Skip to main content

Interface to In-Network Functions (I2INF): Problem Statement
draft-jeong-opsawg-i2inf-problem-statement-02

Document Type Active Internet-Draft (individual)
Authors Jaehoon Paul Jeong , Yiwen Shen , Yoseop Ahn , Younghan Kim , Elias P. Duarte Jr. , Kehan Yao
Last updated 2024-11-03
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-jeong-opsawg-i2inf-problem-statement-02
Operations and Management Area Working Group               J. Jeong, Ed.
Internet-Draft                                                   Y. Shen
Intended status: Informational                                    Y. Ahn
Expires: 7 May 2025                              Sungkyunkwan University
                                                                  Y. Kim
                                                     Soongsil University
                                                           E. Duarte Jr.
                                            Federal University of Parana
                                                                  K. Yao
                                                            China Mobile
                                                         3 November 2024

      Interface to In-Network Functions (I2INF): Problem Statement
             draft-jeong-opsawg-i2inf-problem-statement-02

Abstract

   This document specifies the problem statement for the Interface to
   In-Network Functions (I2INF) for user services both on the network-
   level and application-level.  In-Network Functions (INF) include In-
   Network Computing Functions (INCF) which are defined in the context
   of Network Functions Virtualization (NFV) and Software-Defined
   Networking (SDN).  INF also includes In-Network Application Functions
   (INAF) which appear in the context of Internet-of-Things (IoT)
   Devices, Software-Defined Vehicles (SDV), and Unmanned Aerial
   Vehicles (UAV).  Intent-Based Networking (IBN) can be used to compose
   user services and consist of a combination of INFs in a target
   network.  This document investigates the need for a standard
   framework with the interfaces for INFs, in terms of applications with
   the need to run Artificial Intelligence (AI) in the network and
   interoperability among multi-vendor INFs.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

Jeong, et al.              Expires 7 May 2025                   [Page 1]
Internet-Draft           I2INF Problem Statement           November 2024

   This Internet-Draft will expire on 7 May 2025.

Copyright Notice

   Copyright (c) 2024 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   5
   3.  Problem Statement for Interface to In-Network Functions . . .   6
     3.1.  In-Network Computing Functions  . . . . . . . . . . . . .   8
     3.2.  Intent-Based Networking . . . . . . . . . . . . . . . . .  10
     3.3.  Problem Statement . . . . . . . . . . . . . . . . . . . .  11
   4.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  12
   5.  Security Considerations . . . . . . . . . . . . . . . . . . .  12
   6.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  12
     6.1.  Normative References  . . . . . . . . . . . . . . . . . .  12
     6.2.  Informative References  . . . . . . . . . . . . . . . . .  13
   Appendix A.  Changes from
           draft-jeong-opsawg-i2inf-problem-statement-01 . . . . . .  18
   Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . .  18
   Contributors  . . . . . . . . . . . . . . . . . . . . . . . . . .  18
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  19

1.  Introduction

   Network softwarization has been widely adopted in multiple
   environments, such as in cloud and edge computing, as well as in the
   network infrastructure itself, facilitating the deployment of network
   services (e.g., 5G mobile networks [TS-23.501]).  The multiple
   technologies behind network softwarization include Network Functions
   Virtualization (NFV) [ETSI-NFV][ETSI-NFV-Release-2] and Software-
   Defined Networking (SDN) [RFC7149].  Furthermore, there is also an
   integration with Intent-Based Networking (IBN)
   [RFC9315][Survey-IBN-CST-2023], which can be used to define and
   deploy intelligent network services as well as intelligent
   application services.  End-user devices such as smartphones and

Jeong, et al.              Expires 7 May 2025                   [Page 2]
Internet-Draft           I2INF Problem Statement           November 2024

   smartwatches are connected to various Internet-of-Things (IoT)
   devices for customer-tailored services.  Recently, Software-Defined
   Vehicles (SDVs) [AUTOSAR-SDV][Eclipse-SDV][COVESA] have the potential
   to become as popular as smartphones.  SDVs are intended to use
   network softwarization technologies such as NFV and SDN.  System
   components and applications in the context of SDVs are usually
   executed on containers in a cloud native environment and can be
   orchestrated for instance with Kubernetes [Kubernetes].

   There is an undeniable trend towards using Artificial Intelligence
   (AI) to improve multiple complex network operations.  AI can, for
   instance, enable the creation of dynamic, adaptable security
   policies, which are particularly important in the cloud-edge-core-
   continuum, which is by definition a heterogeneous environment to
   which different parts can bring advantages, challenges and threats.
   AI has been successfully used in the context of intrusion detection,
   but it also improves troubleshooting, being able to predict problems
   before they occur.  AI can learn from telemetry data collected from
   multiple networks and reach conclusions that can be applied globally
   or to individual networks.  In all these cases, there are tremendous
   benefits to running AI processes within the network itself.

   In this context, network automation and management have become
   critical.  It is important to facilitate the construction of
   intelligent services and applications for both network operators and
   end users [I-D.jeong-nmrg-ibn-network-management-automation].  A user
   intent (who can be an end user or network operator) in the form of
   either text or voice needs to be understood and processed by the
   system.  An intent is a declarative request for a specific goal
   rather than an imperative request having a series of configuration or
   commands for specific operations.  Thus, an intent needs to be
   translated into a network policy or an application policy that
   satisfies the user request.  A network policy consists of rules to
   execute a user intent, which can be for instance defined in terms of
   Quality of Service (QoS) requirements, defining targets for metrics
   such as throughput and delay.  An application policy consists of
   rules to execute the service's application demands, for example in
   terms of functionality and timing.  After network and application
   polices are translated, there is a need to invoke the appropriate
   Network Functions (NF) in the network infrastructure, edge, or cloud.

   Thus, a user intent has to be translated either into a network policy
   executed as a network service on the network infrastructure or an
   application policy for an application service.  For example, services
   for user applications (e.g., video conference) need to be accurately
   configured and efficiently processed by not only Application
   Functions (AF) such as a client (e.g., a video conference client) and
   a server (e.g., a video conference server), but also Network

Jeong, et al.              Expires 7 May 2025                   [Page 3]
Internet-Draft           I2INF Problem Statement           November 2024

   Functions (NF) (e.g., video broadcast coordinator) defined in the
   context of Computing in the Network (COIN)
   [I-D.irtf-coinrg-use-cases][NFV-COIN].

   In the context of Computing in the Network (COIN) terminology
   [I-D.irtf-coinrg-coin-terminology], a Programmable Network Device
   (PND) in an In-Network Computing (INC) environment can have multiple
   kinds of features and capabilities.  A PND can also interact with
   other PNDs.  PNDs from different product lines or vendors can provide
   different functionalities for INC functions.  In order to compose a
   COIN system consisting of multiple PDNs that interact among
   themselves, it is necessary to define a standard interface for PNDs
   to expose so that they can learn about each other's capabilities and
   properly interact.

   A standard framework to define the interfaces of Application
   Functions (AFs) and Network Functions (NFs) is required to allow the
   configuration and monitoring of applications and network services
   consisting of those functions.  There is currently no standard data
   model to describe the capabilities of AFs and NFs.  Furthermore,
   there is no standard data model defining an interface to register the
   capabilities of AFs and NFs on a controller-like device that would
   process service requests for those functions.  In addition, there are
   no standard interfaces to configure and monitor those AFs and NFs
   according to user's intent.  The Interface to Network Security
   Functions (I2NSF) was standardized for the control and management of
   Network Security Services with Network Security Functions (NSFs)
   [RFC8329][I-D.ietf-i2nsf-applicability].  The present document is
   defined taking into account the I2NSF document, but the purpose is
   beyond the scope of Security Functions, defining a more general
   control and management framework for intelligent services consisting
   of AFs and NFs.

   This document specifies the problem statement and use cases for the
   Interface to In-Network Functions (I2INF) considering arbitrary In-
   Network Functions (INFs) presenting arbitrary features and
   capabilities.  The INFs consist of Network Functions (NFs) including
   PNDs and Application Functions (AFs) in order to compose a user's
   services.  First of all, INFs include In-Network Computing Functions
   (INCF) which are NFs defined within the context of NFV and SDN
   [I-D.irtf-coinrg-use-cases].  Secondly, they also include In-Network
   Application Functions (INAF) which are AFs employed by Internet-of-
   Things (IoT) Devices, Software-Defined Vehicles (SDV)
   [AUTOSAR-SDV][Eclipse-SDV][COVESA], and Unmanned Aerial Vehicles
   (UAV).  Finally, this document shows how Intent-Based Networking
   (IBN) can be realized with the proposed I2INF framework and its
   interfaces for user services that consist of a combination of INFs in
   a target network.

Jeong, et al.              Expires 7 May 2025                   [Page 4]
Internet-Draft           I2INF Problem Statement           November 2024

   Note that a standard framework for In-Network Functions is the only
   way to provide the interoperability of diverse autonomous systems and
   networks on the service-level.  The proposed I2INF allows the
   integration of existing and new services implemented with different
   technologies, at different locations (e.g., cloud or edge) each with
   different requirements and functionalities.  It can also have an
   impact on innovation, as it provides a new level of integration for
   various INFs.  The standard interfaces for the INFs can also allow
   global-level decisions to be enforced, such as those related to
   elasticity and scalability.

2.  Terminology

   This document uses the terminology described in [RFC9315], [RFC8329],
   [I-D.irtf-coinrg-coin-terminology], [I-D.irtf-coinrg-use-cases],
   [I-D.jeong-i2nsf-security-management-automation],
   [I-D.jeong-nmrg-ibn-network-management-automation], and
   [I-D.yang-i2nsf-security-policy-translation].  In addition, the
   following terms are defined below:

   *  Intent: the set of operational goals (that a network should meet)
      and outcomes (that a network is supposed to deliver) defined in a
      declarative manner without specifying how they are achieved or
      should be implemented [RFC9315].

   *  Intent-Based System (IBS): the system that enforces an intent from
      a user (or administrator) into a target system (e.g., SDV).  An
      intent can be expressed in Natural Language (e.g., English) and
      can be translated into a policy (i.e., network policy and
      application policy) using Natural Language Processing (NLP)
      [USENIX-ATC-Lumi] [BERT] [Deep-Learning].  In this document, the
      intent can be translated into a corresponding high-level policy by
      an intent translator
      [I-D.jeong-i2nsf-security-management-automation].  The high-level
      policy can also be translated into the corresponding low-level
      policy by a policy translator
      [I-D.yang-i2nsf-security-policy-translation].  The low-level
      policy is dispatched to appropriate Service Functions (SFs).
      Through the monitoring of the SFs, the activity and performance of
      the SFs is monitored and analyzed.  If needed, the rules of the
      high-level or low-level network policy are augmented or new rules
      are generated and configured to appropriate SFs.

   *  Mobile Object (MO): the object that is capable of moving with its
      own power source and wireless communication capability, e.g., in
      the context of 5G Vehicle-to-Everything (e.g., 5G V2X).  An MO can
      be an Internet-of-Things (IoT) device, Software-Defined Vehicle
      (SDV) [AUTOSAR-SDV][Eclipse-SDV][COVESA], and Unmanned Aerial

Jeong, et al.              Expires 7 May 2025                   [Page 5]
Internet-Draft           I2INF Problem Statement           November 2024

      Vehicle (UAV).  An MO is a Programmable Network Device (PND)
      [I-D.irtf-coinrg-coin-terminology] that can be reconfigured for
      different network requirements inside the MO.

   *  In-Network Computing Functions (INCF): the service functions that
      do the computing in the network infrastructure.  They are a group
      of COIN programs [I-D.irtf-coinrg-coin-terminology] to provide
      required computing tasks and functions.

   *  In-Network Application Functions (INAF): the service functions
      that work for applications in Mobile Objects.  They are a group of
      COIN programs [I-D.irtf-coinrg-coin-terminology] to provide the
      required application tasks and functions.

   *  Interface to In-Network Functions (I2INF): the interfaces that are
      used between a pair of INFs for the interaction, configuration and
      monitoring.

   *  A Framework for the Interface to In-Network Functions (I2INF): the
      framework that consists of components and interfaces to configure
      and monitor INFs that can be employed by applications and services
      in the network infrastructure and MOs.

3.  Problem Statement for Interface to In-Network Functions

   This section starts with a description and examples of In-Network
   Computing Functions.  Next, an overview of Intent-Based Networking
   (IBN) is presented, and finally the Problem Statement for the
   Interface to In-Network Functions (I2INF).  Figure 1 shows Wireless
   and Wired Networks of a Central Cloud.  The I2INF framework includes
   network entities and Mobile Objects (MO).  Figure 2 shows a VNF-
   Consensus Architecture that allows the I2INF framework to synchronize
   flow table information of replicated SDN Controllers all in the same
   Edge Cloud [NFV-COIN].  These are example networks within the I2INF
   problem space.

Jeong, et al.              Expires 7 May 2025                   [Page 6]
Internet-Draft           I2INF Problem Statement           November 2024

                                  Central Cloud
                   *******************************************
                 *                                             *
                *              +------------------+             *
               *               | Cloud Controller |              *
               *               +------------------+              *
               *                         ^                       *
                *                        |                      *
                 *                       v                     *
                   *******************************************
                    ^                   ^                    ^
                    |                   |                    |
                    V                   V                    V
              +-----------+       +-----------+        +-----------+
              |Edge-Cloud1|       |Edge-Cloud2|        |Edge-Cloud3|
              +-----------+       +-----------+        +-----------+
                    ^                   ^                    ^
                    |                   |                    |
                    V                   V                    V
               +---------+         +---------+         +---------+
               | IP-RSU1 |<------->| IP-RSU2 |<------->| IP-RSU3 |
               +---------+         +---------+         +---------+
                    ^                   ^                    ^
                    :                   :                    :
           +-----------------+ +-----------------+   +-----------------+
           |        : V2I    | |        : V2I    |   |       : V2I     |
           |        v        | |        v        |   |       v         |
+--------+ |   +--------+    | |   +--------+    |   |   +--------+    |
|   MO1  |===> |   MO2  |===>| |   |   MO3  |===>|   |   |   MO4  |===>|
+--------+<...>+--------+<........>+--------+    |   |   +--------+    |
           V2V     ^         V2V        ^        |   |        ^        |
           |       : V2V     | |        : V2V    |   |        : V2V    |
           |       v         | |        v        |   |        v        |
           |  +--------+     | |   +--------+    |   |    +--------+   |
           |  |   MO5  |===> | |   |   MO6  |===>|   |    |   MO7  |==>|
           |  +--------+     | |   +--------+    |   |    +--------+   |
           +-----------------+ +-----------------+   +-----------------+
                 Subnet1              Subnet2              Subnet3
                (Prefix1)            (Prefix2)            (Prefix3)

        <----> Wired Link   <....> Wireless Link   ===> Moving Direction

     Figure 1: I2INF Framework: Wireless and Wired Networks in a
                            Central Cloud

Jeong, et al.              Expires 7 May 2025                   [Page 7]
Internet-Draft           I2INF Problem Statement           November 2024

                         Edge Cloud                      Central Cloud
         ******************************************        **********
        *                                          *     *            *
       *                                            *   * +----------+ *
       *  +---------------+   +-----------------+   *   * |  Cloud   | *
       *  | VNF-Consensus |<->| Edge Controller |<->*<->* |Controller| *
       *  +-------^-------+   +--------^--------+   *   * +----------+ *
       *          |                    |            *   *              *
        *         v                    V           *     *            *
         ******************************************        **********
         ^                    ^                    ^
         |                    |                    |
         V                    V                    V
 +---------------+    +---------------+    +---------------+
 |SDN-Controller1|    |SDN-Controller2|    |SDN-Controller3|
 +---------------+    +---------------+    +---------------+
         ^                    ^                    ^
         |                    |                    |
         V                    V                    V
 +---------------+    +---------------+    +---------------+
 |   +-----+     |    |   +-----+     |    |   +-----+     |
 |   | SW1 |     |    |   | SW3 |     |    |   | SW5 |     |
 |   +---^-+     |    |   +---^-+     |    |   +---^-+     |
 |       |       |    |       |       |    |       |       |
 |     +-V---+   |    |     +-V---+   |    |     +-V---+   |
 |     | SW2 |   |    |     | SW4 |   |    |     | SW6 |   |
 |     +-----+   |    |     +-----+   |    |     +-----+   |
 +---------------+    +---------------+    +---------------+
    SDN-Network1         SDN-Network2         SDN-Network3
      (Prefix1)            (Prefix2)            (Prefix3)

 <----> Wired Link

       Figure 2: I2INF Framework: VNF-Consensus in an Edge Cloud

3.1.  In-Network Computing Functions

   A large variety of In-Network Computing Functions (INCF) have been
   proposed for the implementation of various services implemented with
   COIN (COmputing In-the Network) which is based on network
   softwarization technologies, mainly NFV and SDN
   [I-D.irtf-coinrg-use-cases][NFV-COIN].

   The COIN Use Cases Document [I-D.irtf-coinrg-use-cases] proposes four
   kinds of use cases for In-Network Computing.  Those use cases are (i)
   Providing New COIN Experiences, (ii) Supporting New COIN Systems,
   (iii) Improving Existing COIN Capabilities, and (iv) Enabling New
   COIN Capabilities.

Jeong, et al.              Expires 7 May 2025                   [Page 8]
Internet-Draft           I2INF Problem Statement           November 2024

   1.  For Providing New COIN Experiences, the document describes mobile
       application offloading and Extended Reality (XR) and immersive
       media.

   2.  For Supporting New COIN Systems, the document describes In-
       Network Control, Time-Sensitive Applications, Large Volume
       Applications, and Industrial Safety.

   3.  For Improving Existing COIN Capabilities, the document describes
       Content Delivery Networks (CDN), Compute-Fabric-as-a-Service
       (CFaaS), and Virtual Network Programming (e.g., P4 programs and
       OpenFlow rules).

   4.  For Enabling New COIN Capabilities, the document describes
       Distributed AI Training among geographically dispersed endpoints
       for solving large-scale problems.

   NFV-COIN [NFV-COIN] describes three use cases for In-Network
   Computing.  Its use cases are (i) NFV Failure Detection, (ii) Virtual
   Network Function (VNF) Consensus, and (iii) NFV Reliable Broadcast.

   1.  NFV Failure Detection is an NFV-based failure detector that
       obtains monitoring data from SDN Switches via an SDN Controller
       and also detects the failure of communication links.  This
       failure detector is a standalone NF and is thus separated from
       the SDN Controller and thus it does not sacrifice SDN Controller
       performance (e.g., CPU usage).

   2.  VNF Consensus is a consensus service that performs the
       synchronization of the control planes of replicated SDN
       Controllers.  This consensus service does not require any
       modification of both the data plane and control plane of SDN
       switches and controllers.  Through the consensus service, if a
       new rule is configured by an SDN Controller, this rule is
       reliably distributed to all the other SDN Controllers through the
       VNF-Consensus service.

   3.  NFV Reliable Broadcast is an NFV-based broadcast service (NFV-
       RBCast) that provides both reliable and ordered delivery of
       messages.  This ordered broadcast is implemented by NFV-RBCast
       using a VNF-Sequencer.  A flow to be broadcast the NFV- RBCast
       service causes an SDN Controller to install a forwarding rule on
       the necessary SDN Switches.  All the packets of the flow are
       forwarded to the VNF-Sequencer.  The VNF-Sequencer inserts a
       sequence number into each of those forwarded packets, and sends
       them to the destination.

Jeong, et al.              Expires 7 May 2025                   [Page 9]
Internet-Draft           I2INF Problem Statement           November 2024

   Functionalities of each service need to be decomposed into AFs and
   NFs in edge computing.  The management and configuration of those AFs
   and NFs is a functionality that must be provided by a service
   coordinator in the context of COIN-based network services.  There is
   currently no framework or interfaces defined as standards specifying
   the life cycle of COIN-based services.

3.2.  Intent-Based Networking

   According to [RFC9315] the intent life cycle of an Intent-Based
   System (IBS) is shown in Figure 3.  The life cycle involves intent
   management for network entities and MOs.  RFC9215 divides the IBS
   life cycle into three spaces, namely MO User Space, Translation & IBS
   Space, and Network Operations (Ops) & Application (App) Space.  Each
   space is further subdivided into two sections, fulfillment and
   assurance.  The fulfillment section pipelines the steps (i.e., intent
   input, translation/refinement, learning/planning/rendering, and
   configuration/provisioning) toward the final SFs such as Network
   Functions (NFs) and Application Functions (AFs) in MOs.  The
   assurance section monitors final results of the intent fulfillment to
   validate and analyze the resulted NFs and applications for MOs.

         IBS User     :            Translation/          : Network Ops/
           Space      :             IBS Space            :  App Space
 Fulfill              :                                  :
        +----------+  :  +------------+   +------------+ : +-----------+
        |Recognize/|---->| Translate/ |-->|   Learn/   |-->| Configure/|
        | Generate |  :  |   Refine   |   |   Plan/    | : | Provision |
        | Intent   |<----|            |   |   Render   | : |           |
        +----------+  :  +------------+   +------------+ : +-----------+
             ^        :                         ^        :       |
 ............|..................................|................|.....
             |        :                    +----------+  :       v
             |        :                    | Validate |  :  +----------+
             |        :                    +----^-----+<----| Monitor/ |
 Assure      |        :                         |        :  | Observe  |
         +--------+   :  +----------+      +----------+<----|          |
         | Report |<-----| Abstract |<-----| Analyze/ |  :  +----------+
         +--------+   :  +----------+      | Aggregate|  :
                      :                    +----------+  :

           Figure 3: Intent Management: IBS Intent Life Cycle

   The life cycle in Figure 3 is presented as a conceptual view and
   needs to be made concrete in the form of a framework with interfaces
   among components in the framework.  The data models of an intent, a
   network policy, and an application policy should be specified using

Jeong, et al.              Expires 7 May 2025                  [Page 10]
Internet-Draft           I2INF Problem Statement           November 2024

   either YANG [RFC6020][RFC7950] or YAML [YAML].  Messages are to be
   delivered to target components via some message delivery protocol,
   such as NETCONF [RFC6241], RESTCONF [RFC8040], or REST API [REST].

3.3.  Problem Statement

   The goal of an Intent-Based System (IBS) is to enforce the service
   corresponding to a user's intent with an appropriate application in a
   target network in terms of functionality and quality
   [RFC9315][RFC8329] [I-D.jeong-i2nsf-security-management-automation]
   [I-D.jeong-nmrg-ibn-network-management-automation].  To achieve this
   goal, first of all, an intent needs to be translated into either a
   network policy or an application policy by an intent translator
   [I-D.jeong-nmrg-ibn-network-management-automation]
   [I-D.yang-i2nsf-security-policy-translation].  Then those network
   policies and application policies need to be delivered to a network
   controller and an application controller, respectively.  The network
   controller further translates the network policy into the network
   rules to be sent to the network entities (i.e., NFs).  In the same
   way, the application controller further translates the application
   policy into the application rules to be sent to the application
   entities (i.e., AFs).

   For the translation of either an intent or a policy, the capabilities
   of NFs and AFs should be registered with databases (e.g., NF database
   and AF database).  Thus, a capability data model for those NFs and
   AFs should be specified [I-D.ietf-i2nsf-capability-data-model].
   Also, a registration interface is required for an NF or AF vendor to
   register its NF or AF with the corresponding database such as the NF
   database and the AF database, respectively
   [I-D.ietf-i2nsf-registration-interface-dm].  Therefore, a data model
   for this registration interface should be specified to make a
   registration message for the Vendor's Management System (VMS)
   [RFC8329].

   An IBS user needs an interface to send an intent to an IBS controller
   (e.g.., Cloud Controller in Figure 1), it must have an intent
   translator, which translates the intent into a network policy or an
   application policy, and a dispatcher, which dispatches the policies
   to appropriate destinations (e.g, NF controller and AF controller).
   This interface is called a Customer-Facing Interface (CFI) for the
   IBS user [I-D.ietf-i2nsf-consumer-facing-interface-dm].  A data model
   for the Customer-Facing Interface should also be specified.

Jeong, et al.              Expires 7 May 2025                  [Page 11]
Internet-Draft           I2INF Problem Statement           November 2024

   Both an NF controller and an AF controller need an interface to
   deliver the network rules and the application rules to the
   appropriate NFs and the appropriate AFs, respectively.  This
   interface is called a Service Function-Facing Interface (SFI) for
   both the NF controller and the AF controller
   [I-D.ietf-i2nsf-nsf-facing-interface-dm].

   For the assurance of the intent in the target network and
   application, the collection and analysis of monitoring data from the
   NFs and AFs is required.  A Monitoring Interface
   [I-D.ietf-i2nsf-nsf-monitoring-data-model] is an interface to collect
   monitoring data from either an NF or an AF to a data collector (e.g.,
   IBS analyzer [I-D.lingga-i2nsf-analytics-interface-dm]
   [TS-23.288][TS-29.520]).  For further actions, the analysis results
   of the NF and the AF should be reported to the NF controller and the
   AF controller, respectively.  An Analytics Interface is an interface
   to deliver analysis results to either an NF controller or an AF
   controller [I-D.lingga-i2nsf-analytics-interface-dm].

   The required data models can be constructed by either YANG
   [RFC6020][RFC7950] or YAML [YAML].  The message delivery protocol for
   the interfaces can be one among NETCONF [RFC6241], RESTCONF
   [RFC8040], or REST API [REST].

4.  IANA Considerations

   This document does not require any IANA actions.

5.  Security Considerations

   The same security considerations for the Interface to Network
   Security Functions (I2NSF) Framework [RFC8329] are applicable to the
   Intent-Based System this document.

6.  References

6.1.  Normative References

   [RFC6020]  Bjorklund, M., Ed., "YANG - A Data Modeling Language for
              the Network Configuration Protocol (NETCONF)", RFC 6020,
              DOI 10.17487/RFC6020, October 2010,
              <https://www.rfc-editor.org/info/rfc6020>.

   [RFC6241]  Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed.,
              and A. Bierman, Ed., "Network Configuration Protocol
              (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011,
              <https://www.rfc-editor.org/info/rfc6241>.

Jeong, et al.              Expires 7 May 2025                  [Page 12]
Internet-Draft           I2INF Problem Statement           November 2024

   [RFC7149]  Boucadair, M. and C. Jacquenet, "Software-Defined
              Networking: A Perspective from within a Service Provider
              Environment", RFC 7149, DOI 10.17487/RFC7149, March 2014,
              <https://www.rfc-editor.org/info/rfc7149>.

   [RFC7950]  Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language",
              RFC 7950, DOI 10.17487/RFC7950, August 2016,
              <https://www.rfc-editor.org/info/rfc7950>.

   [RFC8040]  Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF
              Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017,
              <https://www.rfc-editor.org/info/rfc8040>.

   [RFC8329]  Lopez, D., Lopez, E., Dunbar, L., Strassner, J., and R.
              Kumar, "Framework for Interface to Network Security
              Functions", RFC 8329, DOI 10.17487/RFC8329, February 2018,
              <https://www.rfc-editor.org/info/rfc8329>.

   [RFC9315]  Clemm, A., Ciavaglia, L., Granville, L. Z., and J.
              Tantsura, "Intent-Based Networking - Concepts and
              Definitions", RFC 9315, DOI 10.17487/RFC9315, October
              2022, <https://www.rfc-editor.org/info/rfc9315>.

   [RFC9365]  Jeong, J., Ed., "IPv6 Wireless Access in Vehicular
              Environments (IPWAVE): Problem Statement and Use Cases",
              RFC 9365, DOI 10.17487/RFC9365, March 2023,
              <https://www.rfc-editor.org/info/rfc9365>.

6.2.  Informative References

   [I-D.jeong-nmrg-ibn-network-management-automation]
              Jeong, J. P., Ahn, Y., Kim, Y., and J. Jung-Soo, "Intent-
              Based Network Management Automation in 5G Networks", Work
              in Progress, Internet-Draft, draft-jeong-nmrg-ibn-network-
              management-automation-04, 22 April 2024,
              <https://datatracker.ietf.org/doc/html/draft-jeong-nmrg-
              ibn-network-management-automation-04>.

   [I-D.irtf-coinrg-coin-terminology]
              Hong, J., Kunze, I., Wehrle, K., Trossen, D., Montpetit,
              M., de Foy, X., Griffin, D., and M. Rio, "Terminology for
              Computing in the Network", Work in Progress, Internet-
              Draft, draft-irtf-coinrg-coin-terminology-01, 10 July
              2023, <https://datatracker.ietf.org/doc/html/draft-irtf-
              coinrg-coin-terminology-01>.

Jeong, et al.              Expires 7 May 2025                  [Page 13]
Internet-Draft           I2INF Problem Statement           November 2024

   [I-D.irtf-coinrg-use-cases]
              Kunze, I., Wehrle, K., Trossen, D., Montpetit, M., de Foy,
              X., Griffin, D., and M. Rio, "Use Cases for In-Network
              Computing", Work in Progress, Internet-Draft, draft-irtf-
              coinrg-use-cases-06, 12 September 2024,
              <https://datatracker.ietf.org/doc/html/draft-irtf-coinrg-
              use-cases-06>.

   [I-D.ietf-i2nsf-applicability]
              Jeong, J. P., Hyun, S., Ahn, T., Hares, S., and D. Lopez,
              "Applicability of Interfaces to Network Security Functions
              to Network-Based Security Services", Work in Progress,
              Internet-Draft, draft-ietf-i2nsf-applicability-18, 16
              September 2019, <https://datatracker.ietf.org/doc/html/
              draft-ietf-i2nsf-applicability-18>.

   [I-D.ietf-i2nsf-capability-data-model]
              Hares, S., Jeong, J. P., Kim, J. T., Moskowitz, R., and Q.
              Lin, "I2NSF Capability YANG Data Model", Work in Progress,
              Internet-Draft, draft-ietf-i2nsf-capability-data-model-32,
              23 May 2022, <https://datatracker.ietf.org/doc/html/draft-
              ietf-i2nsf-capability-data-model-32>.

   [I-D.ietf-i2nsf-registration-interface-dm]
              Hyun, S., Jeong, J. P., Roh, T., Wi, S., and J. Jung-Soo,
              "I2NSF Registration Interface YANG Data Model for NSF
              Capability Registration", Work in Progress, Internet-
              Draft, draft-ietf-i2nsf-registration-interface-dm-26, 10
              May 2023, <https://datatracker.ietf.org/doc/html/draft-
              ietf-i2nsf-registration-interface-dm-26>.

   [I-D.ietf-i2nsf-consumer-facing-interface-dm]
              Jeong, J. P., Chung, C., Ahn, T., Kumar, R., and S. Hares,
              "I2NSF Consumer-Facing Interface YANG Data Model", Work in
              Progress, Internet-Draft, draft-ietf-i2nsf-consumer-
              facing-interface-dm-31, 15 May 2023,
              <https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-
              consumer-facing-interface-dm-31>.

   [I-D.ietf-i2nsf-nsf-facing-interface-dm]
              Kim, J. T., Jeong, J. P., Jung-Soo, J., Hares, S., and Q.
              Lin, "I2NSF Network Security Function-Facing Interface
              YANG Data Model", Work in Progress, Internet-Draft, draft-
              ietf-i2nsf-nsf-facing-interface-dm-29, 1 June 2022,
              <https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-
              nsf-facing-interface-dm-29>.

Jeong, et al.              Expires 7 May 2025                  [Page 14]
Internet-Draft           I2INF Problem Statement           November 2024

   [I-D.ietf-i2nsf-nsf-monitoring-data-model]
              Jeong, J. P., Lingga, P., Hares, S., Xia, L., and H.
              Birkholz, "I2NSF NSF Monitoring Interface YANG Data
              Model", Work in Progress, Internet-Draft, draft-ietf-
              i2nsf-nsf-monitoring-data-model-20, 1 June 2022,
              <https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-
              nsf-monitoring-data-model-20>.

   [I-D.lingga-i2nsf-analytics-interface-dm]
              Lingga, P., Jeong, J. P., and Y. Choi, "I2NSF Analytics
              Interface YANG Data Model for Closed-Loop Security Control
              in the I2NSF Framework", Work in Progress, Internet-Draft,
              draft-lingga-i2nsf-analytics-interface-dm-04, 26 July
              2024, <https://datatracker.ietf.org/doc/html/draft-lingga-
              i2nsf-analytics-interface-dm-04>.

   [I-D.jeong-i2nsf-security-management-automation]
              Jeong, J. P., Lingga, P., Jung-Soo, J., Lopez, D., and S.
              Hares, "An I2NSF Framework for Security Management
              Automation in Cloud-Based Security Systems", Work in
              Progress, Internet-Draft, draft-jeong-i2nsf-security-
              management-automation-08, 26 July 2024,
              <https://datatracker.ietf.org/doc/html/draft-jeong-i2nsf-
              security-management-automation-08>.

   [I-D.yang-i2nsf-security-policy-translation]
              Jeong, J. P., Lingga, P., and J. Yang, "Guidelines for
              Security Policy Translation in Interface to Network
              Security Functions", Work in Progress, Internet-Draft,
              draft-yang-i2nsf-security-policy-translation-16, 7
              February 2024, <https://datatracker.ietf.org/doc/html/
              draft-yang-i2nsf-security-policy-translation-16>.

   [YAML]     Ingerson, B., Evans, C., and O. Ben-Kiki, "Yet Another
              Markup Language (YAML) 1.0",
              Available: https://yaml.org/spec/history/2001-05-26.html,
              October 2023.

   [TS-23.501]
              "System Architecture for the 5G System (5GS)", Available:
              https://portal.3gpp.org/desktopmodules/Specifications/
              SpecificationDetails.aspx?specificationId=3144, September
              2023.

Jeong, et al.              Expires 7 May 2025                  [Page 15]
Internet-Draft           I2INF Problem Statement           November 2024

   [TS-28.312]
              "Intent Driven Management Services for Mobile Networks",
              Available:
              https://portal.3gpp.org/desktopmodules/Specifications/
              SpecificationDetails.aspx?specificationId=3554, September
              2023.

   [TR-28.812]
              "Study on Scenarios for Intent Driven Management Services
              for Mobile Networks", Available:
              https://portal.3gpp.org/desktopmodules/Specifications/
              SpecificationDetails.aspx?specificationId=3553, December
              2020.

   [TS-23.288]
              "Architecture Enhancements for 5G System (5GS) to Support
              Network Data Analytics Services", Available:
              https://portal.3gpp.org/desktopmodules/Specifications/
              SpecificationDetails.aspx?specificationId=3579, September
              2023.

   [TS-29.520]
              "Network Data Analytics Services", Available:
              https://portal.3gpp.org/desktopmodules/Specifications/
              SpecificationDetails.aspx?specificationId=3355, September
              2023.

   [ETSI-NFV] "Network Functions Virtualisation (NFV); Architectural
              Framework", Available:
              https://www.etsi.org/deliver/etsi_gs/
              nfv/001_099/002/01.02.01_60/gs_nfv002v010201p.pdf,
              December 2014.

   [ETSI-NFV-Release-2]
              "Network Functions Virtualisation (NFV) Release 2;
              Management and Orchestration; Architectural Framework
              Specification", Available:
              https://www.etsi.org/deliver/etsi_gs/
              nfv/001_099/006/02.01.01_60/gs_nfv006v020101p.pdf, January
              2021.

   [NFV-COIN] Venancio, G., Turchetti, R., and E. Duarte Jr., "NFV-COIN:
              Unleashing The Power of In-Network Computing with
              Virtualization Technologies", SBC Journal of Internet
              Services and Applications, Available: https://journals-
              sol.sbc.org.br/index.php/jisa/article/view/2342, December
              2022.

Jeong, et al.              Expires 7 May 2025                  [Page 16]
Internet-Draft           I2INF Problem Statement           November 2024

   [REST]     Fielding, R. and R. Taylor, "Principled Design of the
              Modern Web Architecture", ACM Transactions on Internet
              Technology, Vol. 2, Issue 2,,
              Available: https://dl.acm.org/doi/10.1145/514183.514185,
              May 2002.

   [USENIX-ATC-Lumi]
              Jacobs, A., Pfitscher, R., Ribeiro, R., Ferreira, R.,
              Granville, L., Willinger, W., and S. Rao, "Hey, Lumi!
              Using Natural Language for Intent-Based Network
              Management", USENIX Annual Technical Conference,
              Available:
              https://www.usenix.org/conference/atc21/presentation/
              jacobs, July 2021.

   [BERT]     Devlin, J., Chang, M., Lee, K., and K. Toutanova, "BERT:
              Pre-training of Deep Bidirectional Transformers for
              Language Understanding", NAACL-HLT Conference,
              Available: https://aclanthology.org/N19-1423.pdf, June
              2019.

   [Deep-Learning]
              Goodfellow, I., Bengio, Y., and A. Courville, "Deep
              Learning", Publisher: The MIT Press,
              Available: https://www.deeplearningbook.org/, November
              2016.

   [AUTOSAR-SDV]
              "AUTOSAR Adaptive Platform", Available: 
              https://www.autosar.org/standards/adaptive-platform, March
              2024.

   [Eclipse-SDV]
              "Eclipse Software Defined Vehicle Working Group Charter",
              Available: https://www.eclipse.org/org/workinggroups/sdv-
              charter.php, March 2024.

   [COVESA]   "Connected Vehicle Systems Alliance",
              Available: https://covesa.global/, March 2024.

   [Kubernetes]
              "Kubernetes: Cloud Native Computing Platform",
              Available: https://kubernetes.io/, March 2024.

Jeong, et al.              Expires 7 May 2025                  [Page 17]
Internet-Draft           I2INF Problem Statement           November 2024

   [Survey-IBN-CST-2023]
              Leivadeas, A. and M. Falkner, "A Survey on Intent-Based
              Networking",
              Available: https://ieeexplore.ieee.org/document/9925251,
              March 2023.

   [ClickINC] Xu, W., Zhang, Z., Feng, Y., Song, H., Chen, Z., Wu, W.,
              Liu, G., Zhang, Y., Liu, S., Tian, Z., and B. Liu,
              "ClickINC: In-network Computing as a Service in
              Heterogeneous Programmable Data-center Networks",
              Publisher: ACM SIGCOMM,
              Available: https://dl.acm.org/doi/10.1145/3603269.3604835,
              September 2023.

Appendix A.  Changes from draft-jeong-opsawg-i2inf-problem-statement-01

   The following changes are made from draft-jeong-opsawg-i2inf-problem-
   statement-01:

   *  The conents have been updated for further clarification.

Acknowledgments

   This work was supported by Institute of Information & Communications
   Technology Planning & Evaluation (IITP) grant funded by the Korea
   Ministry of Science and ICT (MSIT) (No.  RS-2024-00398199 and RS-
   2022-II221015).

Contributors

   This document is made by the group effort of OPWAWG, greatly
   benefiting from inputs and texts by Linda Dunbar (Futurewei), Yong-
   Geun Hong (Daejeon University), and Joo-Sang Youn (Dong-Eui
   University).  The authors sincerely appreciate their contributions.

   The following are coauthors of this document:

   Mose Gu
   Department of Computer Science & Engineering
   Sungkyunkwan University
   2066 Seobu-Ro, Jangan-Gu
   Suwon
   Gyeonggi-Do
   16419
   Republic of Korea
   Phone: +82 31 299 4106
   Email: rna0415@skku.edu
   URI:   http://iotlab.skku.edu/people-Moses-Gu.php

Jeong, et al.              Expires 7 May 2025                  [Page 18]
Internet-Draft           I2INF Problem Statement           November 2024

   Juwon Hong
   Department of Computer Science & Engineering
   Sungkyunkwan University
   2066 Seobu-Ro, Jangan-Gu
   Suwon
   Gyeonggi-Do
   16419
   Republic of Korea
   Phone: +82 31 299 4106
   Email: hongju2024@skku.edu
   URI:   http://iotlab.skku.edu/people-Joo-Won-Hong.php

   Giovanni Venancio
   Department of Informatics
   Federal University of Parana
   Brazil
   Email: giovanni@inf.ufpr.br

Authors' Addresses

   Jaehoon Paul Jeong (editor)
   Department of Computer Science & Engineering
   Sungkyunkwan University
   2066 Seobu-Ro, Jangan-Gu
   Suwon
   Gyeonggi-Do
   16419
   Republic of Korea
   Phone: +82 31 299 4957
   Email: pauljeong@skku.edu
   URI:   http://iotlab.skku.edu/people-jaehoon-jeong.php

   Yiwen Shen
   Department of Computer Science & Engineering
   Sungkyunkwan University
   2066 Seobu-Ro, Jangan-Gu
   Suwon
   Gyeonggi-Do
   16419
   Republic of Korea
   Phone: +82 31 299 4106
   Email: chrisshen@skku.edu
   URI:   https://chrisshen.github.io

Jeong, et al.              Expires 7 May 2025                  [Page 19]
Internet-Draft           I2INF Problem Statement           November 2024

   Yoseop Ahn
   Department of Computer Science & Engineering
   Sungkyunkwan University
   2066 Seobu-Ro, Jangan-Gu
   Suwon
   Gyeonggi-Do
   16419
   Republic of Korea
   Phone: +82 31 299 4106
   Email: ahnjs124@skku.edu
   URI:   http://iotlab.skku.edu/people-Ahn-Yoseop.php

   Younghan Kim
   School of Electronic Engineering
   Soongsil University
   369, Sangdo-ro, Dongjak-gu
   Seoul
   06978
   Republic of Korea
   Email: younghak@ssu.ac.kr

   Elias P. Duarte Jr.
   Department of Informatics
   Federal University of Parana
   Brazil
   Email: elias@inf.ufpr.br

   Kehan Yao
   China Mobile
   Beijing
   100053
   China
   Email: yaokehan@chinamobile.com

Jeong, et al.              Expires 7 May 2025                  [Page 20]