Internet-Draft Intent Translation Engine March 2024
Martinez-Julia & Jeong Expires 6 September 2024 [Page]
Workgroup:
Network Management Research Group
Internet-Draft:
draft-pedro-ite-01
Published:
Intended Status:
Standards Track
Expires:
Authors:
P. Martinez-Julia, Ed.
NICT
J. Jeong, Ed.
Sungkyunkwan University

Intent Translation Engine for Intent-Based Networking

Abstract

This document specifies the schemas and models required to realize the data formats and interfaces for Intent-Based Networking (IBN). They are needed to enable the composition of services to build a translation engine for IBN-based network management. This intent translation engine (called an intent translator) is an essential function for network intents to be enforced into a target network for the configuration and management of the network and its security.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 6 September 2024.

Table of Contents

1. Introduction

The increased difficulty to define management goals and policies enforced to networks and security has raised the definition of Intent-Based Networking (IBN). It abstracts the definition of those goals and policies in the form of network intents.

An intent is a declarative statement to request a configuration or management for a network or security function [TS-28.312][TR-28.812]. It addresses more on "What" is needed (i.e., declarative statement) to be fulfilled than "How" it should be fulfilled (i.e., imperative statement).

For IBN to be properly realized, it is envisioned that many stakeholders would be involved in the translation of network intents to particular policies and configurations. Thus, there will be many components and services that would be composed to construct a solution to implement network intents.

This document specifies the schemas and models required to realize the data formats and interfaces for IBN-based network management. They are needed to enable the composition of services to build a translation engine for network intents, namely Intent Translation Engine (or Intent Translator).

2. Terminology

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119].

3. Intent Translation Engine

This document specifes the required data formats and interfaces that MUST be implmeented by the components of an Intent Translation Engine (ITE), that is, an Intent Translator. Therefore, this extends the Intent Classification in [RFC9316] and drives the implementation of the specifications REQUIRED to propertly classify network intents.

3.1. Iteraction Between the ITE and Network Tentants

The data formats required for enabling interaction between the ITE and network tenants are as follows:

The intefaces required for enabling interaction between the ITE and network tenants are as follows:

This document will also specify the minimum set of semantics that must be supported by any ITE and discovered by the interactions described in this section.

3.2. Iteraction Between the ITE and Network Management Systems

The data formats required for enabling interaction between the ITE and network management systems are as follows:

The intefaces required for enabling interaction between the ITE and network management systems are as follows:

This document will also specify the minimum set of management mechanisms that must be provided by a management system for proper intent support.

3.3. Iteraction Between the ITE and VIM

The data formats required for enabling interaction between the ITE and the Virtualized Infrastructure Manager (VIM) are as follows:

The intefaces required for enabling interaction between the ITE and the VIM are as follows:

This document will also specify the minimum set of network resources and VNFs that must be provided by a VIM for proper intent support.

3.4. Iteraction Between the ITE and External Services

The data formats required for enabling interaction between the ITE and external services are as follows:

The intefaces required for enabling interaction between the ITE and external services are as follows:

4. Implementation Guide

This document will specify an abstract algorithm that allows an ITE (i.e., intent translator) to obtain a set of network service definitions and the composition of management mechanisms that implements the required policies or rules from a set of inputs. The ITE can translate an intent into a network policy for a target network [I-D.jeong-nmrg-ibn-network-management-automation][I-D.yang-i2nsf-security-policy-translation].

The inputs are:

  1. The intent provided by the tenant or some external agent.

  2. A set of management mechanisms -- retrieved from some management system available.

  3. A set of VNFs and network resources -- retrieved from some VIM.

The abstract algorithm helps obtaining validated network service definitions and management mechanism compositions which are valid for the available instantiation infrastructure.

5. Information Model

TBD

6. Relation to Other IETF/IRTF Initiatives

TBD

7. IANA Considerations

This document does not require any IANA actions.

8. Security Considerations

As with other AI mechanisms, a major security concern for the adoption of intelligent reasoning on external events to manage SDN/NFV systems is that the boundaries of the control and management planes are crossed to introduce information from outside. Such communications MUST be highly and heavily secured since some malfunction or explicit attacks might compromise the integrity and execution of the controlled system (i.e., target entity) such as router, switch, and firewall. However, it is up to implementers to deploy the necessary countermeasures to avoid such situations. From the design point of view, since all operations are performed within the control and/or management planes, the security level of reasoning solutions is inherited and thus determined by the security measures established by the systems conforming to such planes.

9. Acknowledgments

This work was supported in part by Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korea Ministry of Science and ICT (MSIT)(No. 2022-0-01015, Development of Candidate Element Technology for Intelligent 6G Mobile Core Network).

10. References

10.1. Normative References

[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/info/rfc2119>.
[RFC9232]
Song, H., Qin, F., Martinez-Julia, P., Ciavaglia, L., and A. Wang, "Network Telemetry Framework", RFC 9232, DOI 10.17487/RFC9232, , <https://www.rfc-editor.org/info/rfc9232>.
[RFC9316]
Li, C., Havel, O., Olariu, A., Martinez-Julia, P., Nobre, J., and D. Lopez, "Intent Classification", RFC 9316, DOI 10.17487/RFC9316, , <https://www.rfc-editor.org/info/rfc9316>.

10.2. Informative References

[I-D.jeong-nmrg-ibn-network-management-automation]
Jeong, J. P., Ahn, Y., Kim, Y., and J. Jung-Soo, "Intent-Based Network Management Automation in 5G Networks", Work in Progress, Internet-Draft, draft-jeong-nmrg-ibn-network-management-automation-03, , <https://datatracker.ietf.org/doc/html/draft-jeong-nmrg-ibn-network-management-automation-03>.
[I-D.pedro-nmrg-ai-framework]
Martinez-Julia, P., Homma, S., and D. Lopez, "Artificial Intelligence Framework for Network Management", Work in Progress, Internet-Draft, draft-pedro-nmrg-ai-framework-04, , <https://datatracker.ietf.org/doc/html/draft-pedro-nmrg-ai-framework-04>.
[I-D.yang-i2nsf-security-policy-translation]
Jeong, J. P., Lingga, P., and J. Yang, "Guidelines for Security Policy Translation in Interface to Network Security Functions", Work in Progress, Internet-Draft, draft-yang-i2nsf-security-policy-translation-16, , <https://datatracker.ietf.org/doc/html/draft-yang-i2nsf-security-policy-translation-16>.
[TNSM-2018]
P. Martinez-Julia, V. P. Kafle, and H. Harai, "Exploiting External Events for Resource Adaptation in Virtual Computer and Network Systems, in IEEE Transactions on Network and Service Management. Vol. 15, n. 2, pp. 555--566, 2018.", .
[TR-28.812]
"Study on Scenarios for Intent Driven Management Services for Mobile Networks", Available: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3553, .
[TS-28.312]
"Intent Driven Management Services for Mobile Networks", Available: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3554, .

Appendix A. Changes from draft-pedro-ite-00

The following changes are made from draft-pedro-ite-00:

Authors' Addresses

Pedro Martinez-Julia (editor)
NICT
4-2-1, Nukui-Kitamachi, Koganei, Tokyo
184-8795
Japan
Jaehoon Paul Jeong (editor)
Department of Computer Science and Engineering
Sungkyunkwan University
2066 Seobu-Ro, Jangan-Gu
Suwon
Gyeonggi-Do
16419
Republic of Korea