<?xml version="1.0" encoding="US-ASCII"?>
<!-- <?xml version="1.0" encoding="UTF-8"?> -->
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private)
-->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">


<?rfc toc="yes"?>
<?rfc rfcedstyle="yes"?>
<?rfc subcompact="no"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" category="info" docName="draft-park-nmrg-ibn-network-management-srv6-01">

<front>
    <title abbrev="IBN Network Management">
    Intent-Based Network Management in SRv6 network
    </title>

    <!-- add 'role="editor"' below for the editors if appropriate -->
      <author fullname="Jungsoo Park" role="editor" surname="Park">
      <organization abbrev="ETRI">Electronics and Telecommunications Research Institute</organization>
      <address>
        <postal>
          <street>218 Gajeongno, Yuseung-gu</street>
          <city>Daejeon</city>
          <region/>
          <code>34129</code>
          <country>South Korea</country>
        </postal>
        <phone>+82 42 860 6514</phone>
        <facsimile>+82 42 861 5404</facsimile>
        <email>pjs@etri.re.kr</email>
      </address>
    </author>

    <author fullname="Yunchul Choi" surname="Choi">
      <organization abbrev="ETRI">Electronics and Telecommunications Research Institute</organization>
      <address>
        <postal>
          <street>218 Gajeongno, Yuseung-gu</street>
          <city>Daejeon</city>
          <region/>
          <code>34129</code>
          <country>South Korea</country>
        </postal>
        <phone>+82 42 860 5978</phone>
        <facsimile>+82 42 861 5404</facsimile>
        <email>cyc79@etri.re.kr</email>
      </address>
    </author>

    <author initials="J." surname="Jeong" fullname="Jaehoon Paul Jeong">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science and Engineering
        </organization>

        <address>
            <postal>
                <street>Sungkyunkwan University</street>
                <street>2066 Seobu-Ro, Jangan-Gu</street>
                <city>Suwon</city> <region>Gyeonggi-Do</region>
                <code>16419</code>
                <country>South Korea</country>
            </postal>
            <phone>+82 31 299 4957</phone>
            <facsimile>+82 31 290 7996</facsimile>
            <email>pauljeong@skku.edu</email>
            <uri>http://iotlab.skku.edu/people-jaehoon-jeong.php
         </uri>
        </address>
    </author>

    <date month="November" day="7" year="2023" />

    <area>Networking</area>
    
    <workgroup>Network Management Research Group</workgroup>

<!-- [rfced] Please insert any keywords (beyond those that appear in
the title) for use on http://www.rfc-editor.org/rfcsearch.html. -->

<keyword>Internet-Draft</keyword>

  <abstract>
    <t>
      This document describes secure network management 
      in Segment Routing version six (SRv6) network. 
      It proposes a framework empowered with Intent-Based Networking (IBN).
      The Intent-based Network Management (IBNM) in this document specifies an architectural framework
      with system components and interfaces. Also, this framework builds on
      Interface to Network Security Functions(I2NSF).
    </t>
  </abstract>
</front>

<middle>

<section anchor="section:Introduction" title="Introduction">
  <t>
    Interface to Network Security Functions (I2NSF) defines a framework
    and interfaces for interacting with Network Security Functions (NSFs)
    <xref target="RFC8192" /><xref target="RFC8329" />.
    Note that an NSF is defined as software that provides a set of
    security-related services, such as (i) detecting unwanted activity,
    (ii) blocking or mitigating the effect of such unwanted activity
    in order to fulfill service requirements, and (iii) supporting
    communication stream integrity and confidentiality <xref target="RFC8329" />.
    Th e NSF can be implemented as a Virtual Network Function (VNF) in
    a Network Functions Virtualization (NFV) environment <xref target="ETSI-NFV" /><xref target="I-D.ietf-i2nsf-applicability" />.
  </t>
    
  <t>
    The term "intent" is defined as "an abstract, high-level policy used
    to operate the network" in the context of autonomic networks <xref target="RFC7575"/>.  
    According to this definition, an intent is a specific type of policy provided by a user to provide
    guidance to the autonomic network that would otherwise operate
    without human intervention.
  </t>
  
  <t>
    Intent-Based Networking (IBN) Management (IBNM) aims to lead towards networks that are
    fundamentally simpler to manage and operate, requiring only minimal
    outside intervention.  
    The IBNM supports a closed-loop network control architecture
    that can adapt to the current status of a target network by collecting
    and analyzing monitoring data from Network Service Functions (NSFs) of I2NSF framework.
    NSFs can be either Virtual Network Functions (VNFs) or Physical Network
    Functions (PNFs) in cloud and edge computing environments.
  </t>

  <t> 
   Segment Routing (SR) <xref target="RFC8402"/> allows a node to steer a packet flow
   along any path.  The headend (i.e., ingress router) is a node where the instructions for
   source routing (i.e., segments) are written into the packet.  It
   hence becomes the starting node for a specific segment routing path.
   Intermediate per-path states are eliminated thanks to source routing.
   <xref target="RFC8754"/> and <xref target="RFC8986"/> describe the same for Segment Routing over IPv6 (SRv6) with
   the use of the Segment Routing Header (SRH).
   </t>
   
   <t>
   Therefore, the instructions for source routing is made by a Segment Routing Policy (SR Policy) <xref target="RFC8402"/>. 
   The SR policy is an ordered list of segments and come from the Intent, which is given by users (i.e., network operators).
   According to the Intent, IBNM will support several funtionalities.    
  </t>

</section>

<section anchor="section:Terminology" title="Terminology">
    <t>
      This document uses the terminology described in <xref target="RFC8329" />, 
      <xref target="I-D.ietf-i2nsf-applicability" />,  
      <xref target="I-D.jeong-i2nsf-security-management-automation"/>, and
      <xref target="I-D.jeong-nmrg-ibn-network-management-automation"/>.
      In addition, the following terms are defined below:
    </t>

    <t>
    <list style="symbols">
      <t>
        Autonomous Network Management (ANM): It means that an intent 
        from a user (or administrator or network operator) is well-enforced in
        a target SRv6 network. The intent can be aligned with high-level network policy
        and then high-level network policy can be translated into the corresponding low-level network 
        policy (including SRv6 Policy) by a
        network policy translator and dispatched to appropriate NSFs.
        Through the monitoring of the NSFs, the activity and performace of
        the NSFs is monitored and analyzed whether or not NSFs are operating well 
        according to the intent of the users. If needed, the network rules of
        the low-level network and SRv6 policy are augmented or new network rules are
        generated and configured to appropriate NSFs.
      </t>
      
      <t>
        Network Policy Translation (NPT): It means that a high-level network policy
        is translated to a low-level network policy (including SRv6 policy) that can be
        understood and configured by an NSF for autonomous network services,
        such as self-configuration, self-optimization, self-healing, and
        self-protection.
      </t>

      <t>
        Feedback-Based Network Management (FNM): It means that a network
        service in SRv6 network is evolved by updating a network policy (i.e., a set of network rules) 
        and adding new network rules for resolving network problems, which were detected by
        monitoring and analzing data from NSFs.
      </t>
    </list>
    </t>

    <figure anchor="figure:IBNM-in-SRv6-Network"
     title="Intent based Network Management in SRv6 Network">
            <artwork><![CDATA[
   +-------------+                   +-----------------------------+
   |  IBN User   |                   | Global Distributed Database |
   +-------------+                   +-----------------------------+
          ^                                                     ^
          | Consumer-Facing                    Software Update  |
          | Interface                            Interface (Up) | 
          v                                                     v
+-------------------+     Registration     +-----------------------+
|   IBN Controller  |<-------------------->|  Vendor's Mgmt System |
+-------------------+      Interface       +-----------------------+
          ^      ^                                            ^
          |      |                  Software Update Interface |
          |      |                                     (Down) |
          |      |   Analytics Interface   +----------------+ |
          |      +------------------------>|  IBN Analyzer  | |
          |                                +----------------+ |
          | NSF-Facing Interface                   ^          |
          |                                        |          |
          |                  +---------------------+          |
          |                  |  Monitoring Interface          |
          |                  |                                |
+---------+------------------+--------------------------------+----+ 
|         v                  v         SRv6 Nodes             v    |
|  +---------------+  +---------------+         +---------------+  |
|  |     NSF-1     |--|     NSF-2     | ....... |     NSF-n     |  |
|  |(Policy Control|  | (Monitoring   |         | (Application  |  |
|  | Function, PCF)|  |  Function, MF)|         | Function, AF) |  |
|  +---------------+  +---------------+         +---------------+  |
+------------------------------------------------------------------+
            ]]></artwork>
    </figure>


</section>

<section anchor="section:Intent-based-Network-Management-in-SRv6-Network" title="Intent based Network Management in SRv6 Network">

    <t>
      This section describes an IBNM framework in SRv6 network.  Note that
      this IBNM Framework is based on the Framework for Interface to Network
      Security Functions (I2NSF) <xref target="RFC8329" /><xref target="I-D.jeong-i2nsf-security-management-automation"/>.
      As shown in <xref target="figure:IBNM-in-SRv6-Network" />,
      an IBN User can use network functions by delivering high-level network intents,
      which specify network requirements that the IBNM User wants to enforce, to
      the IBN Controller via the Consumer-Facing Interface (CFI).      
    </t>

   <section anchor="section:IBNM-Framework-Components-in-SRv6-Network" title="Components with IBNM Framework in SRv6 Network">
   <t>
   The following are the system components for the IBNM framework in SRv6 network.
   </t>

   <t>
       <list style="symbols">
           <t>
           IBN User: An entity (e.g., End User or Network Operator) 
           that delivers a high-level network policy (including SRv6 policy) to
           Security Controller. It is assumed that (i) an intent in a natural
           language (e.g., English) can be translated into a high-level
           network policy through a Natural Language Processing 
           (called NLP) technique (e.g., Lumi <xref target="USENIX-ATC-Lumi" />)
           (ii) an intent as a network service (e.g., self-configuration, optimization,
           and healing) can be also translated into a high-level network policy.
           </t>

           <t>
           IBN Controller: An entity that controls and manages other system
           components in the IBNM framework. It translates a high-level network
           policy into the corresponding low-level network policy and selects
           appropriate NSFs to execute the network rules of the low-level network policy. 
           And then these NSFs are distributed and enabled into SRv6 nodes according to
           SRv6 policy (i.e., list of source routing). 
           </t>

           <t>
           Vendor's Management System (VMS): An entity that provides an image of
           of a virtualized NSF for a network service to the IBNM framework,
           registers the capability and access information of an NSF with IBN
           Controller, and downloads NSFs into appropriate SRv6 nodes.
           These downloaded NSFs will be updated dynamically if needed but is controlled 
           by IBN controller.  These virtualized NSFs are managed through the cloud-based distribed database.
           Also, this dynamic downloading NSFs could be realized by using Software Updates for
           Internet of Things (SUIT) framework
           <xref target="RFC9019" /><xref target="RFC9124" />.
           </t>

           <t>
           Network Service Function (NSF): An entity that is a Virtual Network
           Function (called VNF), Physical Network Function (called PNF) and
           Container Network Function (CNF), which is also called Cloud-native
           Network Function, for a autonomous network service.
           </t>

           <t>
           IBN Analyzer: An entity that collects monitoring data from NSFs and
           analyzes such data for checking the activity and performance of the NSFs
           using machine learning techniques (e.g., Deep Learning <xref target="Deep-Learning" />).
           If there is a suspicious network problem (e.g., traffic congestion and
           QoS degradation) for the target network or NSF, IBN Analyzer delivers a
           report of the augmentation or generation of network rules to IBN
           Controller.
           </t>
       </list>
   </t>

   <t>
     For IBN-based network services with Feedback-Based Network Management (FNM),
     IBN Analyzer is a key component for the IBNM framework 
     <xref target="RFC9315" /> <!-- <xref target="RFC9316" /> -->
     to collect monitoring data from NSFs and analyzing the monitoring data.
     In here, SRv6 is used to distinguish the monitoring data. 
     Ingress node (i.e., Headend) in SRv6 domain adds monitoring information (e.g., intent and monitoring tag) 
     into SRv6 headers. And then, intermediate nodes monitor and analyze IPv6 packets with monitoring information. 
     The actual implementation of the analysis of monitoring data is out of
     the scope of this document.
   </t>

   </section>

   <section anchor="section:IBNM-Interfaces" title="Interfaces for the IBNM Framework">
   <t>
     The following are the interfaces for the IBNM framework. Note that
     the interfaces can be modeled with YANG <xref target="RFC6020" /> and network
     policies are delivered through either RESTCONF <xref target="RFC8040" /> or
     NETCONF <xref target="RFC6241" />. In addition, REST API <xref target="REST" /> 
     can be supported for those software update interfaces.
   </t>

   <t>
     <list style="symbols">
          <t>
           Consumer-Facing Interface (CFI): An interface between IBN User and IBN
           Controller for the delivery of a high-level network policy or a intent
           <xref target="I-D.ietf-i2nsf-consumer-facing-interface-dm" />.
          </t>

          <t>
           NSF-Facing Interface (NFI): An interface between IBN Controller and an
           NSF for the delivery of a low-level network policy
           <xref target="I-D.ietf-i2nsf-nsf-facing-interface-dm" />.
          </t>

          <t>
           Registration Interface (RI): An interface between a VMS and IBN Controller
           for the registration of an NSF's capability and access information with the
           IBN Controller or the query of an NSF for a required low-level network
           policy <xref target="I-D.ietf-i2nsf-registration-interface-dm" />.
          </t>

          <t>
           Software Update Interface (Up) (SUI-U): An interface between a VMS and global distribed database
           for NSF management.
          </t>

          <t>
           Software Update Interface (Down) (SUI-D): An interface between a VMS and a SRv6 node 
           for delivery of a NSF. The NSF is just downloaded and does not work. After the command of IBN Controller
           through NFI, it works. 
          </t>

          <t>
           Monitoring Interface (MI): An interface between an NSF and IBN Analyzer for
           collecting monitoring data from an NSF to check the activity and performance
           of an NSF for a possible network problem <xref target="I-D.ietf-i2nsf-nsf-monitoring-data-model" />.
           In here, IPv6 packets with monitoring information in SRv6 heeder is only collected.  
          </t>

          <t>
           Analytics Interface (AI): An interface between IBN Analyzer and IBN
           Controller for the delivery of an analytics report of the augmentation
           or generation of network rules to IBN Controller, which lets
           IBN Controller apply the report for network rules to its network
           policy management.
          </t>
     </list>
   </t>

   <t>
     For IBN-based network services with FSM, Analytics Interface is a key
     interface in the IBNM framework to deliver an analytics report of the
     augmentation or generation of network rules to IBN Controller through
     the analysis of the monitoring data from NSFs. For analyzing, 
     user's intent of monitoring information in SRv6 header will compare with 
     just monitoring data from NSFs. 
   </t>

   </section>

</section>

<section anchor="section:Network-Policy-Translation" title="Network Policy Translation">
    <t>
    To facilitate Network Policy Translation (NPT), IBN Controller needs to
    have a network policy translator that performs the translation of a high-level
    network policy into the corresponding low-level network policy
    (i.e. SRv6 policy <xref target="RFC9256" />).
    For the automatic NPT services, the IBN framework needs to bridge a high-level
    YANG data model and a low-level YANG data model in an automatic manner
    <xref target="I-D.ietf-spring-sr-policy-yang" />,
    <xref target="I-D.yang-i2nsf-security-policy-translation" />.
    Note that a high-level YANG data model is for the IBN Consumer-Facing Interface,
    and a low-level YANG data model is for the IBN NSF-Facing Interface.
    </t>

</section>

<section anchor="section:IANA-Considerations" title="IANA Considerations">
  <t>
    This document does not require any IANA actions.
  </t>
</section>

<section anchor="section:Security-Considerations" title="Security Considerations">
  <t>
    The same security considerations for the IBN framework
    <xref target="RFC8329" /> are applicable to this document.
  </t>
</section>

</middle>

<back>

<!-- START: Normative References -->
<references title="Normative References">

    <?rfc include="reference.RFC.6020"?>
    <?rfc include="reference.RFC.6241"?>
    <?rfc include="reference.RFC.8040"?>    
    <?rfc include="reference.RFC.8329"?>
    <?rfc include="reference.RFC.9315"?>
    <?rfc include="reference.RFC.7575"?>
    <?rfc include="reference.RFC.8192"?>
    <?rfc include="reference.RFC.8402"?>
    <?rfc include="reference.RFC.8754"?>
    <?rfc include="reference.RFC.8986"?>
    <?rfc include="reference.RFC.9256"?>
    <!-- <?rfc include="reference.RFC.9316"?> -->
    
</references>
<!-- END: Normative References -->

<!-- START: Informative References -->
<references title="Informative References">

    <?rfc include='reference.I-D.ietf-i2nsf-consumer-facing-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-nsf-facing-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-registration-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-nsf-monitoring-data-model'?>    
    <?rfc include='reference.I-D.ietf-i2nsf-applicability'?>
    <?rfc include='reference.I-D.jeong-i2nsf-security-management-automation'?>
    <?rfc include='reference.I-D.yang-i2nsf-security-policy-translation'?>
    <?rfc include='reference.I-D.ietf-spring-sr-policy-yang'?>
    <?rfc include='reference.RFC.9019'?>
    <?rfc include='reference.RFC.9124'?>
    <?rfc include="reference.I-D.jeong-nmrg-ibn-network-management-automation'?>

    <reference anchor="ETSI-NFV">
        <front>
            <title>Network Functions Virtualisation (NFV); Architectural Framework</title>
            <author surname="ETSI GS NFV 002 V1.2.1" />
            <date month="December" year="2014" />
        </front>
        <seriesInfo name="Available:" value="https://www.etsi.org/deliver/etsi_gs/nfv/001_099/002/01.02.01_60/gs_nfv002v010201p.pdf" />
    </reference>

   <reference anchor="USENIX-ATC-Lumi">
        <front>
            <title>Hey, Lumi! Using Natural Language for Intent-Based Network Management</title>
            <author initials="A." surname="Jacobs" />
            <author initials="R." surname="Pfitscher" />
            <author initials="R." surname="Ribeiro" />
            <author initials="R." surname="Ferreira" />
            <author initials="L." surname="Granville" />
            <author initials="W." surname="Willinger" />
            <author initials="S." surname="Rao" />
            <date month="July" year="2021" />
        </front>
        <seriesInfo name="USENIX" value="Annual Technical Conference" />
    <seriesInfo name="Available:" value="https://www.usenix.org/conference/atc21/presentation/jacobs" />
    </reference>
   
   <reference anchor="REST">
        <front>
            <title>Principled Design of the Modern Web Architecture</title>
            <author initials="R." surname="Fielding" />
            <author initials="R." surname="Taylor" />
            <date month="May" year="2002" />
        </front>
        <seriesInfo name="ACM" value="Transactions on Internet Technology, Vol. 2, Issue 2," />
    <seriesInfo name="Available:" value="https://dl.acm.org/doi/10.1145/514183.514185" />
    </reference>

    <reference anchor="Deep-Learning">
        <front>
            <title>Deep Learning</title>
            <author initials="I." surname="Goodfellow" />
            <author initials="Y." surname="Bengio" />
            <author initials="A." surname="Courville" />
            <date month="November" year="2016" />
        </front>
        <seriesInfo name="Publisher:" value="The MIT Press" />
    <seriesInfo name="URL:" value="https://www.deeplearningbook.org/" />
    </reference>

</references>
<!-- END: Informative References -->

</back>

<!-- <vspace blankLines="100"/> -->
<!-- page break to put addresses onto one page-->

</rfc>
