | |||
4. Abstract Intent Requirements...................................8 | 4. Abstract Intent Requirements | |||
4.1. What is Intent?..............................................8 | 4.1. What is intent? | |||
4.2. Intent Solutions and Intent Users............................9 | 4.2. Intent Solutions and Intent Users | |||
4.3. Benefits of Intents for Different Stakeholders..............11 | 4.3. Benefits of Intents for Different Stakeholders | |||
4.4. Intent Types that need to be supported......................12 | 4.4. Intent Types That Need to Be Supported | |||
5. Functional Characteristics and Behaviour......................13 | 5. Functional Characteristics and Behavior | |||
5.1. Abstracting Intent Operation................................13 | 5.1. Abstracting Intent Operation | |||
5.2. Intent User Types...........................................14 | 5.2. Intent User Types | |||
5.3. Intent Scope................................................15 | 5.3. Intent Scope | |||
5.4. Intent Network Scope........................................15 | 5.4. Intent Network Scope | |||
5.5. Intent Abstraction..........................................16 | 5.5. Intent Abstraction | |||
5.6. Intent Life-cycle...........................................16 | 5.6. Intent Life Cycle | |||
5.7. Autonomous Driving Levels...................................16 | 5.7. Autonomous Driving Levels | |||
6. Intent Classification.........................................17 | 6. Intent Classification | |||
6.1. Intent Classification Methodology...........................18 | 6.1. Intent Classification Methodology | |||
6.2. Intent Taxonomy.............................................21 | 6.2. Intent Taxonomy | |||
6.3. Intent Classification for Carrier Solution..................23 | 6.3. Intent Classification for Carrier Solution | |||
6.3.1. Intent Users and Intent Types.............................23 | 6.3.1. Intent Users and Intent Types | |||
6.3.2. Intent Categories.........................................27 | 6.3.2. Intent Categories | |||
6.3.3. Intent Classification Example.............................27 | 6.3.3. Intent Classification Example | |||
6.4. Intent Classification for Data Center Network Solutions.....31 | 6.4. Intent Classification for Data Center Network Solutions | |||
6.4.1. Intent Users and Intent Types.............................31 | 6.4.1. Intent Users and Intent Types | |||
6.4.2. Intent Categories.........................................35 | 6.4.2. Intent Categories | |||
6.4.3. Intent Classification Example.............................35 | 6.4.3. Intent Classification Example | |||
6.5. Intent Classification for Enterprise Solution...............39 | 6.5. Intent Classification for Enterprise Solution | |||
6.5.1. Intent Users and Intent Types.............................39 | 6.5.1. Intent Users and Intent Types | |||
6.5.2. Intent Categories.........................................41 | 6.5.2. Intent Categories | |||
7. Conclusions...................................................43 | 7. Conclusions | |||
8. Security Considerations.......................................43 | 8. Security Considerations | |||
9. IANA Considerations...........................................43 | 9. IANA Considerations | |||
10. Contributors.................................................44 | 10. Informative References | |||
11. Acknowledgments..............................................44 | Acknowledgments | |||
12. Informative References.......................................44 | Contributors | |||
Authors' Addresses | ||||
1. Introduction | 1. Introduction | |||
The vision of intent-based networks has attracted a lot of attention, | The vision of intent-based networks has attracted a lot of attention | |||
as it promises to simplify the management of networks by human | because it promises to simplify the management of networks by human | |||
operators. This is done by simply specifying what should happen on | operators. This is done by simply specifying what should happen on | |||
the network, without giving any instructions on how to do it. This | the network without giving any instructions on how to do it. This | |||
promise led many researcher-led activities and telecom companies to | promise caused many researcher-led activities and telecom companies | |||
start researching this new vision, and many Standards Development | to start researching this new vision and many Standards Development | |||
Organization (SDOs) to propose different intent frameworks. | Organizations (SDOs) to propose different intent frameworks. | |||
This draft proposes an intent classification methodology and an | This document proposes an intent classification methodology and an | |||
intent taxonomy. The scope of these proposals is to ensure a common | intent taxonomy. The scope of these proposals is to ensure a common | |||
understanding in the research community in terms of what are the | understanding in the research community in terms of what the intent | |||
intent users, intent types, or intent solutions, etc. for specific | users, intent types, or intent solutions, etc., are for specific | |||
scenarios that are being considered. | scenarios that are being considered. | |||
The document represents the consensus of the Network Management | The document represents the consensus of the Network Management | |||
Research Group (NMRG). It has been reviewed extensively by the | Research Group (NMRG). It has been reviewed extensively by the | |||
Research Group (RG) members who are actively involved in the research | Research Group (RG) members who are actively involved in the research | |||
and development of the technology covered by this document. It is not | and development of the technology covered by this document. It is | |||
an IETF product and is not a standard. | not an IETF product and is not a standard. | |||
1.1. Research activities | 1.1. Research Activities | |||
Intent-based networking is an active research topic which spans | Intent-based networking is an active research topic spanning across | |||
across different areas that could benefit from an intent | different areas that could benefit from an intent classification and | |||
classification and taxonomy. | taxonomy. | |||
One such area is intent expression and recognition ([Bezahaf21], | Some examples include: | |||
[Bezahaf19]), NILE [Jacobs18]). The use of a common classification | ||||
can provide consistency in the understanding of the various forms of | ||||
intent expressions being proposed and investigated. | ||||
Another area where this intent classification could contribute is the | * intent expression and recognition ([Bezahaf21], [Bezahaf19], | |||
orchestration of cognitive autonomous RANs [Banerjee21] where intents | [Jacobs18]). The use of a common classification could provide | |||
are classified based on their content. | consistency in the understanding of the various forms of intent | |||
expressions being proposed and investigated. | ||||
The work carried in intent network verification [Tian19] where the | * the orchestration of cognitive autonomous radio access networks | |||
authors are proposing new intent language is another candidate where | (RANs) [Banerjee21] where intents are classified based on their | |||
intent classification could be used advantageously. | content. | |||
Furthermore, this draft is proving itself already extremely relevant | * intent network verification [Tian19], where the authors are | |||
to the research community as it has been used as the basis for | working to propose new intent language. | |||
proposing self-generated Intent-based systems [Bezhaf19], for | ||||
advancing IBN-based VNF placement solutions that rely on defining | Furthermore, this document is already proving to be extremely | |||
user intent profiles corresponding to abstract network services | relevant to the research community as it has been used as the basis | |||
[Leivadeas21], for improving existing solutions in provisioning | for proposing self-generated Intent-based systems [Bezahaf19], for | |||
intent-based networks, and proposing new approaches to service | advancing Virtual Network Function (VNF) placement solutions based on | |||
management [Davoli21], or even for defining grammars for users to | Internet-Based Networks (IBNs) that rely on defining user intent | |||
specify the high-level requirements for blockchain selection in the | profiles corresponding to abstract network services [Leivadeas21], | |||
form of intent [Padovan20]. As well, the draft has been mentioned in | for improving existing solutions in provisioning intent-based | |||
networks, for proposing new approaches to service management | ||||
[Davoli21], and even for defining grammars for users to specify the | ||||
high-level requirements for blockchain selection in the form of | ||||
intent [Padovan20]. As well, the document has been mentioned in | ||||
surveys addressing the topic of intelligent intent-based autonomous | surveys addressing the topic of intelligent intent-based autonomous | |||
networks [Mehmood21], [Szilagyi21]. | networks [Mehmood21] [Szilagyi21]. | |||
This document describes as well an example on how this proposal has | This document also describes an example on how this proposal has been | |||
been successfully applied in an academic environment [IBN-POC] by | successfully applied in an academic environment [POC-IBN] by | |||
researchers in the area of SDN/NFV for defining the scope of their | researchers in the area of Software-Defined Networking / Network | |||
project. The specific problem addressed by researches is how to | Function Virtualization (SDN/NFV) for defining the scope of their | |||
project. The specific problem addressed by researchers is how to | ||||
apply intent concepts at different levels that correspond to | apply intent concepts at different levels that correspond to | |||
different stakeholders. | different stakeholders. | |||
IEEE Communications Society Technical Committee on Network Operation | The IEEE Communications Society Technical Committee on Network | |||
and Management (IEEE-CNOM), IRTF-NMRG and IFIP WG6.6 have developed a | Operation and Management (IEEE-CNOM), IRTF Network Management | |||
taxonomy for network and service management [IFIP-NSM] that is used | Research Group, and IFIP WG6.6 have developed a taxonomy for network | |||
by the research community in network management and operations to | and service management [IFIP-NSM] that is used by the research | |||
structure the research area through a well-defined set of keywords | community in network management and operations to structure the | |||
and to improve quality of reviews in submissions to journals, | research area through a well-defined set of keywords and to improve | |||
conferences and workshops. The proposed intent taxonomy may be | quality of reviews in submissions to journals, conferences, and | |||
contributed as an extension to this taxonomy for intent driven | workshops. The proposed intent taxonomy may be contributed as an | |||
management. | extension to this taxonomy for intent-driven management. | |||
1.2. Standards and open source activities | 1.2. Standards and Open-Source Activities | |||
Several SDOs and open source projects, such as Internet Research Task | Several SDOs and open-source projects, such as the IRTF NMRG, Open | |||
Force (IRTF)/ Network Management Research Group (NMRG), Open | ||||
Networking Foundation (ONF) [ONF] / Open Network Operating System | Networking Foundation (ONF) [ONF] / Open Network Operating System | |||
(ONOS) [ONOS], European Telecommunications Standards Institute | (ONOS) [ONOS], European Telecommunications Standards Institute (ETSI) | |||
(ETSI)/Experiential Networked Intelligence (ENI), TMF with its | / Experiential Networked Intelligence (ENI), and TMF with its | |||
Autonomous Networks, have proposed intents for defining a set of | autonomous networks, have proposed intents for defining a set of | |||
network operations to execute in a declarative manner. | network operations to execute in a declarative manner. | |||
More recently, the IRTF NMRG is working on the Intent-based | More recently, the IRTF NMRG is working on "Intent-Based Networking - | |||
Networking - Concepts and Definitions document, [CLEMM]. This | Concepts and Definitions" [RFC9315]. This document clarifies the | |||
document clarifies the concept of "Intent" and provides an overview | concept of "Intent" and provides an overview of the functionality | |||
of the functionality that is associated with it. The goal is to | that is associated with it. The goal is to contribute towards a | |||
contribute towards a common and shared understanding of terms, | common and shared understanding of terms, concepts, and functionality | |||
concepts, and functionality that can be used as the foundation to | that can be used as the foundation to guide further definition of | |||
guide further definition of associated research and engineering | associated research and engineering problems and their solutions. | |||
problems and their solutions. | ||||
The present document, together with [CLEMM], aims to become the | The present document, together with [RFC9315], aims to become the | |||
foundation for future intent-related topic discussions regarding the | foundation for future intent-related topic discussions regarding the | |||
NMRG. | NMRG. | |||
The SDOs usually came up with their own way of specifying an intent, | The SDOs usually come up with their own way of specifying an intent | |||
and with their own understanding of what an intent is. Besides that, | and their own understanding of what an intent is. Additionally, each | |||
each SDO defines a set of terms and level of abstraction, its | SDO defines a set of terms and level of abstraction, its intent | |||
intended intent users, and the applications and usage scenarios. | users, and the applications and usage scenarios. | |||
However, most intent approaches proposed by SDOs share the same | However, most intent approaches proposed by SDOs share the same | |||
following features: | features: | |||
o It must be declarative in nature, meaning that an intent user | * It must be declarative in nature, meaning that an intent user | |||
specifies the goal on the network without specifying how to achieve | specifies the goal on the network without specifying how to | |||
that goal. | achieve that goal. | |||
o It must be vendor agnostic, in the sense that it abstracts the | * It must be vendor agnostic in the sense that it abstracts the | |||
network capabilities, or the network infrastructure from the intent | network capabilities or the network infrastructure from the intent | |||
user, and it can be ported across different platforms. | user, and it can be ported across different platforms. | |||
o It must provide an easy-to-use interface, which simplifies the | * It must provide an easy-to-use interface, which simplifies the | |||
intent users' interaction with the intent system through the usage | interaction of the intent users with the intent system through the | |||
of familiar terminology or concepts. | usage of familiar terminology or concepts. | |||
It should be able to detect and resolve intent conflicts, which | * It should be able to detect and resolve intent conflicts, which | |||
include, for example, static (compile-time) conflicts and dynamic | include, for example, static (compile-time) conflicts and dynamic | |||
(run-time) conflicts. | (run-time) conflicts. | |||
1.3. Scope | 1.3. Scope | |||
The focus of this document is on the definition of criteria enabling | The focus of this document is on the definition of criteria enabling | |||
to categorize intents from the stakeholders' viewpoint. Concepts and | the categorization of intents from viewpoint of the stakeholders. | |||
definitions related to IBN are provided in [CLEMM]. | Concepts and definitions related to IBN are provided in [RFC9315]. | |||
This document mostly addresses intents in the context of network | This document mostly addresses intents in the context of network | |||
intents, however other types of intents are not excluded, as | intents; however, other types of intents are not excluded, as | |||
presented in section 4.4. and section 6.2. . | presented in Sections 4.4 and 6.2. | |||
It is impossible to fully differentiate intents only by the common | It is impossible to fully differentiate intents only by the common | |||
characteristics followed by concepts, terms and intentions. This | characteristics followed by concepts, terms, and intentions. This | |||
document clarifies what an intent represents for different | document clarifies what an intent represents for different | |||
stakeholders through a classification on various dimensions, such as | stakeholders through a classification on various dimensions, such as | |||
solutions, intent users, and intent types. This classification | solutions, intent users, and intent types. This classification | |||
ensures common understanding among all participants and is used to | ensures common understanding among all participants and is used to | |||
determine the scope and priority of individual projects, proof-of- | determine the scope and priority of individual projects, proof of | |||
concept (PoCs), research initiatives, or open source projects. | concepts (PoCs), research initiatives, or open-source projects. | |||
The scope of intent classification in this document includes | The scope of intent classification in this document includes | |||
solutions, intent users and intent types, and the initial | solutions, intent users, and intent types; the initial classification | |||
classification table is made according to this scope. The | table is made according to this scope. The methodology presented can | |||
methodology presented can be used to update the classification | be used to update the classification tables by adding or removing | |||
tables by adding or removing different solutions, intent users, or | different solutions, intent users, or intent types to cater to future | |||
intent types to cater for future scenarios, applications or domains. | scenarios, applications, or domains. | |||
2. Acronyms | 2. Abbreviations | |||
AI: Artificial Intelligence | AI: Artificial Intelligence | |||
CE: Customer Equipment | CE: Customer Equipment | |||
CFS: Customer Facing Service | CFS: Customer Facing Service | |||
CLI: Command Line Interface | CLI: Command-Line Interface | |||
DB: Database | DB: Database | |||
DC: Data Center | DC: Data Center | |||
ECA: Event-Condition-Action | ECA: Event Condition Action | |||
GBP: Group-Based Policy | GBP: Group-Based Policy | |||
GPU: Graphics Processing Unit | GPU: Graphics Processing Unit | |||
IBN: Intent Based Network | IBN: Intent-Based Network | |||
NFV: Network Function Virtualization | NFV: Network Function Virtualization | |||
O&M: Operations & Maintenance | O&M: OAM & Maintenance | |||
ONF: Open Networking Foundation | ONF: Open Networking Foundation | |||
ONOS: Open Network Operating System | ONOS: Open Network Operating System | |||
PNF: Physical Network Function | PNF: Physical Network Function | |||
QoE: Quality of Experience | QoE: Quality of Experience | |||
RFS: Resource Facing Service | RFS: Resource Facing Service | |||
SDO: Standards Development Organization | ||||
SD-WAN: Software-Defined Wide-Area Network | SDO: Standards Development Organization | |||
SLA: Service Level Agreement | SD-WAN: Software-Defined Wide-Area Network | |||
SUPA: Simplified Use of Policy Abstractions | SLA: Service Level Agreement | |||
VM: Virtual Machine | SUPA: Simplified Use of Policy Abstractions | |||
VNF: Virtual Network Function | VM: Virtual Machine | |||
3. Definitions | VNF: Virtual Network Function | |||
A common and shared understanding of terms and definitions related | 3. Definitions | |||
to IBN is provided in [CLEMM], as follows: | ||||
o Intent: A set of operational goals (that a network should meet) | A common and shared understanding of terms and definitions related to | |||
and outcomes (that a network is supposed to deliver), defined | IBN is provided in [RFC9315] as follows: | |||
in a declarative manner without specifying how to achieve or | ||||
implement them. | ||||
o Intent-Based Network: A network that can be managed using | Intent: A set of operational goals (that a network should meet) and | |||
intent. | outcomes (that a network is supposed to deliver) defined in a | |||
declarative manner without specifying how to achieve or implement | ||||
them. | ||||
o Policy: A set of rules that governs the choices in behaviour of | Intent-Based Network: A network that can be managed using intent. | |||
a system. | ||||
o Intent User: A user that defines and issues the intent request | Policy: A set of rules that governs the choices in behavior of a | |||
to the intent-based management system. | system. | |||
Other definitions relevant to this draft, such as intent scope, | Intent User: A user that defines and issues the intent request to | |||
the intent-based management system. | ||||
Other definitions relevant to this document, such as intent scope, | ||||
intent network scope, intent abstraction, intent abstraction, and | intent network scope, intent abstraction, intent abstraction, and | |||
intent lifecycle are available in section 5. | intent life cycle are available in Section 5. | |||
4. Abstract Intent Requirements | 4. Abstract Intent Requirements | |||
In order to understand the different intent requirements that would | In order to understand the different intent requirements that would | |||
drive intent classification, we first need to understand what intent | drive intent classification, we first need to understand what intent | |||
means for different intent users. | means for different intent users. | |||
4.1. What is Intent? | 4.1. What is intent? | |||
The term Intent has become very widely used in the industry for | The term "Intent" has become very widely used in the industry for | |||
different purposes, sometimes it is not even in agreement with SDO | different purposes; sometimes its use is not even in agreement with | |||
shared principles mentioned in the Introduction section.[CLEMM] draft | SDO-shared principles mentioned in Section 1. [RFC9315] brings | |||
brings clarification with relation to what an intent is and how it | clarification with relation to what an intent is and how it | |||
differentiates from policies and services. | differentiates from policies and services. | |||
Different stakeholders have different perspective of the network and | Different stakeholders have different perspectives of the network; | |||
therefore have different intent requirements. Their intent is | therefore, they have different intent requirements. Their intent is | |||
sometimes technical, non-technical, abstract or technology specific. | sometimes technical, non-technical, abstract, or technology specific. | |||
Therefore, it is important to start a discussion in the industry and | Therefore, it is important to start a discussion in the industry and | |||
academia communities about what intent is for different solutions and | academic communities about what intent is for different solutions and | |||
intent users. It is also imperative to try to propose some intent | intent users. It is also imperative to try to propose some intent | |||
categories/ classifications that could be understood by a wider | categories/classifications that could be understood by a wider | |||
audience. This would help us define intent interfaces, domain- | audience. This would help us define intent interfaces, domain- | |||
specific languages, and models. | specific languages, and models. | |||
4.2. Intent Solutions and Intent Users | 4.2. Intent Solutions and Intent Users | |||
Intent types are defined by all aspects that are required to profile | Intent types are defined by all aspects that are required to profile | |||
different requirements to easily distinguish among them. However, in | different requirements to easily distinguish between them. However, | |||
order to facilitate a clustered classification, we can focus on two | in order to facilitate a clustered classification, we can focus on | |||
aspects, the solution and intent user. They can be considered as the | two aspects: the solution and intent user. They can be considered to | |||
main keys to classify intents, as we can easily group requirements by | be the main keys to classify intents, as we can easily group | |||
solution and intent user. | requirements by solution and intent user. | |||
On the one hand, different solutions and intent users have different | On the one hand, different solutions and intent users have different | |||
requirements, expectations and priorities for intent-based | requirements, expectations, and priorities for intent-based | |||
networking. Therefore, intent users require different intent types, | networking. Therefore, intent users require different intent types, | |||
depending on their context, since they participate in different use | depending on their context, since they participate in different use | |||
cases. For instance, some intent users are more technical and require | cases. For instance, some intent users are more technical and | |||
intents that expose more technical information. Other intent users do | require intents that expose more technical information. Other intent | |||
not have knowledge of the network infrastructure and require intents | users do not have knowledge of the network infrastructure and require | |||
that shield them from different networking concepts and technologies. | intents that shield them from different networking concepts and | |||
technologies. | ||||
The following are the solutions and intent users that intent-based | The following are the solutions and intent users that intent-based | |||
networking needs to support: | networking needs to support: | |||
+--------------------+------------------------------------+ | +============+=====================================+ | |||
| Solutions | Intent Users | | | Solutions | Intent Users | | |||
+--------------------+------------------------------------+ | +============+=====================================+ | |||
| Carrier Networks | Network Operator | | | Carrier | Network Operators, Service | | |||
| | Service Designers/App Developer | | | Networks | Designers / App Developers, Service | | |||
| | Service Operators | | | | Operators, Customers / Subscribers | | |||
| | Customers/Subscribers | | +------------+-------------------------------------+ | |||
+--------------------+------------------------------------+ | | DC | Cloud Administrators, Underlay | | |||
| DC Networks | Cloud Administrator | | | Networks | Network Administrators, Application | | |||
| | Underlay Network Administrator | | | | Developers, Customers / Tenants | | |||
| | Application Developers | | +------------+-------------------------------------+ | |||
| | Customer/Tenants | | | Enterprise | Enterprise Administrators, | | |||
+--------------------+------------------------------------+ | | Networks | Application Developers, End Users | | |||
| Enterprise Networks| Enterprise Administrator | | +------------+-------------------------------------+ | |||
| | Application Developers | | ||||
| | End-Users | | ||||
+--------------------+------------------------------------+ | ||||
Table 1 - Intent Solutions and Intent Users | ||||
These intent solutions and intent users represent a starting point | Table 1: Intent Solutions and Intent Users | |||
for the classification and are expendable through the methodology | ||||
presented in section 6.1. . | ||||
o For carrier networks scenario, for example, if a | These intent solutions and intent users represent a starting point | |||
customer/subscriber wants to watch high-definition video, then the | for the classification and are expendable through the methodology | |||
intent is to convert the video image to 1080p rate. | presented in Section 6.1. | |||
o For DC networks scenario, administrators have their own clear | * For carrier network scenarios, for example, if a customer/ | |||
network intent such as load balancing. For all traffic flows that | subscriber wants to watch high-definition video, then the intent | |||
need NFV service chaining, restrict the maximum load of any VNF | is to convert the video image to 1080p. | |||
node/container below 50% and the maximum load of any network link | ||||
below 70%. | ||||
o For enterprise networks scenario, when hosting a video conference | * For DC network scenarios, administrators have their own clear | |||
multiple remote accesses are required. An example of the intent | network intent such as load balancing. For all traffic flows that | |||
from the network administrator is: for any end-user of this | need NFV service chaining, they can restrict the maximum load of | |||
application, the arrival time of hologram objects of all the | any VNF node / container below 50% and the maximum load of any | |||
remote tele-presenters should be synchronised within 50ms to reach | network link below 70%. | |||
the destination viewer for each conversation session. | ||||
o | * For enterprise network scenarios, when hosting a video conference, | |||
multiple remote accesses are required. An example of the intent | ||||
from the network administrator is as follows: for any end user of | ||||
this application, the arrival time of hologram objects of all the | ||||
remote tele-presenters should be synchronized within 50 ms to | ||||
reach the destination viewer for each conversation session. | ||||
4.3. Benefits of Intents for Different Stakeholders | 4.3. Benefits of Intents for Different Stakeholders | |||
Current network APIs and CLIs are too complex because they are highly | Current network APIs and CLIs are too complex because they are highly | |||
integrated with the low level concepts exposed by networks. | integrated with the low-level concepts exposed by networks. | |||
Customers, application developers and end-users must not be required | Customers, application developers, and end users must not be required | |||
to set IP addresses, VLANs, subnets, ports, while operators may still | to set IP addresses, VLANs, subnets, or ports, whereas operators may | |||
want to have more technical and network visibility. All stakeholders | still want to have both more technical and network visibility. All | |||
would benefit from the simpler interfaces, like: | stakeholders would benefit from simpler interfaces, such as: | |||
o Request gold VPN service between my sites A, B and C | * request gold VPN service between sites A, B, and C | |||
o Provide CE redundancy for the customer sites | * provide CE redundancy for the customer sites | |||
o Add access rules to the network service | * add access rules to the network service | |||
Operators and administrators manually troubleshoot and fix their | Operators and administrators manually troubleshoot and fix their | |||
networks and services. They instead want to: | networks and services. They instead want to: | |||
o simplify and automate network operations | * simplify and automate network operations | |||
o simplify definitions of network services | * simplify definitions of network services | |||
o provide simple customer APIs for value added services (operators) | * provide simple customer APIs for value-added services (operators) | |||
o be informed if the network or service is not behaving as requested | * be informed if the network or service is not behaving as requested | |||
o enable automatic optimization and correction for selected | * enable automatic optimization and correction for selected | |||
scenarios | scenarios | |||
o have systems that learn from historic information and behaviour | * have systems that learn from historic information and behavior | |||
Currently, intent users cannot build their own services and policies | Currently, intent users cannot build their own services and policies | |||
without becoming technical experts and performing manual maintenance | without becoming technical experts and performing manual maintenance | |||
actions. They instead want to be able to: | actions. They instead want to be able to: | |||
o build their own network services with their own policies via | * build their own network services with their own policies via | |||
simple interfaces, without becoming networking experts | simple interfaces, without becoming networking experts | |||
o have their network services up and running based on intent and | * have their network services up and running based on intent and | |||
automation only, without any manual actions or maintenance | automation only, without any manual actions or maintenance | |||
o | 4.4. Intent Types That Need to Be Supported | |||
4.4. Intent Types that need to be supported | ||||
Next to the intent solutions and intent users, another way to | Next to the intent solutions and intent users, another way to | |||
categorize the intent is through the intent types. The following | categorize the intent is through the intent types. The following | |||
intent types and subtypes need to be supported, in order to address | intent types and subtypes need to be supported in order to address | |||
the requirements from different solutions and intent users: | the requirements from different solutions and intent users. | |||
o Customer service intent | * Customer service intent | |||
o for customer self-service with SLA | - for customer self service with SLA | |||
o for service operator orders | - for service operator orders | |||
o Network and underlay network service intent | * Network and underlay network service intent | |||
o for service operator orders | - for service operator orders | |||
o for intent driven network configuration, verification, | - for intent-driven network configuration, verification, | |||
correction and optimization | correction, and optimization | |||
o for intent created and provided by the underlay network | - for intent created and provided by the underlay network | |||
administrator | administrator | |||
o Network and underlay network intent | * Network and underlay network intent | |||
o for network configuration | - for network configuration | |||
o for automated lifecycle management of network configurations | - for automated life-cycle management of network configurations | |||
o for network resources (switches, routers, routing, policies, | - for network resources (switches, routers, routing, policies, | |||
underlay) | and underlay) | |||
o Cloud management intent | * Cloud management intent | |||
o for DC configuration, VMs, DB servers, APP servers | - for DC configuration, VMs, DB servers, and Application servers | |||
o for communication between VMs | - for communication between VMs | |||
o Cloud resource management intent | * Cloud resource management intent | |||
o for cloud resource life-cycle management (policy driven self- | - for cloud resource life-cycle management (policy-driven self- | |||
configuration and auto-scaling and recovery/optimization) | configuration and auto-scaling and recovery/optimization) | |||
o Strategy intent | * Strategy intent | |||
o for security, QoS, application policies, traffic steering, etc. | - for security, QoS, application policies, traffic steering, etc. | |||
o for configuring and monitoring policies, alarms generation for | - for configuring and monitoring policies, alarm generation for | |||
non-compliance, auto-recovery | non-compliance, and auto-recovery | |||
o for design models and policies for network and network service | - for design models and policies for network and network service | |||
design | design | |||
o for design workflows, models and policies for operational task | - for design workflows, models, and policies for operational task | |||
intents | intents | |||
o Operational task intents | * Operational task intents | |||
o for network migration | - for network migration | |||
o for device replacements | - for device replacements | |||
o for network software upgrades | - for network software upgrades | |||
o for automating any other tasks that operators/administrator | - for automating any other tasks that operators/administrator | |||
often perform | often perform | |||
It is important to mention there all of the previously mentioned | It is important to mention all of the previously mentioned types and | |||
types and subtypes may affect other intents. For example, operational | subtypes may affect other intents. For example, operational task | |||
task intent can modify many other intents. The task itself is short- | intent can modify many other intents. The task itself is short | |||
lived, but the modification of other intents has an impact on their | lived, but the modification of other intents has an impact on their | |||
life-cycle, so those changes must continue to be continuously | life cycle, so those changes must continue to be continuously | |||
monitored and self-corrected/self-optimized. | monitored and self corrected/optimized. | |||
5. Functional Characteristics and Behaviour | 5. Functional Characteristics and Behavior | |||
Intent can be used to operate immediately on a target (much like | Intent can be used to operate immediately on a target (much like | |||
issuing a command), or whenever it is appropriate (e.g., in response | issuing a command) or whenever it is appropriate (e.g., in response | |||
to an event). In either case, intent has a number of behaviours that | to an event). In either case, intent has a number of behaviors that | |||
serve to further organize its purpose, as described by the following | serve to further organize its purpose, as described by the following | |||
subsections. | subsections. | |||
5.1. Abstracting Intent Operation | 5.1. Abstracting Intent Operation | |||
The modelling of intents can be abstracted using the following | The modeling of intents can be abstracted using the following three- | |||
three-tuple: | tuple: | |||
{Context, Capabilities, Constraints} | {Context, Capabilities, Constraints} | |||
o Context grounds the intent, and determines if it is relevant or | * Context grounds the intent and determines if it is relevant or not | |||
not for the current situation. Thus, context selects intents based | for the current situation. Thus, context selects intents based on | |||
on applicability. | applicability. | |||
o Capabilities describe the functionality that the intent can | * Capabilities describe the functionality that the intent can | |||
perform. Capabilities take different forms, depending on the | perform. Capabilities take different forms depending on the | |||
expressivity of the intent as well as the programming paradigm(s) | expressivity of the intent as well as the programming paradigm(s) | |||
used. | used. | |||
o Constraints define any restrictions on the capabilities to be used | * Constraints define any restrictions on the capabilities to be used | |||
for that particular context. | for that particular context. | |||
Metadata can be attached via strategy templates to each of the | Metadata can be attached via strategy templates to each of the | |||
elements of the three-tuple, and may be used to describe how the | elements of the three-tuple and may be used to describe how the | |||
intent should be used and how it operates, as well as prescribe any | intent should be used and how it operates as well as prescribe any | |||
operational dependencies that must be taken into account. | operational dependencies that must be taken into account. | |||
Although different intent categories share the same abstracted intent | Although different intent categories share the same abstracted intent | |||
model, each category will have its own specific context, capabilities | model, each category will have its own specific context, | |||
and constraints. | capabilities, and constraints. | |||
5.2. Intent User Types | 5.2. Intent User Types | |||
Expanding on the introduction in section 4.2. , intent user types | Expanding on the introduction in Section 4.2, intent user types | |||
represent the intent users that define and issue the intent request. | represent the intent users that define and issue the intent request. | |||
Depending on the intent solutions, there are specific intent users. | Depending on the intent solutions, there are specific intent users. | |||
Examples of intent users are customers, network operators, service | Examples of intent users are customers, network operators, service | |||
operators, enterprise administrators, cloud administrators, and | operators, enterprise administrators, cloud administrators, underlay | |||
underlay network administrators, or application developers. | network administrators, or application developers. | |||
o Customers and end-users do not necessarily know the functional and | * Customers and end users do not necessarily know the functional and | |||
operational details of the network that they are using. | operational details of the network that they are using. | |||
Furthermore, they lack skills to understand such details; in fact, | Furthermore, they lack skills to understand such details; in fact, | |||
such knowledge is typically not relevant to their job. In | such knowledge is typically not relevant to their job. In | |||
addition, the network may not expose these details to its intent | addition, the network may not expose these details to its intent | |||
users. This class of intent users focuses on the applications that | users. This class of intent users focuses on the applications | |||
they run, and uses services offered by the network. Hence, they | that they run and uses services offered by the network. Hence, | |||
want to specify policies that provide consistent behaviour | they want to specify policies that provide consistent behavior | |||
according to their business needs. They do not have to worry about | according to their business needs. They do not have to worry | |||
how the intents are deployed onto the underlying network, and | about how the intents are deployed onto the underlying network and | |||
especially, whether the intents need to be translated to different | especially whether the intents need to be translated to different | |||
forms to enable network elements to understand them. | forms to enable network elements to understand them. | |||
o Application developers work in a set of abstractions defined by | * Application developers work in a set of abstractions defined by | |||
their application and programming environment(s). For example, | their application and programming environment(s). For example, | |||
many application developers think in terms of objects (e.g., a | many application developers think in terms of objects (e.g., a | |||
VPN). While this makes sense to the application developer, most | VPN). While this makes sense to the application developer, most | |||
network devices do not have a VPN object per se; rather, the VPN | network devices do not have a VPN object per se; rather, the VPN | |||
is formed through a set of configuration statements for that | is formed through a set of configuration statements for that | |||
device in concert with configuration statements for the other | device in concert with configuration statements for the other | |||
devices that together make up the VPN. Hence, the view of | devices that together make up the VPN. Hence, the view of | |||
application developers matches the services provided by the | application developers matches the services provided by the | |||
network, but may not directly correspond to other views of other | network but may not directly correspond to other views of other | |||
intent users. | intent users. | |||
o Network operators may have the knowledge of the underlying | * Network operators may have the knowledge of the underlying | |||
network. However, they may not understand the details of the | network. However, they may not understand the details of the | |||
applications and services of customers. | applications and services of customers. | |||
5.3. Intent Scope | 5.3. Intent Scope | |||
Intents are used to manage the behaviour of the networks they are | Intents are used to manage the behavior of the networks they are | |||
applied to and all intents are applied within a specific scope, such | applied to and all intents are applied within a specific scope, such | |||
as: | as: | |||
o Connectivity scope, if the intent creates or modifies a | * connectivity scope, if the intent creates or modifies a connection | |||
connection. | ||||
o Security/privacy scope, if the intent specifies the security | ||||
characteristics of the network, customers, or end-users. | ||||
o Application scope, when the intent specifies the applications to | ||||
be affected by the intent request. | ||||
o QoS scope, when the intent specifies the QoS characteristics of | ||||
the network. | ||||
These intent scopes are expendable through the methodology presented | * security/privacy scope, if the intent specifies the security | |||
in section 6.1. . | characteristics of the network, customers, or end users | |||
5.4. Intent Network Scope | * application scope, when the intent specifies the applications to | |||
be affected by the intent request | ||||
Regardless on the intent user type, their intent request is affecting | * QoS scope, when the intent specifies the QoS characteristics of | |||
the network, or network components, which are representing the intent | the network | |||
These intent scopes are expendable through the methodology presented | ||||
in Section 6.1. | ||||
5.4. Intent Network Scope | ||||
Regardless of the intent user type, their intent request affects the | ||||
network, or network components, which are representing the intent | ||||
targets. | targets. | |||
Thus, intent network scope, or policy target as known in the area of | Thus, the intent network scope, or policy target as known in the area | |||
declarative policy, can represent VNFs or PNFs, physical network | of declarative policy, can represent VNFs or PNFs, physical network | |||
elements, campus networks, SD-WAN networks, radio access networks, | elements, campus networks, SD-WANs, RANs, cloud edges, cloud cores, | |||
cloud edge, cloud core, branch, etc. | branches, etc. | |||
5.5. Intent Abstraction | 5.5. Intent Abstraction | |||
Intent can be classified by whether it is necessary to feedback | Intent can be classified by whether it is necessary to feed back | |||
technical network information or non-technical information to the | technical network information or non-technical information to the | |||
intent user after the intent is executed. As well, intent abstraction | intent user after the intent is executed. As well, intent | |||
covers the level of technical details in the intent itself. | abstraction covers the level of technical details in the intent | |||
itself. | ||||
o For non-technical intent users, they do not care how the intent is | * Non-technical intent users do not care how the intent is executed | |||
executed, or the details of the network. As a result, they do not | nor do they care about the details of the network. As a result, | |||
need to know the configuration information of the underlying | they do not need to know the configuration information of the | |||
network. They only focus on whether the intent execution result | underlying network. They only focus on whether the intent | |||
achieves the goal, and the execution effect such as the quality of | execution result achieves the goal and the execution effect such | |||
completion and the length of execution. In this scenario, we refer | as the quality of completion and the length of execution. In this | |||
to an abstraction without technical feedback. | scenario, we refer to an abstraction without technical feedback. | |||
o For administrators, such as network administrators, they perform | * Administrators, such as network administrators, perform intents, | |||
intents, such as allocating network resources, selecting | such as allocating network resources, selecting transmission | |||
transmission paths, handling network failures, etc. They require | paths, handling network failures, etc. They require multiple | |||
multiple feedback indicators for network resource conditions, | feedback indicators for network resource conditions, congestion | |||
congestion conditions, fault conditions, etc. after execution. In | conditions, fault conditions, etc., after execution. In this | |||
this case, we refer to an abstraction with technical feedback. | case, we refer to an abstraction with technical feedback. | |||
As per intent definition provided in [CLEMM], lower-level intents are | As per the definition of "intent" provided in [RFC9315], lower-level | |||
not considered to qualify as intents. However, we kept this | intents are not considered to qualify as intents. However, we kept | |||
classification to identify any PoCs/Demos/Use Cases that still either | this classification to identify any PoCs / Demos / Use Cases that | |||
require or implement lower level of abstraction for intents. | still either require or implement a lower level of abstraction for | |||
intents. | ||||
5.6. Intent Life-cycle | 5.6. Intent Life Cycle | |||
Intents can be classified into transient and persistent intents: | Intents can be classified into transient and persistent intents: | |||
o If the intent is transient, it has no life-cycle management. As | Transient: The intent has no life-cycle management. As soon as the | |||
soon as the specified operation is successfully carried out, the | specified operation is successfully carried out, the intent is | |||
intent is finished, and can no longer affect the target object. | finished and can no longer affect the target object. | |||
o If the intent is persistent, it has life-cycle management. Once | Persistent: The intent has life-cycle management. Once the intent | |||
the intent is successfully activated and deployed, the system will | is successfully activated and deployed, the system will keep all | |||
keep all relevant intents active until they are deactivated or | relevant intents active until they are deactivated or removed. | |||
removed. | ||||
5.7. Autonomous Driving Levels | 5.7. Autonomous Driving Levels | |||
In different phases of the autonomous driving network [TMF-auto], the | In different phases of the autonomous driving network [TMF-AUTO], the | |||
intents are different. Depending on the Autonomous Network Level of | intents are different. Depending on the Autonomous Network Level of | |||
the overall solution, we may have different intent requirements and | the overall solution, we may have different intent requirements and | |||
types. For example, at lower level the customer intent is | types. For example, at lower levels, the customer intent is: | |||
automatically converted to configuration policies only, while at the | ||||
higher levels the customer intent is covering the full life cycle, it | ||||
is converted to both configuration and monitoring policies and is | ||||
self-assured using AI. | ||||
A typical example of autonomous driving network level 0 to 5 are | * automatically converted to configuration policies only while at | |||
listed as below. | the higher levels, | |||
o Level 0 - Traditional manual network: O&M personnel manually | * covering the full life cycle, | |||
control the network and obtain network alarms and logs. - No | ||||
intent | ||||
o Level 1 - Partially automated network: Automated scripts are used | * converted to both configuration and monitoring policies, and | |||
to automate service provisioning, network deployment, and | ||||
maintenance. Shallow perception of network status and decision | ||||
making suggestions of machine; - No intent | ||||
o Level 2 - Automated network: Automation of most service | * self assured using AI. | |||
provisioning, network deployment, and maintenance of a | ||||
comprehensive perception of network status and local machine | ||||
decision making; - simple intent on service provisioning | ||||
o Level 3 - Self-optimization network: Deep awareness of network | Typical examples of autonomous driving networks level 0 to 5 are | |||
status and automatic network control, meeting requirements of | shown below. | |||
intent users of the network. - Intent based on network status | ||||
cognition | ||||
o Level 4 - Partial autonomous network: In a limited environment, | Level 0 - Traditional manual network: | |||
people do not need to participate in decision-making and networks | O&M personnel manually control the network and obtain network | |||
can adjust itself. - Intent based on limited AI | alarms and logs. | |||
o Level 5 - Autonomous network: In different network environments | - No intent | |||
and network conditions, the network can automatically adapt to and | ||||
adjust to meet people's intentions. - Intent based on AI | ||||
6. Intent Classification | Level 1 - Partially automated network: | |||
Automated scripts are used to automate service provisioning, | ||||
network deployment, and maintenance. The network provides shallow | ||||
perception of the network status and decision making suggestions. | ||||
This section proposes an intent classification approach that may help | - No intent | |||
to classify mainstream intent related demos/tools. | ||||
Level 2 - Automated network: | ||||
This entails the automation of most service provisioning, network | ||||
deployment, and maintenance of a comprehensive perception of | ||||
network status and local machine decision-making. | ||||
- simple intent on service provisioning | ||||
Level 3 - Self-optimization network: | ||||
This entails a deep awareness of network status and automatic | ||||
network control, meeting requirements of intent users of the | ||||
network. | ||||
- Intent based on network status cognition | ||||
Level 4 - Partial autonomous network: | ||||
In a limited environment, people do not need to participate in | ||||
decision-making and networks can adjust themselves. | ||||
- Intent based on limited AI | ||||
Level 5 - Autonomous network: | ||||
In different network environments and network conditions, the | ||||
network can automatically adapt and adjust to meet people's | ||||
intentions. | ||||
- Intent based on AI | ||||
6. Intent Classification | ||||
This section proposes an approach to intent classification that may | ||||
help to classify mainstream intent-related demos/tools. | ||||
The three classifications in this document have been proposed from | The three classifications in this document have been proposed from | |||
scratch, following the methodology presented, through three | scratch (following the methodology presented) through three | |||
iterations: one for carrier network intent solution, one for DC | iterations: one for a carrier network intent solution, one for a DC | |||
intent solution, and one for enterprise intent solution. For each | intent solution, and one for an enterprise intent solution. For each | |||
intent solution, we identified the specific intent users and intent | intent solution, we identified the specific intent users and intent | |||
types. Then, we further identified intent scope, network scope, | types. Then, we further identified intent scope, network scope, | |||
abstractions, and life-cycle requirements. | abstractions, and life-cycle requirements. | |||
These classifications and the generated tables can be easily | These classifications and the generated tables can be easily | |||
extended. For example, for the DC intent solution, a new category is | extended. For example, for the DC intent solution, a new category | |||
identified, i.e. resource scope, and the classification table has | "resource scope" is identified, and the classification table has been | |||
been extended accordingly. | extended accordingly. | |||
In the future, as new scenarios, applications, and domains are | In the future, as new scenarios, applications, and domains emerge, | |||
emerging, new classifications and taxonomies can be identified, | new classifications and taxonomies can be identified, following the | |||
following the proposed methodology. | proposed methodology. | |||
The intent classifications have been documented to the best of our | The intent classifications have been documented to the best of our | |||
knowledge at this point in time. Additional classifications will most | knowledge at the time of writing. Additional classifications will | |||
probably see the light in the future. | most likely come to light in the future. | |||
The output of the intent classification is the intent taxonomy | The output of the intent classification is the intent taxonomy | |||
introduced in the next sections. | introduced in the subsections of this section. | |||
Thus, this section first introduces the proposed intent | Thus, the subsections of Section 6 introduce the proposed intent | |||
classification methodology, followed by consolidated intent taxonomy | classification methodology, the consolidated intent taxonomy for | |||
for three intent solutions, and then by concrete examples of intent | three intent solutions, and the concrete examples of intent | |||
classifications for three different intent solutions (e.g. carrier | classifications for three different intent solutions (e.g., carrier | |||
network, data center, and enterprise) that were derived using the | network, data center, and enterprise) that were derived using the | |||
proposed methodology and then can be filled in for PoCs, demos, | proposed methodology and can be filled in for PoCs, demos, research | |||
research projects or future drafts. | projects, or future documents. | |||
6.1. Intent Classification Methodology | 6.1. Intent Classification Methodology | |||
This section describes the methodology used to derive the initial | This section describes the methodology used to derive the initial | |||
classification proposed in the draft. The proposed methodology can be | classification proposed in the document. The proposed methodology | |||
used to create new intent classifications from scratch, by analysing | can be used to create new intent classifications from scratch by | |||
the solution knowledge. As well, the methodology can be used to | analyzing the solution knowledge. As well, the methodology can be | |||
update existing classification tables by adding or removing different | used to update existing classification tables by adding or removing | |||
solutions, intent users or intent types in order to cater for future | different solutions, intent users, or intent types in order to cater | |||
scenarios, applications or domains. | to future scenarios, applications, or domains. | |||
+------------------------------------------+ | +------------------------------------------+ | |||
|Solution Knowledge (requirements, | | |Solution Knowledge (requirements, | | |||
|use cases, technologies, network, intent | | |use cases, technologies, network, intent | | |||
|users, intent requirements) | | |users, intent requirements) | | |||
+----------------+-------------------------+ | +----------------+-------------------------+ | |||
| Input Rx=Read | | Input Rx=Read | |||
| Ux=Update (Add/Remove) | | Ux=Update (Add/Remove) | |||
+--------V--------+ | +--------V--------+ | |||
|1.Identify Intent| | |1.Identify Intent| | |||
skipping to change at page 19, line 27 ¶ | skipping to change at line 795 ¶ | |||
R1 | | U1 | | R1 | | U1 | | |||
+---------------+ U8 | | R2 +--v----------------+ | +---------------+ U8 | | R2 +--v----------------+ | |||
|8.Identify New +---------+ | | +-----------> 2.Identify | | |8.Identify New +---------+ | | +-----------> 2.Identify | | |||
| Categories | R8 | | | | U2 | Intent | | | Categories | R8 | | | | U2 | Intent | | |||
| <-------- | | | | +---------+ User Types | | | <-------- | | | | +---------+ User Types | | |||
+--------^------+ | | | | | | +-------|-----------+ | +--------^------+ | | | | | | +-------|-----------+ | |||
| | | | | | | | | | | | | | | | | | |||
| ++-+-v-v---+-v-+ | | | ++-+-v-v---+-v-+ | | |||
+--------+------+ U7 | | R3 +------v------------+ | +--------+------+ U7 | | R3 +------v------------+ | |||
|7.Identify +------> Intent +--------> 3.Identify | | |7.Identify +------> Intent +--------> 3.Identify | | |||
| Life-cycle | R7 |Classification| U3 | Type | | | Life-Cycle | R7 |Classification| U3 | Type | | |||
| Requirements <------+ <--------+ of Intent | | | Requirements <------+ <--------+ of Intent | | |||
+--------^------+ +^--^-+--^-+---+ +------|------------+ | +--------^------+ +^--^-+--^-+---+ +------|------------+ | |||
| || | | | | | | | || | | | | | | |||
| || | | | | | | | || | | | | | | |||
+--------+-----+ || | | | | R4 +-------v-----------+ | +--------+-----+ || | | | | R4 +-------v-----------+ | |||
|6.Identify | U6 || | | | +-----------> 4.Identify | | |6.Identify | U6 || | | | +-----------> 4.Identify | | |||
| Abstractions+---------| | | | U4 | Intent | | | Abstractions+---------| | | | U4 | Intent | | |||
| <---------+ | | +-------------+ Scope | | | <---------+ | | +-------------+ Scope | | |||
+-------^------+ R6 | | +-------+-----------+ | +-------^------+ R6 | | +-------+-----------+ | |||
| | | | | | | | | | |||
| U5 | |R5 | | | U5 | |R5 | | |||
| +-------+-v--------+ | | | +-------+-v--------+ | | |||
| |5.Identify Network| | | | |5.Identify Network| | | |||
+----------+ Scope <---------------+ | +----------+ Scope <---------------+ | |||
+------------------+ | +------------------+ | |||
Figure 1 - Intent Classification Methodology | ||||
Figure 1: Intent Classification Methodology | ||||
The intent classification workflow starts from the solution | The intent classification workflow starts from the solution | |||
knowledge, which can provide information on requirements, use cases, | knowledge, which can provide information on requirements, use cases, | |||
technologies used, network properties, intent users that define and | technologies used, network properties, intent users that define and | |||
issue the intent request, and requirements. The following, defines | issue the intent request, and requirements. The following defines | |||
the steps to classify an intent: | the steps to classify an intent: | |||
1. The information provided in the solution knowledge is given as | 1. Receive the information provided in the solution knowledge as | |||
input for identifying the intent solution (e.g. carrier, enterprise, | input for identifying the intent solution (e.g., carrier, | |||
and data center). Intent solutions are reviewed against the existing | enterprise, and data center). Intent solutions are reviewed | |||
classification and they can either be used if present or added if not | against the existing classification and can either be used if | |||
there or removed if not needed, from the classification. (R1-U1). | present or added if not there; if not needed, they can be removed | |||
from the classification (R1-U1). | ||||
2. Identify the intent user types (e.g. customer, network operators, | 2. Identify the intent user types (e.g., customer, network | |||
service operators, etc.), review existing intent classification and | operators, service operators, etc.). Review the existing intent | |||
use the intent user type if present, add if it is not there or remove | classification. Then use the intent user type if present; add it | |||
it if not needed (R2-U2). | if it is not there or remove it if not needed (R2-U2). | |||
3. Identify the types of intent (e.g. network intent, customer | 3. Identify the types of intent (e.g., network intent, customer | |||
service intent) and then review existing classification and | service intent). Review the existing classification and then | |||
use/add/remove the intent type (R3-U3). | use, add, or remove the intent type (R3-U3). | |||
4. Identify the intent scopes (e.g. connectivity, application) based | 4. Identify the intent scopes (e.g., connectivity, application) | |||
on the solution knowledge and then review existing classification and | based on the solution knowledge. Then, review the existing | |||
use/add/remove the identified intent scope (R4-U4). | classification. Use, add, or remove the identified intent scope | |||
(R4-U4). | ||||
5. Identify the network scopes (e.g. campus, radio access) and then | 5. Identify the network scopes (e.g., campus, radio access). Then, | |||
review existing classification and either use it or add/remove the | review the existing classification. Either use, add, or remove | |||
identified network scope (R5-U5). | the identified network scope (R5-U5). | |||
6. Identify the abstractions (e.g. technical, non-technical) and | 6. Identify the abstractions (e.g., technical, non-technical). | |||
then review existing classification and use/add/remove the | Then, review the existing classification and either use, add, or | |||
abstractions (R6-U6). | remove the abstractions (R6-U6). | |||
7. Identify the life-cycle requirements (e.g. persistent, transient) | 7. Identify the life-cycle requirements (e.g., persistent, | |||
and then review existing classification and use/add/remove the life- | transient). Then, review the existing classification. Either | |||
cycle requirements (R7-U7). | use, add, or remove the life-cycle requirements (R7-U7). | |||
8. Identify any new categories and use/add the newly identified | 8. Identify any new categories. Use and add the newly identified | |||
categories. New categories can be identified as new domains or | categories. New categories can be identified as new domains or | |||
applications are emerging, or new areas of concern (e.g. privacy, | applications emerge or as new areas of concern (e.g., privacy, | |||
compliance) might arise, which are not listed in the current | compliance) arise that are not listed in the current methodology. | |||
methodology. | ||||
6.2. Intent Taxonomy | 6.2. Intent Taxonomy | |||
The following taxonomy describes the various intent solutions, intent | The following taxonomy describes the various intent solutions, intent | |||
user types, intent types, intent scopes, network scopes, abstractions | user types, intent types, intent scopes, network scopes, | |||
and life-cycle and represents the output of the intent classification | abstractions, and life cycles. The taxonomy represents the output of | |||
tables for each of the solutions addressed (i.e. carrier, data | the intent classification tables for each of the solutions addressed | |||
center, and enterprise solutions). | (i.e., carrier, data center, and enterprise solutions). | |||
The intent scope categories in Figure 2 are shared among the carrier, | The intent scope categories in Figure 2 are shared among the carrier, | |||
DC, and enterprise solutions. The abbreviations (Cx) in sections | DC, and enterprise solutions. The abbreviations (Cx) in Sections | |||
6.3.2. 6.4.2. are introduced with the scope of fitting as column | 6.3.2 and 6.4.2 are introduced with the scope of fitting as column | |||
title in the following tables. | title in the following tables. | |||
+--------------------------------+ | +--------------------------------+ | |||
+-->|Carrier Enterprise Data Center| | +-->|Carrier Enterprise Data Center| | |||
| +--------------------------------+ | | +--------------------------------+ | |||
| +--------------------------------+ | | +--------------------------------+ | |||
| |Customer/Subscriber/End-User | | | |Customer/Subscriber/End User | | |||
+----------+ | |Network or Service Operator | | +----------+ | |Network or Service Operator | | |||
+>+Solutions +--+ |Application Developer | | +>+Solution +--+ |Application Developer | | |||
| +----------+ +->|Enterprise Administrator | | | +----------+ +->|Enterprise Administrator | | |||
| | |Cloud Administrator | | | | |Cloud Administrator | | |||
| +----------+ | |Underlay Network Administrator | | | +----------+ | |Underlay Network Administrator | | |||
+>+Intent +---+ +--------------------------------+ | +>+Intent +---+ +--------------------------------+ | |||
| |User | +--------------------------------+ | | |User | +--------------------------------+ | |||
| |Types | |Customer Service Intent | | | |Type | |Customer Service Intent | | |||
| +----------+ |Strategy Intent | | | +----------+ |Strategy Intent | | |||
| +----------+ |Network Service Intent | | | +----------+ |Network Service Intent | | |||
+>+Intent +----->|Underlay Network Service Intent | | +>+Intent +----->|Underlay Network Service Intent | | |||
+------+ | |Type | |Network Intent | | +------+ | |Type | |Network Intent | | |||
|Intent+-+ +----------+ |Underlay Network Intent | | |Intent+-+ +----------+ |Underlay Network Intent | | |||
+------+ | |Operational Task Intent | | +------+ | |Operational Task Intent | | |||
| +----------+ |Cloud Management Intent | | | +----------+ |Cloud Management Intent | | |||
+>+Intent +---+ |Cloud Resource Management Intent| | +>+Intent +---+ |Cloud Resource Management Intent| | |||
| |Scope | | +--------------------------------+ | | |Scope | | +--------------------------------+ | |||
| +----------+ | +--------------------------------+ | | +----------+ | +--------------------------------+ | |||
| +->|Connectivity Application QoS | | | +->|Connectivity Application QoS | | |||
| +----------+ |Security/Privacy Storage Compute| | | +----------+ |Security/Privacy Storage Compute| | |||
+>+Network +---+ +--------------------------------+ | +>+Network +---+ +--------------------------------+ | |||
| |Scope | | +--------------------------------+ | | |Scope | | +--------------------------------+ | |||
| +----------+ | |Radio Access Branch | | | +----------+ | |Radio Access Branch | | |||
| +->|Transport Access SD-WAN | | | +->|Transport Access SD-WAN | | |||
| +----------+ |Transport Aggr. VNF PNF | | | +----------+ |Transport Aggr. VNF PNF | | |||
+>+Abstrac +----+ |Transport Core Physical | | +>+Abstrac- +----+ |Transport Core Physical | | |||
| |tion | | |Cloud Edge Logical | | | |tion | | |Cloud Edge Logical | | |||
| +----------+ | |Cloud Core Campus | | | +----------+ | |Cloud Core Campus | | |||
| +----------+ | +--------------------------------+ | | +----------+ | +--------------------------------+ | |||
+>+Life | | +--------------------------------+ | +>+Life | | +--------------------------------+ | |||
|cycle +--+ +>|Technical Non-Technical | | |Cycle +--+ +>|Technical Non-Technical | | |||
+----------+ | +--------------------------------+ | +----------+ | +--------------------------------+ | |||
| +--------------------------------+ | | +--------------------------------+ | |||
+-->|Persistent Transient | | +-->|Persistent Transient | | |||
+--------------------------------+ | +--------------------------------+ | |||
Figure 2 - Intent Taxonomy | ||||
6.3. Intent Classification for Carrier Solution | Figure 2: Intent Taxonomy | |||
6.3.1. Intent Users and Intent Types | 6.3. Intent Classification for Carrier Solution | |||
This section addresses step 1, 2, and 3 from Figure 1 and the | 6.3.1. Intent Users and Intent Types | |||
This section addresses steps 1, 2, and 3 from Figure 1. The | ||||
following table describes the intent users in carrier solutions and | following table describes the intent users in carrier solutions and | |||
intent types with their descriptions for different intent users. | intent types with their descriptions for different intent users. | |||
+-------------+-------------+---------------------------------------+ | +=============+=============+=======================================+ | |||
| Intent User | Intent Type | Intent Type Description | | | Intent User | Intent Type | Intent Type Description | | |||
+-------------------------------------------------------------------+ | +=============+=============+=======================================+ | |||
| Customer/ |Customer |Customer self-service with SLA and | | | Customer/ | Customer | Customer self service with SLA | | |||
| Subscriber |Service |value added service | | | Subscriber | Service | and value-added service. | | |||
| |Intent |Example: Always maintain high quality | | | | Intent | | | |||
| | |of service and high bandwidth for gold | | | | | Example: Always maintain a high | | |||
| | |level subscribers. | | | | | quality of service and high | | |||
| | |Operational statement: Measure the | | | | | bandwidth for gold-level | | |||
| | |network congestion status, give | | | | | subscribers. | | |||
| | |different adaptive parameters to | | | | | | | |||
| | |stations of different priority, thus in| | | | | Operation statement: Measure the | | |||
| | |heavy load situation, make the | | | | | network congestion status, give | | |||
| | |bandwidth of the high-priority | | | | | different adaptive parameters to | | |||
| | |customers guaranteed. | | | | | stations of different priority; | | |||
| | |At the same time ensure the overall | | | | | thus, in a heavy load situation, | | |||
| | |utilization of system, improve | | | | | make the bandwidth of the high- | | |||
| | |the overall throughput of the system. | | | | | priority customers guaranteed. | | |||
| +-----------------------------------------------------+ | | | | At the same time, ensure the | | |||
| |Strategy |Customer designs models and policy | | | | | overall utilization of the | | |||
| |Intent |intents to be used by customer service | | | | | system and improve the overall | | |||
| | |intents. | | | | | throughput of the system. | | |||
| | |Example: Request reliable service | | ||||
| | |during peak traffic periods for apps | | ||||
| | |of type video. | | ||||
+-------------------------------------------------------------------+ | ||||
|Network |Network |Service provided by network service | | ||||
|Operator |Service |operator to the customer | | ||||
| |Intent |(e.g. the service operator) | | ||||
| | |Example: Request network service with | | ||||
| | |delay guarantee for access customer A. | | ||||
| +-------------+---------------------------------------+ | | +-------------+---------------------------------------+ | |||
| |Network |Network operator requests network-wide | | | | Strategy | Customer designs models and | | |||
| |Intent |(service underlay or other network-wide| | | | Intent | policy intents to be used by | | |||
| | |configuration) or network resource | | | | | customer service intents. | | |||
| | |configurations (switches, routers, | | | | | | | |||
| | |routing, policies). Includes | | | | | Example: Request reliable | | |||
| | |connectivity, routing, QoS, security, | | | | | service during peak traffic | | |||
| | |application policies, traffic steering | | | | | periods for video-type apps. | | |||
| | |policies, configuration policies, | | ||||
| | |monitoring policies, alarm generation | | ||||
| | |for non-compliance, auto-recovery, etc.| | ||||
| | |Example: Request high priority queueing| | ||||
| | |for traffic of class A. | | ||||
| +-----------------------------------------------------+ | ||||
| |Operational |Network operator requests execution of | | ||||
| |Task |any automated task other than network | | ||||
| |Intent |service intent and network intent | | ||||
| | |(e.g. network migration, server | | ||||
| | |replacements, device replacements, | | ||||
| | |network software upgrades). | | ||||
| | |Example: Request migration of all | | ||||
| | |services in network N to backup path P.| | ||||
| +-----------------------------------------------------+ | ||||
| |Strategy |Network operator designs models, policy| | ||||
| |Intent |intents and workflows to be used by | | ||||
| | |network service Intents, network | | ||||
| | |intents and operational task intents. | | ||||
| | |Workflows can automate any tasks that | | ||||
| | |network operator often performed in | | ||||
| | |addition to network service intents and| | ||||
| | |network intents | | ||||
| | |Example: Ensure the load on any link in| | ||||
| | |the network is not higher than 50%. | | ||||
+-------------+-------------+---------------------------------------+ | +-------------+-------------+---------------------------------------+ | |||
| Network | Network | Service provided by the network | | ||||
| Operator | Service | service operator to the customer | | ||||
| | Intent | (e.g., the service operator). | | ||||
| | | | | ||||
| | | Example: Request network service | | ||||
| | | with delay guarantee for access | | ||||
| | | customer A. | | ||||
| +-------------+---------------------------------------+ | ||||
| | Network | Network operator requests | | ||||
| | Intent | network-wide (service underlay | | ||||
| | | or other network-wide | | ||||
| | | configuration) or network- | | ||||
| | | resource configurations | | ||||
| | | (switches, routers, routing, or | | ||||
| | | policies). Includes | | ||||
| | | connectivity, routing, QoS, | | ||||
| | | security, application policies, | | ||||
| | | traffic steering policies, alarm | | ||||
| | | generation for non-compliance, | | ||||
| | | auto-recovery, etc. | | ||||
| | | | | ||||
| | | Example: Request high priority | | ||||
| | | queuing for traffic of class A. | | ||||
| +-------------+---------------------------------------+ | ||||
| | Operational | Network operator requests | | ||||
| | Task Intent | execution of any automated task | | ||||
| | | other than network service | | ||||
| | | intent and network intent (e.g., | | ||||
| | | network migration, server | | ||||
| | | replacements, device | | ||||
| | | replacements, or network | | ||||
| | | software upgrades). | | ||||
| | | | | ||||
| | | Example: Request migration of | | ||||
| | | all services in network N to | | ||||
| | | backup path P. | | ||||
| +-------------+---------------------------------------+ | ||||
| | Strategy | Network operator designs models, | | ||||
| | Intent | policy intents, and workflows to | | ||||
| | | be used by network service | | ||||
| | | intents, network intents, and | | ||||
| | | operational task intents. | | ||||
| | | Workflows can automate any tasks | | ||||
| | | that the network operator often | | ||||
| | | performs in addition to network | | ||||
| | | service intents and network | | ||||
| | | intents. | | ||||
| | | | | ||||
| | | Example: Ensure the load on any | | ||||
| | | link in the network is not | | ||||
| | | higher than 50%. | | ||||
+-------------+-------------+---------------------------------------+ | +-------------+-------------+---------------------------------------+ | |||
| Service | Customer | Service operator's customer orders, | | | Service | Customer | Service operator's customer | | |||
| Operator | Service | customer service / SLA | | | Operator | Service | orders, customer service, or | | |||
| | Intent | Example: Provide service S with | | | | Intent | SLA. | | |||
| | | guaranteed bandwidth for customer A. | | | | | | | |||
| +-----------------------------------------------------+ | | | | Example: Provide service S with | | |||
| | Network | Service operator's network orders / | | | | | guaranteed bandwidth for | | |||
| | Service | network SLA | | | | | customer A. | | |||
| | Intent | Example: Provide network guarantees in| | | +-------------+---------------------------------------+ | |||
| | | terms of security, low latency and | | | | Network | Service operator's network | | |||
| | | high bandwidth | | | | Service | orders / network SLA. | | |||
| +-----------------------------------------------------+ | | | Intent | | | |||
| | Operational | Service operator requests execution of| | | | | Example: Provide network | | |||
| | Task | any automated task other than | | | | | guarantees in terms of security, | | |||
| | Intent | customer service intent and network | | | | | low latency, and high bandwidth. | | |||
| | | service intent | | | +-------------+---------------------------------------+ | |||
| | Operational | Service operator requests | | ||||
| | Task Intent | execution of any automated task | | ||||
| | | other than customer service | | ||||
| | | intent and network service | | ||||
| | | intent. | | ||||
| | | | | ||||
| | | Example: Update service operator | | | | | Example: Update service operator | | |||
| | | portal platforms and their software | | | | | portal platforms and their | | |||
| | | regularly. Move services from network | | | | | software regularly. Move | | |||
| | | operator 1 to network operator 2. | | | | | services from network operator 1 | | |||
| +-----------------------------------------------------+ | | | | to network operator 2. | | |||
| +-------------+---------------------------------------+ | ||||
| | Strategy | Service operator designs models, | | | | Strategy | Service operator designs models, | | |||
| | Intent | policy intents and workflows to be | | | | Intent | policy intents, and workflows to | | |||
| | | used by customer service intents, | | | | | be used by customer service | | |||
| | | network service intents and | | | | | intents, network service | | |||
| | | operational task intents. Workflows | | | | | intents, and operational task | | |||
| | | can automate any tasks that service | | | | | intents. Workflows can automate | | |||
| | | operator often performed in addition | | | | | any task that the service | | |||
| | | to network service intents and network| | | | | operator often performs in | | |||
| | | intents. | | | | | addition to network service | | |||
| | | intents and network intents. | | ||||
| | | | | ||||
| | | Example: Request network service | | | | | Example: Request network service | | |||
| | | guarantee to avoid network congestion | | | | | guarantee to avoid network | | |||
| | | during special periods | | | | | congestion during special | | |||
| | | such as black Friday, and Christmas. | | | | | periods such as Black Friday and | | |||
| | | Christmas. | | ||||
+-------------+-------------+---------------------------------------+ | +-------------+-------------+---------------------------------------+ | |||
| Application | Customer | Customer service intent API provided | | | Application | Customer | Customer service intent API | | |||
| Developer | Service | to the application developers | | | Developer | Service | provided to the application | | |||
| | Intent | Example: API to request network to | | | | Intent | developers. | | |||
| | | watch HD video 4K/8K. | | | | | | | |||
| +-----------------------------------------------------+ | ||||
| | Network | Network service intent API provided to| | ||||
| | Service | the application developers | | ||||
| | Intent | Example:API to request network service| | ||||
| | | , monitoring and traffic grooming. | | ||||
| +-----------------------------------------------------+ | ||||
| | Network | Network intent API provided to the | | ||||
| | Intent | application developers | | ||||
| | | Example: API to request network | | | | | Example: API to request network | | |||
| | | resources configuration. | | | | | to watch HD video (4K/8K). | | |||
| +-----------------------------------------------------+ | | +-------------+---------------------------------------+ | |||
| | Operational | Operational task intent API provided | | | | Network | Network service intent API | | |||
| | Task | to the application developers. This is| | | | Service | provided to the application | | |||
| | Intent | for the trusted internal operator / | | | | Intent | developers. | | |||
| | | service providers / customer DevOps | | | | | | | |||
| | | Example: API to request network | | ||||
| | | service, monitoring, and traffic | | ||||
| | | grooming. | | ||||
| +-------------+---------------------------------------+ | ||||
| | Network | Network intent API provided to | | ||||
| | Intent | the application developers. | | ||||
| | | | | ||||
| | | Example: API to request network | | ||||
| | | resource configurations. | | ||||
| +-------------+---------------------------------------+ | ||||
| | Operational | Operational task intent API | | ||||
| | Task Intent | provided to the application | | ||||
| | | developers. This is for the | | ||||
| | | trusted internal operator / | | ||||
| | | service providers / customer | | ||||
| | | DevOps. | | ||||
| | | | | ||||
| | | Example: API to request server | | | | | Example: API to request server | | |||
| | | migrations. | | | | | migrations. | | |||
| +-----------------------------------------------------+ | | +-------------+---------------------------------------+ | |||
| | Strategy | Application developer designs models, | | | | Strategy | Application developer designs | | |||
| | Intent | policy and workflows to be used by | | | | Intent | models, policy, and workflows to | | |||
| | | customer service intents, network | | | | | be used by customer service | | |||
| | | service intents and operational | | | | | intents, network service | | |||
| | | task intents. This is for the trusted | | | | | intents, and operational task | | |||
| | | internal operator/service provider/ | | | | | intents. This is for the | | |||
| | | customer DevOps | | | | | trusted internal operator / | | |||
| | | Example: API to design network load | | | | | service provider / customer | | |||
| | | balancing strategies during peak times| | | | | DevOps. | | |||
| | | | | ||||
| | | Example: API to design network | | ||||
| | | load-balancing strategies during | | ||||
| | | peak times. | | ||||
+-------------+-------------+---------------------------------------+ | +-------------+-------------+---------------------------------------+ | |||
Table 2 - Intent Classification for Carrier Solution | Table 2: Intent Classification for Carrier Solution | |||
6.3.2. Intent Categories | 6.3.2. Intent Categories | |||
This subsection addresses step 4 to 7 from Figure 1, and the | This subsection addresses steps 4 to 7 from Figure 1. The following | |||
following are the proposed categories: | are the proposed categories: | |||
o Intent Scope: C1=Connectivity, C2=Security/Privacy, | Intent Scope: C1=Connectivity, C2=Security/Privacy, C3=Application, | |||
C3=Application, C4=QoS | C4=QoS | |||
o Network Scope: | ||||
o Network Domain: C1=Radio Access, C2=Transport Access, | ||||
C3=Transport Aggregation, C4=Transport Core, C5=Cloud Edge, | ||||
C6=Cloud Core) | ||||
o Network Function (NF) Scope: C1=VNFs, C2=PNFs | ||||
o Abstraction (ABS): C1=Technical (with technical feedback), | ||||
C2=Non-technical (without technical feedback) see section 5.2. . | ||||
o Life-cycle (L-C): C1=Persistent (full life-cycle), C2=Transient | ||||
(short lived) | ||||
6.3.3. Intent Classification Example | Network Scope: | |||
This section depicts an example on how the methodology described in | Network Domain: C1=Radio Access, C2=Transport | |||
section 6.1. can be used in order to classify intents introduced in | Access, C3=Transport Aggregation, C4=Transport Core, C5=Cloud | |||
the 'A Multi-Level Approach to IBN' PoC demonstration [POC-IBN]. This | Edge, C6=Cloud Core | |||
PoC is led by academics carrying research in the area of SDN/NFV and | ||||
the specific problem they are addressing is to apply the intent | Network Function (NF) Scope: C1=VNFs, C2=PNFs | |||
concept at different levels that correspond to different | ||||
stakeholders. For this research work, they considered two types of | Abstraction (ABS): C1=Technical (with technical feedback), C2=Non- | |||
intents: slice intents and service chain intents. | technical (without technical feedback) (see Section 5.2). | |||
Life cycle (L-C): C1=Persistent (full life cycle), C2=Transient | ||||
(short lived) | ||||
6.3.3. Intent Classification Example | ||||
This section contains an example of how the methodology described in | ||||
Section 6.1 can be used in order to classify intents introduced in | ||||
the "A Multi-Level Approach to IBN" PoC demonstration [POC-IBN]. | ||||
This PoC is led by academics carrying out research in the area of | ||||
SDN/NFV, and the specific problem they are addressing is the | ||||
application of the intent concept at different levels that correspond | ||||
to different stakeholders. For this research work, they considered | ||||
two types of intents: slice intents and service chain intents. | ||||
In this PoC [POC-IBN], a slice intent expresses a request for a | In this PoC [POC-IBN], a slice intent expresses a request for a | |||
network slice with two types of components: a set of top layer | network slice with two types of components: a set of top-layer | |||
virtual functions, and a set of virtual switches and/or routers of | virtual functions and a set of virtual switches and/or routers of L2/ | |||
L2/L3 VNFs. A service chain intent expressed a request for a service | L3 VNFs. A service chain intent expresses a request for a service | |||
operated through a chain of service components running in L4-L7 | operated through a chain of service components running in L4-L7 | |||
virtual functions. | virtual functions. | |||
Following the intent classification methodology described step-by- | Following the intent classification methodology described step by | |||
step in section 6.1. , the following can be derived: | step in Section 6.1, the following can be derived: | |||
1. The intent solution for both intents is carrier network. | 1. The intent solution for both intents is carrier network. | |||
2. The intent user type is network operator for the slice intent, and | 2. The intent user type is network operator for the slice intent and | |||
service operator for the service chain intent. | service operator for the service chain intent. | |||
3. The type of intent, is a network service intent for the slice | 3. The type of intent is a network service intent for the slice | |||
intent, and a customer service intent for the service chain intent. | intent and a customer service intent for the service chain | |||
intent. | ||||
4. The intent scopes are connectivity and application. | 4. The intent scopes are connectivity and application. | |||
5. The network scope is VNF, cloud edge, and cloud core. | 5. The network scope is VNF, cloud edge, and cloud core. | |||
6. The abstractions are with technical feedback for the slice intent, | 6. The abstractions are with technical feedback for the slice intent | |||
and without technical feedback for the service chain intent | and without technical feedback for the service chain intent. | |||
7. The life-cycle is persistent. | 7. The life cycle is persistent. | |||
The following table shows how to represent this information in a | The following table shows how to represent this information in a | |||
tabular form. The 'X' in the table refers to the slice intent, and | tabular form. The "X" in the table refers to the slice intent; the | |||
the 'Y' in the table refers to the service chain intent. | "Y" in the table refers to the service chain intent. | |||
+---------+---------+-----------+-----+-----------------+-----+-----+ | +==========+===========+===========+=====+=================+=====+=====+ | |||
| Intent | Intent | Intent | NF | Network | ABS |L-C | | |Intent |Intent Type|Intent |NF |Network |ABS |L-C | | |||
| User | Type | Scope |Scope| Scope | | | | |User | |Scope |Scope|Scope | | | | |||
| | +-----------+-----+-----------------+-----+-----+ | | | +==+==+==+==+==+==+==+==+==+==+==+==+==+==+==+==+ | |||
| | |C1|C2|C3|C4|C1|C2|C1|C2|C3|C4|C5|C6|C1|C2|C1|C2| | | | |C1|C2|C3|C4|C1|C2|C1|C2|C3|C4|C5|C6|C1|C2|C1|C2| | |||
+---------+---------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | +==========+===========+==+==+==+==+==+==+==+==+==+==+==+==+==+==+==+==+ | |||
|Customer |Customer | | | | | | | | | | | | | | | | | | |Customer/ |Customer | | | | | | | | | | | | | | | | | | |||
|/ Sub- |Service | | | | | | | | | | | | | | | | | | |Subscriber|Service | | | | | | | | | | | | | | | | | | |||
| scriber |Intent | | | | | | | | | | | | | | | | | | | |Intent | | | | | | | | | | | | | | | | | | |||
| +---------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | +-----------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| |Strategy | | | | | | | | | | | | | | | | | | | |Strategy | | | | | | | | | | | | | | | | | | |||
| |Intent | | | | | | | | | | | | | | | | | | | |Intent | | | | | | | | | | | | | | | | | | |||
+---------+---------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | +----------+-----------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
|Network |Network |X | |X | |X | | | | | |X | |X | |X | | | |Network |Network |X | |X | |X | | | | | |X | |X | |X | | | |||
|Operator |Service | | | | | | | | | | | | | | | | | | |Operator |Service | | | | | | | | | | | | | | | | | | |||
| |Intent | | | | | | | | | | | | | | | | | | | |Intent | | | | | | | | | | | | | | | | | | |||
| +---------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | +-----------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| |Network | | | | | | | | | | | | | | | | | | | |Network | | | | | | | | | | | | | | | | | | |||
| |Intent | | | | | | | | | | | | | | | | | | | |Intent | | | | | | | | | | | | | | | | | | |||
| +---------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | +-----------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| |Operatio-| | | | | | | | | | | | | | | | | | | |Operational| | | | | | | | | | | | | | | | | | |||
| |nal Task | | | | | | | | | | | | | | | | | | | |Task Intent| | | | | | | | | | | | | | | | | | |||
| |Intent | | | | | | | | | | | | | | | | | | | +-----------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| +---------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | |Strategy | | | | | | | | | | | | | | | | | | |||
| |Strategy | | | | | | | | | | | | | | | | | | | |Intent | | | | | | | | | | | | | | | | | | |||
| |Intent | | | | | | | | | | | | | | | | | | +----------+-----------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
+---------+---------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |Service |Customer |Y | |Y | |Y | | | | | |Y |Y | |Y |Y | | | |||
|Service |Customer |Y | |Y | |Y | | | | | |Y |Y | |Y |Y | | | |Operator |Intent | | | | | | | | | | | | | | | | | | |||
|Operator |Service | | | | | | | | | | | | | | | | | | | +-----------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| |Intent | | | | | | | | | | | | | | | | | | | |Network | | | | | | | | | | | | | | | | | | |||
| +---------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | |Service | | | | | | | | | | | | | | | | | | |||
| |Network | | | | | | | | | | | | | | | | | | | |Intent | | | | | | | | | | | | | | | | | | |||
| |Service | | | | | | | | | | | | | | | | | | | +-----------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| |Intent | | | | | | | | | | | | | | | | | | | |Op Task | | | | | | | | | | | | | | | | | | |||
| +---------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | |Intent | | | | | | | | | | | | | | | | | | |||
| |Op Task | | | | | | | | | | | | | | | | | | | +-----------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| |Intent | | | | | | | | | | | | | | | | | | | |Strategy | | | | | | | | | | | | | | | | | | |||
| +---------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | |Intent | | | | | | | | | | | | | | | | | | |||
| |Strategy | | | | | | | | | | | | | | | | | | +----------+-----------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| |Intent | | | | | | | | | | | | | | | | | | |App |Customer | | | | | | | | | | | | | | | | | | |||
+---------+---------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |Developer |Intent | | | | | | | | | | | | | | | | | | |||
|App |Customer | | | | | | | | | | | | | | | | | | | +-----------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
|Developer|Intent | | | | | | | | | | | | | | | | | | | |Network | | | | | | | | | | | | | | | | | | |||
| +---------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | |Service | | | | | | | | | | | | | | | | | | |||
| |Network | | | | | | | | | | | | | | | | | | | |Intent | | | | | | | | | | | | | | | | | | |||
| |Service | | | | | | | | | | | | | | | | | | | +-----------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| |Intent | | | | | | | | | | | | | | | | | | | |Network | | | | | | | | | | | | | | | | | | |||
| +---------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | |Intent | | | | | | | | | | | | | | | | | | |||
| |Network | | | | | | | | | | | | | | | | | | | +-----------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| |Intent | | | | | | | | | | | | | | | | | | | |Op Task | | | | | | | | | | | | | | | | | | |||
| +---------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | |Intent | | | | | | | | | | | | | | | | | | |||
| |Op Task | | | | | | | | | | | | | | | | | | | +-----------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| |Intent | | | | | | | | | | | | | | | | | | | |Strategy | | | | | | | | | | | | | | | | | | |||
| +---------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | |Intent | | | | | | | | | | | | | | | | | | |||
| |Strategy | | | | | | | | | | | | | | | | | | +----------+-----------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| |Intent | | | | | | | | | | | | | | | | | | ||||
+---------+---------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | ||||
Table 3 - Intent Classification Example for Carrier Solution | Figure 3: Intent Classification Example for Carrier Solution | |||
6.4. Intent Classification for Data Center Network Solutions | 6.4. Intent Classification for Data Center Network Solutions | |||
6.4.1. Intent Users and Intent Types | 6.4.1. Intent Users and Intent Types | |||
The following table describes the intent users in DC network | The following table describes the intent users in DC network | |||
solutions and intent types with their descriptions for different | solutions and intent types with their descriptions for different | |||
intent users. | intent users. | |||
+---------------+-------------+-------------------------------------+ | +===============+=============+====================================+ | |||
| Intent User | Intent Type | Intent Type Description | | | Intent User | Intent Type | Intent Type Description | | |||
+-------------------------------------------------------------------+ | +===============+=============+====================================+ | |||
| Customer / | Customer | Customer self-service via tenant | | | Customer/ | Customer | Customer self service via tenant | | |||
| Tenants | Service | portal. | | | Tenants | Service | portal. | | |||
| | | Example: Request GPU computing and | | | | | | | |||
| | | storage resources to meet 10k video | | | | | Example: Request GPU computing and | | |||
| | | surveillance services. | | | | | storage resources to meet 10k | | |||
| +---------------------------------------------------+ | | | | video surveillance services. | | |||
| | Strategy | This includes models and policy | | | +-------------+------------------------------------+ | |||
| | Intent | intents designed by customers/ | | | | Strategy | This includes models and policy | | |||
| | | tenants to be reused later during | | | | Intent | intents designed by customers/ | | |||
| | | instantiation. | | | | | tenants to be reused later during | | |||
| | | Example: Request dynamic computing | | | | | instantiation. | | |||
| | | and storage resources of the service| | | | | | | |||
| | | in special and daily times. | | | | | Example: Request dynamic computing | | |||
| | | | | | | | and storage resources of the | | |||
+-------------------------------------------------------------------+ | | | | service in special and daily | | |||
| | Cloud | Configuration of VMs, DB Servers, | | | | | times. | | |||
| Cloud | Management | app servers, connectivity, | | +---------------+-------------+------------------------------------+ | |||
| Administrator | Intent | communication between VMs. | | | Cloud | Cloud | Configuration of VMs, DB Servers, | | |||
| | | Example: Request connectivity | | | Administrator | Management | app servers, and communication | | |||
| | | between VMs A,B,and C in network N1.| | | | Intent | between servers and VMs. | | |||
| +---------------------------------------------------+ | | | | | | |||
| | Cloud | Policy-driven self-configuration and| | | | | Example: Request connectivity | | |||
| | Resource | and recovery / optimization | | | | | between VMs A, B, and C in network | | |||
| | Management | Example: Request automatic life | | | | | N1. | | |||
| | Intent |-cycle management of VM cloud | | | +-------------+------------------------------------+ | |||
| | | resources. | | | | Cloud | Policy-driven self configuration | | |||
| +---------------------------------------------------+ | | | Resource | and recovery/optimization. | | |||
| | Operational | Cloud administrator requests | | | | Management | | | |||
| | Task Intent | execution of any automated task | | | | Intent | Example: Request automatic life- | | |||
| | | other than cloud management | | | | | cycle management of VM cloud | | |||
| | | intents and cloud resource | | | | | resources. | | |||
| | | management intents. | | | +-------------+------------------------------------+ | |||
| | | Example: Request upgrade operating | | | | Operational | Cloud administrator requests | | |||
| | | system to version X on all VMs | | | | Task Intent | execution of any automated task | | |||
| | | in network N1. | | | | | other than cloud management | | |||
| | |Operational statement: an intent to | | | | | intents and cloud resource | | |||
| | |update a system might reconfigure the| | | | | management intents. | | |||
| | |system topology (connect to a service| | | | | | | |||
| | |and to peers), exchange data (update | | | | | Example: Request upgrade operating | | |||
| | |the content), and uphold a certain | | | | | system to version X on all VMs in | | |||
| | |QoE level (allocate sufficient | | | | | network N1. | | |||
| | |network resources). The network, | | | | | | | |||
| | |thus, carries out the necessary | | | | | Operational statement: An intent | | |||
| | |configuration to best serve such an | | | | | to update a system might | | |||
| | |intent; e.g. setting up direct | | | | | reconfigure the system topology | | |||
| | |connections between terminals, and | | | | | (connect to a service and to | | |||
| | |allocating fair shares of router | | | | | peers), exchange data (update the | | |||
| | |queues considering other network | | | | | content), and uphold a certain QoE | | |||
| | |services. | | | | level (allocate sufficient network | | |||
| +---------------------------------------------------+ | | | | resources). Thus, the network | | |||
| | Strategy | Cloud administrator designs models, | | | | | carries out the necessary | | |||
| | Intent | policy intents and workflows to be | | | | | configuration to best serve such | | |||
| | | used by other intents. Automate any | | | | | an intent, e.g., setting up direct | | |||
| | | tasks that administrator often | | | | | connections between terminals and | | |||
| | | performs, in addition to life-cycle | | | | | allocating fair shares of router | | |||
| | | of cloud management intents and | | | | | queues considering other network | | |||
| | | cloud management resource intents. | | | | | services. | | |||
| | | Example: In case of emergency, | | | +-------------+------------------------------------+ | |||
| | | automatically migrate all cloud | | | | Strategy | Cloud administrator designs | | |||
| | | resources to DC2. | | | | Intent | models, policy intents, and | | |||
+---------------+---------------------------------------------------+ | | | | workflows to be used by other | | |||
| Underlay | Underlay | Service created and provided by | | | | | intents. Automate any tasks that | | |||
| Network | Network | the underlay network administrator. | | | | | administrator often performs in | | |||
| Administrator | Service | Example: Request underlay service | | | | | addition to life cycle of cloud | | |||
| | Intent | between DC1 and DC2 with | | | | | management intents and cloud | | |||
| | | bandwidth B. | | | | | management resource intents. | | |||
| +---------------------------------------------------+ | | | | | | |||
| | Underlay | Underlay network administrator | | | | | Example: In case of emergency, | | |||
| | Network | requests some DCN-wide underlay | | | | | automatically migrate all cloud | | |||
| | Intent | network configuration or network | | | | | resources to DC2. | | |||
| | | resource configurations. | | +---------------+-------------+------------------------------------+ | |||
| | | Example: Establish and allocate | | | Underlay | Underlay | Service created and provided by | | |||
| | | DHCP address pool. | | | Network | Network | the underlay network | | |||
| +---------------------------------------------------+ | | Administrator | Service | administrator. | | |||
| | Operational | Underlay network administrator | | | | Intent | | | |||
| | Task Intent | requests execution of the any | | | | | Example: Request underlay service | | |||
| | | automated task other than underlay | | | | | between DC1 and DC2 with bandwidth | | |||
| | | network service and resource | | | | | B. | | |||
| | | intent. | | | +-------------+------------------------------------+ | |||
| | | Example: Request automatic rapid | | | | Underlay | Underlay network administrator | | |||
| | | detection of device failures and | | | | Network | requests some DCN-wide underlay | | |||
| | | pre-alarm correlation. | | | | Intent | network configuration or network | | |||
| +---------------------------------------------------+ | | | | resource configurations. | | |||
| | Strategy | Underlay network administrator | | | | | | | |||
| | Intent | designs models, policy intents & | | | | | Example: Establish and allocate | | |||
| | | workflows to be used by other | | | | | DHCP address pool. | | |||
| | | intents. Automate any tasks that | | | +-------------+------------------------------------+ | |||
| | | administrator often performs. | | | | Operational | Underlay network administrator | | |||
| | | Example: For all traffic flows | | | | Task Intent | requests execution of any | | |||
| | | that need NFV service chaining, | | | | | automated task other than underlay | | |||
| | | restrict the maximum load of any | | | | | network service and resource | | |||
| | | VNF node/container below 50% and | | | | | intent. | | |||
| | | the maximum load of any network | | | | | | | |||
| | | link below 70%. | | | | | Example: Request automatic rapid | | |||
+-------------------------------------------------------------------+ | | | | detection of device failures and | | |||
| | Cloud | Cloud management intent API | | | | | pre-alarm correlation. | | |||
| | Management | provided to the application | | | +-------------+------------------------------------+ | |||
| | Intent | developers. | | | | Strategy | Underlay network administrator | | |||
| | | Example: API to request | | | | Intent | designs models, policy intents, | | |||
| | | configuration of VMs, or DB Servers.| | | | | and workflows to be used by other | | |||
| Application +---------------------------------------------------+ | | | | intents. Automate any tasks that | | |||
| Developer | Cloud | Cloud resource management intent | | | | | the administrator often performs. | | |||
| | Resource | API provided to the application | | | | | | | |||
| | Management | developers. | | | | | Example: For all traffic flows | | |||
| | Intent | Example: API to request automatic | | | | | that need NFV service chaining, | | |||
| | | life-cycle management of cloud | | | | | restrict the maximum load of any | | |||
| | | resources. | | | | | VNF node/container below 50% and | | |||
| +---------------------------------------------------+ | | | | the maximum load of any network | | |||
| | Underlay | Underlay network service API | | | | | link below 70%. | | |||
| | Network | provided to the application | | +---------------+-------------+------------------------------------+ | |||
| | Service | developers. | | | Application | Cloud | Cloud management intent API | | |||
| | Intent | Example: API to request real-time | | | Developer | Management | provided to the application | | |||
| | | monitoring of device condition. | | | | Intent | developers. | | |||
| +---------------------------------------------------+ | | | | | | |||
| | Underlay | Underlay network resource API | | | | | Example: API to request | | |||
| | Network | provided to the application | | | | | configuration of VMs or DB | | |||
| | Intent | developers. | | | | | Servers. | | |||
| | | Example: API to request dynamic | | | +-------------+------------------------------------+ | |||
| | | management of IPv4 address pool | | | | Cloud | Cloud resource management intent | | |||
| | | resources. | | | | Resource | API provided to the application | | |||
| | | | | | | Management | developers. | | |||
| +---------------------------------------------------+ | | | Intent | | | |||
| | Operational | Operational task intent API | | | | | Example: API to request automatic | | |||
| | Task Intent | provided to the trusted | | | | | life-cycle management of cloud | | |||
| | | application developer (internal | | | | | resources. | | |||
| | | DevOps). | | | +-------------+------------------------------------+ | |||
| | | Example: API to request automatic | | | | Underlay | Underlay network service API | | |||
| | | rapid detection of device failures | | | | Network | provided to the application | | |||
| | | and pre-alarm correlation | | | | Service | developers. | | |||
| | | | | | | Intent | | | |||
| +---------------------------------------------------+ | | | | Example: API to request real-time | | |||
| | Strategy | Application developer designs | | | | | monitoring of device condition. | | |||
| | Intent | models, policy intents and | | | +-------------+------------------------------------+ | |||
| | | building blocks to be used by | | | | Underlay | Underlay network resource API | | |||
| | | other intents. This is for the | | | | Network | provided to the application | | |||
| | | trusted internal DCN DevOps. | | | | Intent | developers. | | |||
| | | Example: API to request load | | | | | | | |||
| | | balancing thresholds. | | | | | Example: API to request dynamic | | |||
+---------------+-------------+-------------------------------------+ | | | | management of IPv4 address pool | | |||
| | | resources. | | ||||
| +-------------+------------------------------------+ | ||||
| | Operational | Operational task intent API | | ||||
| | Task Intent | provided to the trusted | | ||||
| | | application developer (internal | | ||||
| | | DevOps). | | ||||
| | | | | ||||
| | | Example: API to request automatic | | ||||
| | | rapid detection of device failures | | ||||
| | | and pre-alarm correlation. | | ||||
| +-------------+------------------------------------+ | ||||
| | Strategy | Application developer designs | | ||||
| | Intent | models, policy intents, and | | ||||
| | | building blocks to be used by | | ||||
| | | other intents. This is for the | | ||||
| | | trusted internal DCN DevOps. | | ||||
| | | | | ||||
| | | Example: API to request load- | | ||||
| | | balancing thresholds. | | ||||
+---------------+-------------+------------------------------------+ | ||||
Table 4 - Intent Classification for Data Center Network Solutions | Table 3: Intent Classification for Data Center Network Solutions | |||
6.4.2. Intent Categories | 6.4.2. Intent Categories | |||
The following are the proposed categories: | The following are the proposed categories: | |||
o Intent Scope: C1=Connectivity, C2=Security/Privacy, | ||||
C3=Application, C4=QoS C5=Storage C6=Compute | ||||
o Network Scope | ||||
o Network Domain: DC Network | ||||
o DCN Network (DCN Net) Scope: C1=Logical, C2=Physical | ||||
o DCN Resource (DCN Res) Scope: C1=Virtual, C2=Physical | ||||
o Abstraction (ABS): C1=Technical (with technical feedback), | ||||
C2=Non-technical (without technical feedback), see section 5.2. | ||||
o Life-cycle (L-C): C1=Persistent (full life-cycle), C2=Transient | ||||
(short lived) | ||||
6.4.3. Intent Classification Example | Intent Scope: C1=Connectivity, C2=Security/Privacy, C3=Application, | |||
C4=QoS, C5=Storage, C6=Compute | ||||
Network Scope | ||||
Network Domain: DC Network | ||||
DCN Network (DCN Net) Scope: C1=Logical, C2=Physical | ||||
DCN Resource (DCN Res) Scope: C1=Virtual, C2=Physical | ||||
Abstraction (ABS): C1=Technical (with technical feedback), C2=Non- | ||||
technical (without technical feedback) (see Section 5.2). | ||||
Life cycle (L-C): C1=Persistent (full life cycle), C2=Transient | ||||
(short lived) | ||||
6.4.3. Intent Classification Example | ||||
This section depicts an example on how the methodology described in | This section depicts an example on how the methodology described in | |||
section 6.1. can be used by the research community to classify | Section 6.1 can be used by the research community to classify | |||
intents. As mentioned in 6.3.3. a successful use of the | intents. As mentioned in Section 6.3.3, a successful use of the | |||
classification proposed in this draft is introduced in the 'A Multi- | classification proposed in this document is introduced in the PoC | |||
Level Approach to IBN' PoC demonstration [POC-IBN]. The PoC is led by | demonstration titled "A Multi-Level Approach to IBN" [POC-IBN]. The | |||
academics carrying research in the area of SDN/NFV and the specific | PoC is led by academics carrying out research in the area of SDN/NFV; | |||
problem they are addressing is to apply the intent concept at | the specific problem they are addressing is the application of the | |||
different levels that correspond to different stakeholders. | intent concept at different levels that correspond to different | |||
stakeholders. | ||||
For their research work, they considered two types of intents: slice | For their research work, they considered two types of intents: slice | |||
intents and service chain intents. For the data center solution, only | intents and service chain intents. For the data center solution, | |||
the slice intent is relevant. | only the slice intent is relevant. | |||
As already mentioned in section 6.3.3. , a slice intent expresses a | As already mentioned in Section 6.3.3, a slice intent expresses a | |||
request for a network slice with two types of components: a set of | request for a network slice with two types of components: a set of | |||
top layer virtual functions, and a set of virtual switches and/or | top-layer virtual functions and a set of virtual switches and/or | |||
routers of L2/L3 VNFs. | routers of L2/L3 VNFs. | |||
Following the intent classification methodology described step-by- | Following the intent classification methodology described step by | |||
step in section 6.1. , we identify the following: | step in Section 6.1, we identify the following: | |||
1. The intent solution is for the data center. | 1. The intent solution is data center. | |||
2. The intent user type is the cloud administrator for the slice | 2. The intent user type is the cloud administrator for the slice | |||
intent and service chain intent. | intent and service chain intent. | |||
3. The type of intent, is a cloud management intent, for the slice | 3. The type of intent is a cloud management intent for the slice | |||
intent. | intent. | |||
4. The intent scopes are connectivity and application. | 4. The intent scopes are connectivity and application. | |||
5. The network scope is logical, and the resource scope is virtual. | 5. The network scope is logical; the resource scope is virtual. | |||
6. The abstractions are with technical feedback for the slice intent. | 6. The abstractions are with technical feedback for the slice | |||
intent. | ||||
7. The life-cycle is persistent. | 7. The life cycle is persistent. | |||
The following table shows how to represent this information in a | The following table shows how to represent this information in a | |||
tabular form, where the 'X' in the table refers to the slice intent. | tabular form; the "X" in the table refers to the slice intent. | |||
+---------+-------------+-----------------+-----+-----+-----+-----+ | +===========+=============+=================+=====+=====+=====+=====+ | |||
|Intent | Intent | Intent | DCN | DCN | ABS | L-C | | |Intent User| Intent Type |Intent |DCN |DCN |ABS |L-C | | |||
|User | Type | Scope | Res | Net | | | | | | |Scope |Res |Net | | | | |||
| | +-----------------+-----+-----+-----+-----+ | | | +==+==+==+==+==+==+==+==+==+==+==+==+==+==+ | |||
| | |C1|C2|C3|C4|C5|C6|C1|C2|C1|C2|C1|C2|C1|C2| | | | |C1|C2|C3|C4|C5|C6|C1|C2|C1|C2|C1|C2|C1|C2| | |||
+---------+-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | +===========+=============+==+==+==+==+==+==+==+==+==+==+==+==+==+==+ | |||
|Customer | Customer | | | | | | | | | | | | | | | | |Customer/ | Customer | | | | | | | | | | | | | | | | |||
|/Tenants | Service | | | | | | | | | | | | | | | | |Tenants | Service | | | | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | | | | |||
| +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| | Strategy | | | | | | | | | | | | | | | | | | Strategy | | | | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | | | | |||
+---------+-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | +-----------+-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| Cloud | Cloud | | | | | | | | | | | | | | | | |Cloud Admin| Cloud |X | |X | | | |X | |X | |X | |X | | | |||
| Admin | Management |X | |X | | | |X | |X | |X | |X | | | | | Management | | | | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | | | | |||
| +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| | Cloud | | | | | | | | | | | | | | | | | | Cloud | | | | | | | | | | | | | | | | |||
| | Resource | | | | | | | | | | | | | | | | | | Resource | | | | | | | | | | | | | | | | |||
| | Management | | | | | | | | | | | | | | | | | | Management | | | | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | | | | |||
| +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| | Operational | | | | | | | | | | | | | | | | | | Operational | | | | | | | | | | | | | | | | |||
| | Task Intent | | | | | | | | | | | | | | | | | | Task Intent | | | | | | | | | | | | | | | | |||
| +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| | Strategy | | | | | | | | | | | | | | | | | | Strategy | | | | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | | | | |||
+---------+-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | +-----------+-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
|Underlay | Underlay | | | | | | | | | | | | | | | | |Underlay | Underlay | | | | | | | | | | | | | | | | |||
|Network | Network | | | | | | | | | | | | | | | | |Network | Network | | | | | | | | | | | | | | | | |||
|Admin | Intent | | | | | | | | | | | | | | | | |Admin | Intent | | | | | | | | | | | | | | | | |||
| +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| | Underlay | | | | | | | | | | | | | | | | | | Underlay | | | | | | | | | | | | | | | | |||
| | Network | | | | | | | | | | | | | | | | | | Network | | | | | | | | | | | | | | | | |||
| | Resource | | | | | | | | | | | | | | | | | | Resource | | | | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | | | | |||
| +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| | Operational | | | | | | | | | | | | | | | | | | Operational | | | | | | | | | | | | | | | | |||
| | Task Intent | | | | | | | | | | | | | | | | | | Task Intent | | | | | | | | | | | | | | | | |||
| +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| | Strategy | | | | | | | | | | | | | | | | | | Strategy | | | | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | | | | |||
+---------+-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | +-----------+-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
|App | Cloud | | | | | | | | | | | | | | | | |App | Cloud | | | | | | | | | | | | | | | | |||
|Developer| Management | | | | | | | | | | | | | | | | |Developer | Management | | | | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | | | | |||
| +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| | Cloud | | | | | | | | | | | | | | | | | | Cloud | | | | | | | | | | | | | | | | |||
| | Resource | | | | | | | | | | | | | | | | | | Resource | | | | | | | | | | | | | | | | |||
| | Management | | | | | | | | | | | | | | | | | | Management | | | | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | | | | |||
| +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| | Underlay | | | | | | | | | | | | | | | | | | Underlay | | | | | | | | | | | | | | | | |||
| | Network | | | | | | | | | | | | | | | | | | Network | | | | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | | | | |||
| +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| | Underlay | | | | | | | | | | | | | | | | | | Underlay | | | | | | | | | | | | | | | | |||
| | Network | | | | | | | | | | | | | | | | | | Network | | | | | | | | | | | | | | | | |||
| | Resource | | | | | | | | | | | | | | | | | | Resource | | | | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | | | | |||
| +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| | Operational | | | | | | | | | | | | | | | | | | Operational | | | | | | | | | | | | | | | | |||
| | Task Intent | | | | | | | | | | | | | | | | | | Task Intent | | | | | | | | | | | | | | | | |||
| +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | | +-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
| | Strategy | | | | | | | | | | | | | | | | | | Strategy | | | | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | | | | |||
+---------+-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | +-----------+-------------+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | |||
Table 5 - Intent Classification Example for Data Center Network | Figure 4: Intent Classification Example for Data Center Network | |||
Solutions | Solutions | |||
6.5. Intent Classification for Enterprise Solution | 6.5. Intent Classification for Enterprise Solution | |||
6.5.1. Intent Users and Intent Types | 6.5.1. Intent Users and Intent Types | |||
The following table describes the intent users in enterprise | The following table describes the intent users in enterprise | |||
solutions and their intent types. | solutions and their intent types. | |||
+--------------+-------------+-------------------------------------+ | +---------------+-------------+------------------------------------+ | |||
| Intent User | Intent Type | Intent Type Description | | | Intent User | Intent Type | Intent Type Description | | |||
+--------------+---------------------------------------------------+ | +---------------+-------------+------------------------------------+ | |||
| End-User | Customer | Enterprise end-user self-service or | | | End User | Customer | Enterprise end user self service | | |||
| | Service | applications, enterprise may have | | | | Service | or applications; enterprise may | | |||
| | Intent | multiple types of end-users. | | | | Intent | have multiple types of end users. | | |||
| | | Example: Request access to VPN | | | | | | | |||
| | | service. | | | | | Example: Request access to VPN | | |||
| | | Request video conference between | | | | | service. Request video conference | | |||
| | | end-user A and B. | | | | | between end user A and B. | | |||
| +---------------------------------------------------+ | | +-------------+------------------------------------+ | |||
| | Strategy | This includes models and policy | | | | Strategy | This includes models and policy | | |||
| | Intent | intents designed by end-users to be | | | | Intent | intents designed by end users to | | |||
| | | used by end-user intents and their | | | | | be used by end-user intents and | | |||
| | | applications. | | | | | their applications. | | |||
| | | Example: Create a video conference | | | | | | | |||
| | | type for a weekly meeting. | | | | | Example: Create a video conference | | |||
+------------------------------------------------------------------+ | | | | type for a weekly meeting. | | |||
|Enterprise | Network | Service provided by the | | +---------------+-------------+------------------------------------+ | |||
|Administrator | Service | administrator to the end-users | | | Enterprise | Network | Service provided by the | | |||
|(internal or | Intent | and their applications. | | | Administrator | Service | administrator to the end users and | | |||
| MSP) | | Example: For any end-user of | | | (internal or | Intent | their applications. | | |||
| | | application X, the arrival of | | | MSP) | | | | |||
| | | hologram objects of all the remote | | | | | Example: For any end user of | | |||
| | | tele-presenters should be | | | | | application X, the arrival of | | |||
| | | synchronised within 50ms to reach | | | | | hologram objects of all the remote | | |||
| | | the destination viewer for each | | | | | tele-presenters should be | | |||
| | | conversation session. | | | | | synchronized within 50 ms to reach | | |||
| | | Create management VPN connectivity | | | | | the destination viewer for each | | |||
| | | for type of service A. | | | | | conversation session. Create | | |||
| | | Operational statement: The job of | | | | | management VPN connectivity for | | |||
| | | the network layer is to ensure that | | | | | type of service A. | | |||
| | | the delay is between 50-70ms through| | | | | | | |||
| | | the routing algorithm. At the same | | | | | Operational statement: The job of | | |||
| | | time,the node resources need to meet| | | | | the network layer is to ensure | | |||
| | | the bandwidth requirements of 4K | | | | | that the delay is between 50-70 ms | | |||
| | | video conferences. | | | | | through the routing algorithm. At | | |||
+------------------------------------------------------------------+ | | | | the same time, the node resources | | |||
| | Network | Administrator requires network wide | | | | | need to meet the bandwidth | | |||
| | Intent | configuration (e.g. underlay, | | | | | requirements of 4K video | | |||
| | | campus) or resource configuration | | | | | conferences. | | |||
| | | (switches, routers, policies). | | | +-------------+------------------------------------+ | |||
| | | Example: Configure switches in | | | | Network | Administrator requires network- | | |||
| | | campus network 1 to prioritise | | | | Intent | wide configuration (e.g., underlay | | |||
| | | traffic of type A. | | | | | or campus) or resource | | |||
| | | Configure YouTube as business | | | | | configuration (switches, routers, | | |||
| | | non-relevant. | | | | | or policies). | | |||
| +---------------------------------------------------+ | | | | | | |||
| | Operational | Administrator requests execution of | | | | | Example: Configure switches in | | |||
| | Task Intent | any automated task other than | | | | | campus network 1 to prioritize | | |||
| | | network service intents and network | | | | | traffic of type A. Configure | | |||
| | | intents. | | | | | YouTube as business non-relevant. | | |||
| | | Example: Request network security | | | +-------------+------------------------------------+ | |||
| | | automated tasks such as web | | | | Operational | Administrator requests execution | | |||
| | | filtering and DDOS cloud protection.| | | | Task Intent | of any automated task other than | | |||
| +---------------------------------------------------+ | | | | network service intents and | | |||
| | Strategy | Administrator designs models, policy| | | | | network intents. | | |||
| | Intent | intents and workflows to be used by | | | | | | | |||
| | | other intents. Automate any tasks | | | | | Example: Request network security | | |||
| | | that administrator often performs. | | | | | automated tasks such as web | | |||
| | | Example: In case of emergency, | | | | | filtering and DDoS cloud | | |||
| | | automatically shift all traffic of | | | | | protection. | | |||
| | | type A through network N. | | | +-------------+------------------------------------+ | |||
| | | | | | | Strategy | Administrator designs models, | | |||
+--------------+-------------+-------------------------------------+ | | | Intent | policy intents, and workflows to | | |||
| Application | End-User | End-user service / application | | | | | be used by other intents. | | |||
| Developer | Intent | intent API provided to the | | | | | Automate any tasks that the | | |||
| | | application developers. | | | | | administrator often performs. | | |||
| | | Example: API for request to open a | | | | | | | |||
| | | VPN service. | | | | | Example: In case of emergency, | | |||
| +---------------------------------------------------+ | | | | automatically shift all traffic of | | |||
| | Network | Network service API provided to | | | | | type A through network N. | | |||
| | Service | application developers. | | +---------------+-------------+------------------------------------+ | |||
| | Intent | Example: API for request network | | | Application | End-User | End-user service / application | | |||
| | | bandwidth and latency for | | | Developer | Intent | intent API provided to the | | |||
| | | hosting video conference. | | | | | application developers. | | |||
| +---------------------------------------------------+ | | | | | | |||
| | Network | Network API provided to application | | | | | Example: API for request to open a | | |||
| | Intent | developers. | | | | | VPN service. | | |||
| | | Example: API for request of network | | | +-------------+------------------------------------+ | |||
| | | devices configuration. | | | | Network | Network service API provided to | | |||
| +---------------------------------------------------+ | | | Service | application developers. | | |||
| | Operational | Operational task intent API provided| | | | Intent | | | |||
| | Task Intent | to the trusted application developer| | | | | Example: API for request network | | |||
| | | (internal DevOps). | | | | | bandwidth and latency for hosting | | |||
| | | Example: API for requesting | | | | | a video conference. | | |||
| | | automatic monitoring and | | | +-------------+------------------------------------+ | |||
| | | interception for network security | | | | Network | Network API provided to | | |||
| +---------------------------------------------------+ | | | Intent | application developers. | | |||
| | Strategy | Application developer designs | | | | | | | |||
| | Intent | models, policy intents and building | | | | | Example: API for requesting | | |||
| | | blocks to be used by other intents. | | | | | network device configuration. | | |||
| | | This is for the trusted internal | | | +-------------+------------------------------------+ | |||
| | | DevOps. | | | | Operational | Operational task intent API | | |||
| | | Example: API for strategy intent in | | | | Task Intent | provided to the trusted | | |||
| | | case of emergencies. | | | | | application developer (internal | | |||
| | | | | | | | DevOps). | | |||
+--------------+-------------+-------------------------------------+ | | | | | | |||
Table 6 - Intent Classification for Enterprise Solution | | | | Example: API for requesting | | |||
| | | automatic monitoring and | | ||||
| | | interception for network security. | | ||||
| +-------------+------------------------------------+ | ||||
| | Strategy | Application developer designs | | ||||
| | Intent | models, policy intents, and | | ||||
| | | building blocks to be used by | | ||||
| | | other intents. This is for the | | ||||
| | | trusted internal DevOps. | | ||||
| | | | | ||||
| | | Example: API for strategy intent | | ||||
| | | in case of emergencies. | | ||||
+---------------+-------------+------------------------------------+ | ||||
6.5.2. Intent Categories | Table 4: Intent Classification for Enterprise Solution | |||
6.5.2. Intent Categories | ||||
The following are the proposed categories: | The following are the proposed categories: | |||
o Intent Scope: C1=Connectivity, C2=Security/Privacy, | ||||
C3=Application, C4=QoS | Intent Scope: C1=Connectivity, C2=Security/Privacy, C3=Application, | |||
o Network (Net) Scope: C1=Campus, C2=Branch, C3=SD-WAN | C4=QoS | |||
o Abstraction (ABS): C1=Technical (with technical feedback), | ||||
C2=Non-technical (without technical feedback), see section 5.2. | Network (Net) Scope: C1=Campus, C2=Branch, C3=SD-WAN | |||
o Life-cycle (L-C): C1=Persistent (full life-cycle), C2=Transient | ||||
(short lived) | Abstraction (ABS): C1=Technical (with technical feedback), C2=Non- | |||
technical (without technical feedback) (see Section 5.2) | ||||
Life cycle (L-C): C1=Persistent (full life cycle), C2=Transient | ||||
(short lived) | ||||
The following is the intent classification table example for | The following is the intent classification table example for | |||
enterprise solutions. | enterprise solutions. | |||
+---------------+-------------+-----------+--------+-----+-----+ | +---------------+-------------+-----------+--------+-----+-----+ | |||
| Intent User | Intent Type | Intent | Net | ABS | L-C | | | Intent User | Intent Type | Intent | Net | ABS | L-C | | |||
| | | Scope | | | | | | | | Scope | | | | | |||
| | +-----------+--------+-----+-----+ | | | +-----------+--------+-----+-----+ | |||
| | |C1|C2|C3|C4|C1|C2|C3|C1|C2|C1|C2| | | | |C1|C2|C3|C4|C1|C2|C3|C1|C2|C1|C2| | |||
+---------------+-------------+--+--+--+--+--+--+--+--+--+--+--+ | +---------------+-------------+--+--+--+--+--+--+--+--+--+--+--+ | |||
| End-User | Customer | | | | | | | | | | | | | | End User | Customer | | | | | | | | | | | | | |||
| | Service | | | | | | | | | | | | | | | Service | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | |||
| +-------------+--+--+--+--+--+--+--+--+--+--+--+ | | +-------------+--+--+--+--+--+--+--+--+--+--+--+ | |||
| | Strategy | | | | | | | | | | | | | | | Strategy | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | |||
+---------------+-------------+--+--+--+--+--+--+--+--+--+--+--+ | +---------------+-------------+--+--+--+--+--+--+--+--+--+--+--+ | |||
| Enterprise | Network | | | | | | | | | | | | | | Enterprise | Network | | | | | | | | | | | | | |||
| Administrator | Service | | | | | | | | | | | | | | Administrator | Service | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | |||
| +-------------+--+--+--+--+--+--+--+--+--+--+--+ | | +-------------+--+--+--+--+--+--+--+--+--+--+--+ | |||
skipping to change at page 43, line 11 ¶ | skipping to change at line 1712 ¶ | |||
| | Network | | | | | | | | | | | | | | | Network | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | |||
| +-------------+--+--+--+--+--+--+--+--+--+--+--+ | | +-------------+--+--+--+--+--+--+--+--+--+--+--+ | |||
| | Operational | | | | | | | | | | | | | | | Operational | | | | | | | | | | | | | |||
| | Task | | | | | | | | | | | | | | | Task | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | |||
| +-------------+--+--+--+--+--+--+--+--+--+--+--+ | | +-------------+--+--+--+--+--+--+--+--+--+--+--+ | |||
| | Strategy | | | | | | | | | | | | | | | Strategy | | | | | | | | | | | | | |||
| | Intent | | | | | | | | | | | | | | | Intent | | | | | | | | | | | | | |||
+---------------+-------------+--+--+--+--+--+--+--+--+--+--+--+ | +---------------+-------------+--+--+--+--+--+--+--+--+--+--+--+ | |||
Table 7 - Intent Categories for Enterprise Solution | ||||
7. Conclusions | Figure 5: Intent Categories for Enterprise Solution | |||
7. Conclusions | ||||
This document is aligned with the RG objectives and supports | This document is aligned with the RG objectives and supports | |||
investigations into intent-based networking by proposing an intent | investigations into intent-based networking by proposing an intent | |||
categorization methodology and taxonomy. It brings clarification on | categorization methodology and taxonomy. It brings clarification to | |||
what an intent represents for different stakeholders through the | what an intent represents for different stakeholders through the | |||
proposal of an Intent Classification approach, ensuring that a | proposal of an intent classification approach, ensuring that a common | |||
common understanding among all the participants exists. This, | understanding among all the participants exists. This, together with | |||
together with the proposed intent taxonomy provides a solid | the proposed intent taxonomy provides a solid foundation for future | |||
foundation for future intent-related topic discussions within NMRG. | intent-related discussions within the NMRG. | |||
The benefits of this intent classification draft in the research | The benefits of this intent classification document in the research | |||
community have been demonstrated through a PoC implementation [POC- | community have been demonstrated through a PoC implementation | |||
IBN] in which the draft's concepts at different levels corresponding | [POC-IBN] in which the document's concepts have been applied at | |||
to different stakeholders have been applied to. | different levels corresponding to different stakeholders. | |||
8. Security Considerations | 8. Security Considerations | |||
This document identifies the security and privacy as categories of | This document identifies security and privacy as categories of the | |||
the intent scope. The intents could be solely security intents and | intent scope. The intents could be solely security intents and | |||
privacy intents or security can be embedded in the intents that | privacy intents, or security can be embedded in the intents that | |||
include also connectivity, application, and QoS scope. | include also connectivity, application, and QoS scope. | |||
Security and privacy scope, is when the intent specifies the security | Security and privacy scope is when the intent specifies the security | |||
characteristics of the network, customers, or end-users, and privacy | characteristics of the network, customers, or end users, and privacy | |||
for customers and end-users. | for customers and end users. | |||
More details of these security intents would be described in future | ||||
documents that specify architecture, functionality, user intents and | ||||
models. As well, an analysis of the security considerations of the | ||||
overall intent-based system is provided in section 10 of [CLEMM]. | ||||
9. IANA Considerations | ||||
This document has no actions for IANA. | ||||
10. Contributors | ||||
The following people all contributed to creating this document: | More details of these security intents will be described in future | |||
documents that specify architecture, functionality, user intents, and | ||||
models. An analysis of the security considerations of the overall | ||||
intent-based system is provided in Section 9 of [RFC9315]. | ||||
Contributed significant text: | 9. IANA Considerations | |||
Xueyuan Sun, China Telecom | This document has no IANA actions. | |||
Will (Shucheng) Liu, Huawei | ||||
Contributed text in early drafts: | 10. Informative References | |||
Ying Chen, China Unicom | ||||
John Strassner, Huawei | ||||
Weiping Xu, Huawei | ||||
Richard Meade, Huawei | ||||
11. Acknowledgments | [Banerjee21] | |||
Banerjee, A., Mwanje, S., and G. Carle, "Contradiction | ||||
Management in Intent-driven Cognitive Autonomous RAN", | ||||
September 2021. | ||||
This document has benefited from reviews, suggestions, comments and | [Bezahaf19] | |||
proposed text provided by the following members, listed in | Bezahaf, M., Hernandez, M., Bardwell, L., Davies, E., | |||
alphabetical order: Mehdi Bezahaf, Brian E Carpenter, Laurent | Broadbent, M., King, D., and D. Hutchison, "Self-Generated | |||
Ciavaglia, Benoit Claise, Alexander Clemm, Yehia Elkhatib, Jerome | Intent-Based System", 10th International Conference on | |||
Francois, Pedro Andres Aranda Gutierrez, Daniel King, Branislav | Networks of the Future (NoF), | |||
Meandzija, Bob Natale, Juergen Schoenwaelder, Xiaolin Song, Jeff | DOI 10.1109/NoF47743.2019.9015045, October 2019, | |||
Tantsura. | <https://doi.org/10.1109/NoF47743.2019.9015045>. | |||
We thank to Barbara Martini, Walter Cerroni, Molka Gharbaoui, Davide | [Bezahaf21] | |||
Borsatti, for contributing with their 'A multi-level approach to | Bezahaf, M., Davies, E., Rotsos, C., and N. Race, "To All | |||
IBN' PoC demonstration a first attempt to adopt the intent | Intents and Purposes: Towards Flexible Intent Expression", | |||
classification methodology. | IEEE 7th International Conference on Network | |||
Softwarization (NetSoft), | ||||
DOI 10.1109/NetSoft51509.2021.9492554, July 2021, | ||||
<https://doi.org/10.1109/NetSoft51509.2021.9492554>. | ||||
12. Informative References | [Davoli21] Davoli, G., "Programmability and Management of Software- | |||
Defined Network Infrastructures", 2021. | ||||
[Bezahaf21] Bezahaf, M., Davies, E., Rotsos, C. and Race, N., "To All | [IFIP-NSM] IFIP, "Network and Service Management Taxonomy", | |||
Intents and Purposes: Towards Flexible Intent Expression," | <https://www.simpleweb.org/ifip/taxonomy.html>. | |||
2021 IEEE 7th International Conference on Network | ||||
Softwarization (NetSoft), 2021. | ||||
[Bezhaf19] Bezahaf, M., Hernandez, MP, Bardwell, L., Davies, E., | [Jacobs18] Jacobs, A., Pfitscher, R., Ferreira, R., and L. Granville, | |||
Broadbent, M.,King, D. and Hutchison, D. , "Self-Generated | "Refining Network Intents for Self-Driving Networks", | |||
Intent-Based System," 2019 10th International Conference on | Proceedings of the Afternoon Workshop on Self-Driving | |||
Networks of the Future (NoF), 2019. | Networks (SelfDN), DOI 10.1145/3229584.3229590, August | |||
2018, <https://doi.org/10.1145/3229584.3229590>. | ||||
[Jacobs18] Jacobs, A.S., Pfitscher,R.J., Ferreira, R.A., and | [Leivadeas21] | |||
Granville, L.Z., "Refining Network Intents for Self-Driving | Leivadeas, A. and M. Falkner, "VNF Placement Problem: A | |||
Networks", Proceedings of the Afternoon Workshop on Self- | Multi-Tenant Intent-Based Networking Approach", 24th | |||
Driving Networks (SelfDN 2018), 2018. | Conference on Innovation in Clouds, Internet and Networks | |||
and Workshops (ICIN), DOI 10.1109/ICIN51074.2021.9385553, | ||||
March 2021, | ||||
<https://doi.org/10.1109/ICIN51074.2021.9385553>. | ||||
[Banerjee21] Banerjee,A., Mwanje. S. and Carle, G., "Contradiction | [Mehmood21] | |||
Management in Intent-driven Cognitive Autonomous RAN", | Mehmood, K., Kralevska, K., and D. Palma, "Intent-driven | |||
2021. | Autonomous Network and Service Management in Future | |||
Networks: A Structured Literature Review", | ||||
DOI 10.48550/arXiv.2108.04560, August 2021, | ||||
<https://doi.org/10.48550/arXiv.2108.04560>. | ||||
[Tian19] Tian, B., Zhang, X., Zhai, E., Liu, H. H., Ye, Q., Wang, C., | [ONF] Open Networking Foundation, "Intent NBI - Definition and | |||
and Zhao, B. Y., "Safely and automatically updating in- | Principles", October 2016, | |||
network ACL configurations with intent language", SIGCOMM | <https://opennetworking.wpengine.com/wp- | |||
'19, 2019. | content/uploads/2014/10/TR- | |||
523_Intent_Definition_Principles.pdf>. | ||||
[Leivadeas21] Leivadeas, A. and Falkner, M., "VNF Placement Problem: | [ONOS] Koshibe, A., "Intent Framework", 2016, | |||
A Multi-Tenant Intent-Based Networking Approach," 24th | <https://wiki.onosproject.org/display/ONOS/ | |||
Conference on Innovation in Clouds, Internet and Networks | Intent+Framework/>. | |||
and Workshops (ICIN), 2021. | ||||
[Davoli21] Davoli, G., "Programmability and Management of Software- | [Padovan20] | |||
defined Network Infrastructures", 2021. | Padovan, S., "Design and Implementation of a Blockchain | |||
Intent Management System", November 2020. | ||||
[Padovan20] Padovan, S., "Design and Implementation of a Blockchain | [POC-IBN] Martini, B., Cerroni, W., Gharbaoui, M., and D. Borsatti, | |||
Intent Management System", 2020. | "A Multi-Level Approach to IBN", IETF 108 Hackathon | |||
Report, July 2020, | ||||
<https://www.ietf.org/proceedings/108/slides/slides-108- | ||||
nmrg-ietf-108-hackathon-report-a-multi-level-approach-to- | ||||
ibn-02>. | ||||
[Mehmood21] Mehmood, K., Kralevska, K., and Palma, D., "Intent-driven | [RFC9315] Clemm, A., Ciavaglia, L., Granville, L. Z., and J. | |||
Autonomous Network and Service Management in Future | Tantsura, "Intent-Based Networking - Concepts and | |||
Networks: A Structured Literature Review", 2021. | Definitions", RFC 9315, DOI 10.17487/RFC9315, October | |||
2022, <https://www.rfc-editor.org/info/rfc9315>. | ||||
[Szilagyi21] Szilagyi, P., "I2BN: Intelligent Intent Based Networks", | [Szilagyi21] | |||
Journal of ICT Standardization, 2021. | Szilágyi, P., "I2BN: Intelligent Intent Based Networks", | |||
Journal of ICT Standardization, Volume 9, Issue 2, | ||||
DOI 10.13052/jicts2245-800X.926, June 2021, | ||||
<https://doi.org/10.13052/jicts2245-800X.926>. | ||||
[POC-IBN] Barbara Martini, Walter Cerroni, Molka Gharbaoui, Davide | [Tian19] Tian, B., Zhang, X., Zhai, E., Liu, H., Ye, Q., Wang, C., | |||
Borsatti, "A multi-level approach to IBN", July 2020, | Wu, X., Ji, Z., Sang, Y., Zhang, M., Yu, D., Tian, C., | |||
https://www.ietf.org/proceedings/108/slides/slides-108- | Zheng, H., and B. Zhao, "Safely and automatically updating | |||
nmrg-ietf-108-hackathon-report-a-multi-level-approach-to- | in-network ACL configurations with intent language", | |||
ibn-02 | SIGCOMM '19: Proceedings of the ACM Special Interest Group | |||
on Data Communication, DOI 10.1145/3341302.3342088, August | ||||
2019, <https://doi.org/10.1145/3341302.3342088>. | ||||
[IFIP-NSM] IFIP - Network and Service Management Taxonomy, | [TMF-AUTO] Boasman-Patel, A., Sun, D., Wang, Y., Maitre, C., | |||
https://www.simpleweb.org/ifip/taxonomy.html | Domingos, J., Troullides, Y., Mas, I., Traver, G., and G. | |||
Lupo, "Autonomous Networks: Empowering Digital | ||||
Transformation For The Telecoms Industry", May 2019. | ||||
[ONF] ONF, "Intent Definition Principles", 2017, | Acknowledgments | |||
<https://www.opennetworking.org/images/stories/downloads/ | ||||
sdn-resources/technical-reports/TR- | ||||
523_Intent_Definition_Principles.pdf>. | ||||
[ONOS] ONOS, "ONOS Intent Framework", 2017, | This document has benefited from reviews, suggestions, comments, and | |||
<https://wiki.onosproject.org/display/ONOS/Intent+Framework | proposed text provided by the following members listed in | |||
/>. | alphabetical order: Mehdi Bezahaf, Brian E. Carpenter, Laurent | |||
Ciavaglia, Benoit Claise, Alexander Clemm, Yehia Elkhatib, Jerome | ||||
Francois, Pedro Andres Aranda Gutierrez, Daniel King, Branislav | ||||
Meandzija, Bob Natale, Juergen Schoenwaelder, Xiaolin Song, and Jeff | ||||
Tantsura. | ||||
[CLEMM] A. Clemm, L. Ciavaglia, L. Granville, J. Tantsura, "Intent- | We thank Barbara Martini, Walter Cerroni, Molka Gharbaoui, and Davide | |||
Based Networking - Concepts and Overview", Work in | Borsatti for contributing with their "A multi-level approach to IBN" | |||
Progress, draft-irtf-nmrg-ibn-concepts-definitions-05, | PoC demonstration, a first attempt to adopt the intent classification | |||
February 2021, https://tools.ietf.org/html/draft-irtf-nmrg- | methodology. | |||
ibn-concepts-definitions-05 | ||||
[TMF-auto] Aaron Richard Earl Boasman-Patel,et, A whitepaper of | Contributors | |||
Autonomous Networks: Empowering Digital Transformation For | ||||
the Telecoms Industry, inform.tmforum.org, 15 May, 2019. | ||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | The following people all contributed to creating this document: | |||
Requirement Levels", BCP 14, RFC 2119, March 1997. | ||||
[RFC7575] Behringer, M., Pritikin, M., Bjarnason, S., Clemm, A., | Contributed significant text: | |||
Carpenter, B., Jiang, S., and L. Ciavaglia, "Autonomic | ||||
Networking: Definitions and Design Goals", RFC 7575, June | ||||
2015. | ||||
[RFC8328] Liu, W., Xie, C., Strassner, J., Karagiannis, G., Klyus, | Xueyuan Sun | |||
M., Bi, J., Cheng, Y., and D. Zhang, "Policy-Based | China Telecom | |||
Management Framework for the Simplified Use of Policy | ||||
Abstractions (SUPA)", March 2018. | ||||
[RFC3198] Westerinen, A., Schnizlein, J., Strassner, J., | Will (Shucheng) Liu | |||
Scherling, M., Quinn, B., Herzog, S., Huynh, A., Carlson, | Huawei | |||
M., Perry, J., Waldbusser, S., "Terminology for Intent- | ||||
driven Management", RFC 3198, November 2001. | ||||
[RFC6020] Bjorlund, M., "YANG - A Data Modelling Language for Network | Contributed text in early draft versions of this document: | |||
Configuration Protocol (NETCONF)", RFC 6020, October 2010. | ||||
[RFC7285] R. Alimi, R. Penno, Y. Yang, S. Kiesel, S. Previdi, W. | Ying Chen | |||
Roome, S. Shalunov, R. Woundy "Application-Layer Traffic | China Unicom | |||
Optimization (ALTO) Protocol", September 2014. | ||||
[ANIMA] Du, Z., "ANIMA Intent Policy and Format", 2017, | John Strassner | |||
<https://datatracker.ietf.org/doc/draft-du-anima-an- | Huawei | |||
intent/>. | ||||
[SUPA] Strassner, J., "Simplified Use of Policy Abstractions", | Weiping Xu | |||
2017, <https://datatracker.ietf.org/doc/draft-ietf-supa- | Huawei | |||
generic-policy-info-model/?include_text=1>. | ||||
[ANIMA-Prefix] Jiang, S., Du, Z., Carpenter, B., and Q. Sun, | Richard Meade | |||
"Autonomic IPv6 Edge Prefix Management in Large-scale | Huawei | |||
Networks", draft-ietf-anima-prefix-management-07 (work in | ||||
progress), December 2017. | ||||
Authors' Addresses | Authors' Addresses | |||
Chen Li | Chen Li | |||
China Telecom | China Telecom | |||
No.118 Xizhimennei street, Xicheng District | Xicheng District | |||
Beijing 100035 | No.118 Xizhimennei street | |||
P.R. China | Beijing | |||
Email: lichen.bri@chinatelecom.cn | 100035 | |||
China | ||||
Email: lichen6@chinatelecom.cn | ||||
Olga Havel | Olga Havel | |||
Huawei Technologies | Huawei Technologies | |||
Ireland | Ireland | |||
Email: olga.havel@huawei.com | Email: olga.havel@huawei.com | |||
Adriana Olariu | Adriana Olariu | |||
Huawei Technologies | Huawei Technologies | |||
Ireland | Ireland | |||
Email: adriana.olariu@huawei.com | Email: adriana.olariu@huawei.com | |||
Pedro Martinez-Julia | Pedro Martinez-Julia | |||
NICT | NICT | |||
Japan | Japan | |||
Email: pedro@nict.go.jp | Email: pedro@nict.go.jp | |||
Jeferson Campos Nobre | Jeferson Campos Nobre | |||
Federal University of Rio Grande do Sul | Federal University of Rio Grande do Sul (UFRGS) | |||
Porto Alegre | Porto Alegre-RS | |||
Brazil | Brazil | |||
Email: jcnobre@inf.ufrgs.br | Email: jcnobre@inf.ufrgs.br | |||
Diego R. Lopez | Diego R. Lopez | |||
Telefonica I+D | Telefonica I+D | |||
Don Ramon de la Cruz, 82 | Don Ramon de la Cruz, 82 | |||
Madrid 28006 | 28006 Madrid | |||
Spain | Spain | |||
Email: diego.r.lopez@telefonica.com | Email: diego.r.lopez@telefonica.com | |||
End of changes. 312 change blocks. | ||||
1279 lines changed or deleted | 1387 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |