<?xml version="1.0" encoding="US-ASCII"?>
<!-- <?xml version="1.0" encoding="UTF-8"?> -->
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private)
-->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">


<?rfc toc="yes"?>
<?rfc rfcedstyle="yes"?>
<?rfc subcompact="no"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" category="info" docName="draft-jeong-opsawg-i2inf-problem-statement-01">

<front>
    <title abbrev="I2INF Problem Statement">
    Interface to In-Network Functions (I2INF): Problem Statement
    </title>

    <author role="editor" initials="J." surname="Jeong" fullname="Jaehoon Paul Jeong">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science and Engineering
        </organization>
        <address>
            <postal>
                <street>Sungkyunkwan University</street>
                <street>2066 Seobu-Ro, Jangan-Gu</street>
                <city>Suwon</city> <region>Gyeonggi-Do</region>
                <code>16419</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 31 299 4957</phone>
            <facsimile>+82 31 290 7996</facsimile>
            <email>pauljeong@skku.edu</email>
            <uri>http://iotlab.skku.edu/people-jaehoon-jeong.php
         </uri>
        </address>
    </author>

    <author initials="Y." surname="Shen" fullname="Yiwen Shen">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science and Engineering
        </organization>	
		<address>
            <postal>
			    <extaddr>Sungkyunkwan University</extaddr>
  			    <street>2066 Seobu-Ro, Jangan-Gu</street>
			    <city>Suwon</city>
			    <region>Gyeonggi-Do</region>
			    <code>16419</code>
			    <country>Republic of Korea</country>
			</postal>
			<phone>+82 31 299 4106</phone>
			<email>chrisshen@skku.edu</email>
			<uri>https://chrisshen.github.io</uri>
		</address>
    </author>

    <author initials="Y." surname="Ahn" fullname="Yoseop Ahn">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science and Engineering
        </organization>	
		<address>
		    <postal>
			    <extaddr>Sungkyunkwan University</extaddr>
  			    <street>2066 Seobu-Ro, Jangan-Gu</street>
				<city>Suwon</city>
				<region>Gyeonggi-Do</region>
				<code>16419</code>
				<country>Republic of Korea</country>
			</postal>
			<phone>+82 31 299 4106</phone>
		    <email>ahnjs124@skku.edu</email>
			<uri>http://iotlab.skku.edu/people-Ahn-Yoseop.php</uri>
		</address>
    </author>

    <author initials="Y." surname="Kim" fullname="Younghan Kim">
        <organization abbrev="Soongsil University">
        School of Electronic Engineering
        </organization>
		<address>
            <postal>
                <extaddr>Soongsil University</extaddr>
                <street>369, Sangdo-ro, Dongjak-gu</street>
                <city>Seoul</city>
                <code>06978</code>
                <country>Republic of Korea</country>
            </postal>
            <phone></phone>
            <email>younghak@ssu.ac.kr</email>
		</address>
    </author>

    <author initials="E." surname="Duarte Jr." fullname="Elias P. Duarte Jr.">
        <organization abbrev="Federal University of Parana">
        Department of Computer Science and Engineering
        </organization>	
	    <address>
            <postal>
                <street>Federal University of Parana</street>
                <street></street>
                <city></city> <region></region>
                <code></code>
                <country>Brazil</country>
            </postal>
            <phone></phone>
            <email>elias@inf.ufpr.br</email>
        </address>
    </author>

    <author initials="K." surname="Yao" fullname="Kehan Yao">
        <organization>China Mobile</organization>
        <address>
            <postal>
                <street/>
                <city>Beijing</city>
                <code>100053</code>
                <country>China</country>
            </postal>
            <email>yaokehan@chinamobile.com</email>
        </address>
    </author>

    <date month="October" day="21" year="2024" />

    <area>Operations and Management Area</area>
    
    <workgroup>Operations and Management Area Working Group</workgroup>

<!-- [rfced] Please insert any keywords (beyond those that appear in
the title) for use on http://www.rfc-editor.org/rfcsearch.html. -->

<keyword>Internet-Draft</keyword>

    <abstract>
        <t>
        This document specifies the problem statement for the Interface to
        In-Network Functions (I2INF) for user services both on the 
        network-level and application-level. In-Network Functions (INF)
        include In-Network Computing Functions (INCF) which are defined in
        the context of Network Functions Virtualization (NFV) and
        Software-Defined Networking (SDN). INF also includes In-Network
        Application Functions (INAF) which appear in the context of
        Internet-of-Things (IoT) Devices, Software-Defined Vehicles (SDV),
        and Unmanned Aerial Vehicles (UAV). Intent-Based Networking (IBN)
        can be used to compose user services and consist of a combination
        of INFs in a target network. This document investigates the gap
        for an IBN-based system to perform the user's service and the
        requirements for the I2INF for intelligent service provisioning.
        </t>
    </abstract>
</front>

<middle>

<section anchor="section:Introduction" title="Introduction">
    <t>
    Network softwarization has been widely adopted in multiple environments,
    such as  in cloud and edge computing, as well as the in network
    infrastructure itself, facilitating the deployment of network services
    (e.g., 5G mobile networks <xref target="TS-23.501" />). The multiple
    technologies behind network softwarization include Network Functions
    Virtualization (NFV) <xref target="ETSI-NFV" /><xref
    target="ETSI-NFV-Release-2" /> and Software-Defined Networking (SDN) <xref
    target="RFC7149" />. Furthermore, there is also an integration with
    Intent-Based Networking (IBN) <xref target="RFC9315" /><xref
    target="Survey-IBN-CST-2023" />, which can be used to define and deploy
    intelligent network services as well as intelligent application services.
    End-user devices such as smartphones and smartwatches are connected to
    various Internet-of-Things (IoT) devices for customer-tailored services.
    Recently, Software-Defined Vehicles (SDVs)
    <xref target="AUTOSAR-SDV" /><xref target="Eclipse-SDV" /><xref
    target="COVESA" /> have the potential to become as popular as smartphones.
    SDVs are intended to use network softwarization technologies such as NFV and
    SDN. System components and applications in the context of SDVs are usually
    executed on containers in a cloud native environment and can be orchestrated
    for instance with Kubernetes <xref target="Kubernetes" />.
    </t>

    <t>
    In this context, network automation and management have become critical. It
    is important to facilitate the construction of intelligent services and
    applications for both network operators and end users <xref
    target="I-D.jeong-nmrg-ibn-network-management-automation" />. A user intent
    (who can be an end user or network operator) in the form of either text or
    voice needs to be understood and processed by the system. An intent is a
    declarative request for a specific goal rather than an imperative request
    having a series of configuration or commands for specific operations. Thus,
    an intent needs to be translated into a network policy or an application
    policy that satisfies the user request. A network policy consists of rules
    to execute a user intent, which can be either in terms of Quality of Service
    (QoS) defining targets for metrics such as throughput and delay. An
    application policy consists of rules to execute the service's application
    demands, for example in terms of functionality and timing. After network and
    application polices are translated, there is a need to invoke the
    appropriate Network Functions (NF) in the network infrastructure, edge, or
    cloud. 
    </t>

    <t>
    Thus, a user intent has to be translated either into a network policy
    executed as a network service on the network infrastructure or an
    application policy for an application service. For example, services for
    user applications (e.g., video conference) need to be accurately configured
    and efficiently processed by not only Application Functions (AF) such as a
    client (e.g., a video conference client) and a server (e.g., a video
    conference server), but also Network Functions (NF) (e.g., video broadcast
    coordinator) defined in the context of Computing in the Network (COIN) 
    <xref target="I-D.irtf-coinrg-use-cases" /><xref target="NFV-COIN" />.
    </t>

    <t>
    In the context Computing in the Network (COIN) terminology 
    <xref target="I-D.irtf-coinrg-coin-terminology" />, a Programmable Network Device (PND) in an In-Network Computing (INC) environment can have multiple kinds of features and capabilities. A PND can also interact with other PNDs. PNDs from different product lines or vendors can provide different functionalities for INC functions. In order to compose a COIN system consisting of multiple PDNs that interact among themselves, it is necessary to define a standard interface for PNDs to expose so that they can learn about each other&apos;s capabilities and properly interact.
    </t>

    <t>
    A standard framework to define the interfaces of Application Functions
    (AFs) and Network Functions (NFs) is required to allow the configuration and
    monitoring of applications and network services consisting of those
    functions. There is currently no standard data model to describe the
    capabilities of AFs and NFs. Furthermore, there is no standard data model
    defining an interface to register the capabilities of AFs and NFs on a
    controller-like device that would process service requests for those
    functions. In addition, there are no standard interfaces to configure and
    monitor those AFs and NFs according to user's intent. The Interface to
    Network Security Functions (I2NSF) was standardized for the control and
    management of Network Security Services with Network Security Functions
    (NSFs) <xref target="RFC8329" /><xref target="I-D.ietf-i2nsf-applicability"
    />. The present document is defined taking into account the I2NSF document,
    but the purpose is beyond the scope of Security Functions, defining a more
    general control and management framework for intelligent services consisting
    of AFs and NFs. 
    </t>

    <t>
    This document specifies the problem statement and use cases for the
    Interface to In-Network Functions (I2INF) considering arbitrary In-Network
    Functions (INFs) presenting arbitrary features and capabilities. The INFs
    consist of Network Functions (NFs) including PNDs and Application Functions
    (AFs) in order to compose a user's services. First of all, INFs include
    In-Network Computing Functions (INCF) which are NFs defined within the
    context of NFV and SDN <xref target="I-D.irtf-coinrg-use-cases" />.
    Secondly, they also include In-Network Application Functions (INAF) which
    are AFs employed by Internet-of-Things (IoT) Devices, Software-Defined
    Vehicles (SDV) <xref target="AUTOSAR-SDV" /><xref target="Eclipse-SDV"
    /><xref target="COVESA" />, and Unmanned Aerial Vehicles (UAV). Finally,
    this document shows how Intent-Based Networking (IBN) can be realized with
    the proposed I2INF framework and its interfaces for user services that
    consist of a combination of INFs in a target network.
    </t>
</section>

<section anchor="section:Terminology" title="Terminology">
    <t>
      This document uses the terminology described in <xref target="RFC9315" />,
      <xref target="RFC8329" />,
      <xref target="I-D.irtf-coinrg-coin-terminology" />,
      <xref target="I-D.irtf-coinrg-use-cases" />,
      <xref target="I-D.jeong-i2nsf-security-management-automation"/>, <xref
      target="I-D.jeong-nmrg-ibn-network-management-automation"/>, and <xref
      target="I-D.yang-i2nsf-security-policy-translation"/>. In addition, the
      following terms are defined below:
    </t>

    <t>
    <list style="symbols">
      <t>
        Intent: A set of operational goals (that a network should meet) and
        outcomes (that a network is supposed to deliver) defined in a
        declarative manner without specifying how they are achieved or should be
        implemented <xref target="RFC9315" />.
      </t>

      <t>
        Intent-Based System (IBS): A system that enforces an intent from a user
        (or administrator) into a target system (e.g., SDV). An intent can be
        expressed in Natural Language (e.g., English) and can be translated into
        a policy (i.e., network policy and application policy) using Natural
        Language Processing (NLP) <xref target="USENIX-ATC-Lumi" /> <xref
        target="BERT" /> <xref target="Deep-Learning" />. In this document, the
        intent can be translated into a corresponding high-level policy by an
        intent translator  <xref
        target="I-D.jeong-i2nsf-security-management-automation"/>. The
        high-level policy can also be translated into the corresponding
        low-level policy by a policy translator <xref
        target="I-D.yang-i2nsf-security-policy-translation"/>. The low-level
        policy is dispatched to appropriate Service Functions (SFs). Through the
        monitoring of the SFs, the activity and performance of the SFs is
        monitored and analyzed. If needed, the rules of the high-level or
        low-level network policy are augmented or new rules are generated and
        configured to appropriate SFs.
      </t>

      <t>
        Mobile Object (MO): An object that is capable of moving with its own
        power source and wireless communication capability such as 5G
        Vehicle-to-Everything (e.g., 5G V2X). An MO can be an Internet-of-Things
        (IoT) device, Software-Defined Vehicle (SDV) <xref
        target="AUTOSAR-SDV"/><xref target="Eclipse-SDV" /><xref target="COVESA"
        />, and Unmanned Aerial Vehicle (UAV). An MO is a Programmable Network
        Device (PND) <xref target="I-D.irtf-coinrg-coin-terminology" /> that can
        be reconfigured for different network requirements inside the MO.
      </t>

      <t>
        In-Network Computing Functions (INCF): The service functions that work
        for computing in the network infrastructure. They are a group of COIN
        programs <xref target="I-D.irtf-coinrg-coin-terminology" /> to provide
        required computing tasks and functions.
      </t>

      <t>
        In-Network Application Functions (INAF): The service functions that work
        for applications in Mobile Objects. They are a group of COIN programs
        <xref target="I-D.irtf-coinrg-coin-terminology" /> to provide the
        required application tasks and functions.
      </t>

      <t>
        Interface to In-Network Functions (I2INF): Interfaces that are used
        between a pair of INFs for the interaction, configuration and
        monitoring. 
      </t>

      <t>
        A Framework for Interface to In-Network Functions (I2INF): a framework
        that consists of components and interfaces to configure and monitor INFs
        that can be employed by applications and services in the network
        infrastructure and MOs. 
      </t>      

    </list>
    </t>

</section>

<section anchor="section:Problem-Statement-for-I2INF"
title="Problem Statement for Interface to In-Network Functions">
    <t>
    This section starts with a description and examples of In-Network Computing
    Functions. Next, an overview of  Intent-Based Networking (IBN) is presented,
    and finally the Problem Statement for the Interface to In-Network Functions
    (I2INF). <xref target="figure:Wireless-and-Wired-Networks-for-I2INF" />
    shows Wireless and Wired Networks of a Central Cloud. The I2INF framework
    includes network entities and Mobile Objects (MO). <xref
    target="figure:VNF-Consensus-Architecture-for-I2INF" /> shows a
    VNF-Consensus Architecture that allows the I2INF framework to synchronize
    flow table information of replicated SDN Controllers all in the same Edge
    Cloud <xref target="NFV-COIN" />. These are example networks within the
    I2INF problem space.
    </t>
    
      <figure anchor="figure:Wireless-and-Wired-Networks-for-I2INF" align="center"
          title="I2INF Framework: Wireless and Wired Networks in a Central Cloud">
          <artwork align="left"><![CDATA[
                                  Central Cloud
                   *******************************************
                 *                                             *
                *              +------------------+             *
               *               | Cloud Controller |              *
               *               +------------------+              *
               *                         ^                       *
                *                        |                      *
                 *                       v                     *
                   *******************************************
                    ^                   ^                    ^
                    |                   |                    |
                    V                   V                    V
              +-----------+       +-----------+        +-----------+
              |Edge-Cloud1|       |Edge-Cloud2|        |Edge-Cloud3|
              +-----------+       +-----------+        +-----------+
                    ^                   ^                    ^
                    |                   |                    |
                    V                   V                    V
               +---------+         +---------+         +---------+
               | IP-RSU1 |<------->| IP-RSU2 |<------->| IP-RSU3 |
               +---------+         +---------+         +---------+
                    ^                   ^                    ^
                    :                   :                    :
           +-----------------+ +-----------------+   +-----------------+
           |        : V2I    | |        : V2I    |   |       : V2I     |
           |        v        | |        v        |   |       v         |
+--------+ |   +--------+    | |   +--------+    |   |   +--------+    |
|   MO1  |===> |   MO2  |===>| |   |   MO3  |===>|   |   |   MO4  |===>|
+--------+<...>+--------+<........>+--------+    |   |   +--------+    |
           V2V     ^         V2V        ^        |   |        ^        |
           |       : V2V     | |        : V2V    |   |        : V2V    |
           |       v         | |        v        |   |        v        |
           |  +--------+     | |   +--------+    |   |    +--------+   |
           |  |   MO5  |===> | |   |   MO6  |===>|   |    |   MO7  |==>|
           |  +--------+     | |   +--------+    |   |    +--------+   |
           +-----------------+ +-----------------+   +-----------------+
                 Subnet1              Subnet2              Subnet3
                (Prefix1)            (Prefix2)            (Prefix3)

        <----> Wired Link   <....> Wireless Link   ===> Moving Direction
]]></artwork>
      </figure>

      <figure anchor="figure:VNF-Consensus-Architecture-for-I2INF" align="center"
          title="I2INF Framework: VNF-Consensus in an Edge Cloud">
          <artwork align="left"><![CDATA[
                        Edge Cloud                      Central Cloud
        ******************************************        **********
       *                                          *     *            *
      *                                            *   * +----------+ *
      *  +---------------+   +-----------------+   *   * |  Cloud   | *
      *  | VNF-Consensus |<->| Edge Controller |<->*<->* |Controller| *
      *  +-------^-------+   +--------^--------+   *   * +----------+ *
      *          |                    |            *   *              *
       *         v                    V           *     *            *
        ******************************************        **********
        ^                    ^                    ^
        |                    |                    |
        V                    V                    V
+---------------+    +---------------+    +---------------+
|SDN-Controller1|    |SDN-Controller2|    |SDN-Controller3|
+---------------+    +---------------+    +---------------+
        ^                    ^                    ^
        |                    |                    |
        V                    V                    V
+---------------+    +---------------+    +---------------+
|   +-----+     |    |   +-----+     |    |   +-----+     |
|   | SW1 |     |    |   | SW3 |     |    |   | SW5 |     |
|   +---^-+     |    |   +---^-+     |    |   +---^-+     | 
|       |       |    |       |       |    |       |       |
|     +-V---+   |    |     +-V---+   |    |     +-V---+   |
|     | SW2 |   |    |     | SW4 |   |    |     | SW6 |   |
|     +-----+   |    |     +-----+   |    |     +-----+   |
+---------------+    +---------------+    +---------------+     
   SDN-Network1         SDN-Network2         SDN-Network3
     (Prefix1)            (Prefix2)            (Prefix3)

<----> Wired Link
]]></artwork>
      </figure>

    <section anchor="section:In-Network-Computing-Functions" title="In-Network Computing Functions">
        <t>
        A large variety of In-Network Computing Functions (INCF) have been
        proposed for the implementation of various services implemented with
        COIN (COmputing In-the Network) which is based on network softwarization
        technologies, mainly NFV and SDN
        <xref target="I-D.irtf-coinrg-use-cases" /><xref target="NFV-COIN" />.
        </t>

        <t>
        The COIN Use Cases Document <xref target="I-D.irtf-coinrg-use-cases" />
        proposes four kinds of use cases for In-Network Computing. Those use
        cases are (i) Providing New COIN Experiences, (ii) Supporting New COIN
        Systems, (iii) Improving Existing COIN Capabilities, and (iv) Enabling
        New COIN Capabilities.
            <list style="numbers">
            <t>
            For Providing New COIN Experiences, the document describes mobile
            application offloading and Extended Reality (XR) and immersive
            media.
            </t> 

            <t>
            For Supporting New COIN Systems, the document describes In-Network
            Control, Time- Sensitive Applications, Large Volume Applications,
            and Industrial Safety.
            </t>

            <t>
            For Improving Existing COIN Capabilities, the document describes
            Content Delivery Networks (CDN), Compute-Fabric-as-a-Service
            (CFaaS), and Virtual Network Programming (e.g., P4 programs and
            OpenFlow rules).
            </t>

            <t>
            For Enabling New COIN Capabilities, the document describes
            Distributed AI Training among distributed endpoints for solving
            large-scale problems.
            </t>
            </list>
        </t>

        <t>
        NFV-COIN <xref target="NFV-COIN" /> describes three use cases for
        In-Network Computing. Its use cases are (i) NFV Failure Detection, (ii)
        Virtual Network Function (VNF) Consensus, and (iii) NFV Reliable
        Broadcast.
            <list style="numbers">
            <t>
            NFV Failure Detection is that an NFV-based failure detector that
            obtains monitoring data from SDN Switches via an SDN Controller and
            also detects the failure of communication links. This failure
            detector is a standalone NF and is thus separated from the SDN
            Controller and thus it does not sacrifice SDN Controller performance
            (e.g., CPU usage).
            </t>

            <t>
            VNF Consensus is that a consensus service that performs the
            synchronization of the control planes of replicated SDN Controllers.
            This consensus service does not require any modification of both the
            data plane and control plane of SDN switches and controllers. Through
            the consensus service, if a new rule is configured by an SDN Controller,
            this rule is reliably distributed to all the other SDN Controllers
            through the VNF-Consensus service.
            </t>

            <t>
            NFV Reliable Broadcast is that an NFV-based broadcast service
            (NFV-RBCast) that provides both  reliable and ordered delivery of
            messages. This ordered broadcast is implemented by NFV-RBCast using
            a VNF-Sequencer. A flow to be broadcast the NFV- RBCast service
            causes an SDN Controller to install a forwarding rule on the
            necessary SDN Switches. All the packets of the flow are forwarded to
            the VNF-Sequencer. The VNF-Sequencer inserts a sequence number into
            each of those forwarded packets, and sends them to the destination.  
            </t>                        
            </list>
        </t>

        <t>
        Functionalities of each service need to be decomposed into AFs and NFs
        in edge computing. The management and configuration of those AFs and NFs
        is a functionality that must be provided by a service coordinator in the
        context of COIN-based network services. There is currently no framework
        or interfaces defined there is no standard specifying for the life cycle
        of COIN-based services.
        </t>
    </section>

    <section anchor="section:Intent-Based-Networking" title="Intent-Based Networking">
    <t>
    According to <xref target = "RFC9315" /> the intent life cycle of an Intent-Based
    System (IBS) is shown in 
    <xref target = "figure:Life-Cycle-of-IBS-for-Intent-Management" />. The
    life cycle involves intent management for network entities and MOs. RFC9215
    divides the IBS life cycle into three spaces, namely MO User Space,
    Translation &amp; IBS Space, and Network Operations (Ops) &amp; Application
    (App) Space. Each space is further subdivided into two sections, fulfillment
    and assurance. The fulfillment section pipelines the steps (i.e., intent
    input, translation/refinement, learning/planning/rendering, and
    configuration/provisioning) toward the final SFs such as Network Functions
    (NFs) and Application Functions (AFs) in MOs. The assurance section monitors
    final results of the intent fulfillment to validate and analyze the resulted
    NFs and applications for MOs.
    </t>

    <figure anchor="figure:Life-Cycle-of-IBS-for-Intent-Management" align="center"
        title="Intent Management: IBS Intent Life Cycle">
        <artwork align="left"><![CDATA[
        IBS User     :            Translation/          : Network Ops/
          Space      :             IBS Space            :  App Space
Fulfill              :                                  :
       +----------+  :  +------------+   +------------+ : +-----------+
       |Recognize/|---->| Translate/ |-->|   Learn/   |-->| Configure/|
       | Generate |  :  |   Refine   |   |   Plan/    | : | Provision |
       | Intent   |<----|            |   |   Render   | : |           |
       +----------+  :  +------------+   +------------+ : +-----------+
            ^        :                         ^        :       |
............|..................................|................|.....
            |        :                    +----------+  :       v
            |        :                    | Validate |  :  +----------+
            |        :                    +----^-----+<----| Monitor/ |
Assure      |        :                         |        :  | Observe  |
        +--------+   :  +----------+      +----------+<----|          |
        | Report |<-----| Abstract |<-----| Analyze/ |  :  +----------+
        +--------+   :  +----------+      | Aggregate|  :
                     :                    +----------+  :
]]>
    </artwork>
    </figure>

        <t>
        The life cycle in <xref target =
        "figure:Life-Cycle-of-IBS-for-Intent-Management" /> is presented as a
        conceptual view and needs to be made concrete in the form of a framework
        with interfaces among components in the framework. The data models of an
        intent, a network policy, and an application policy should be specified
        by either YANG 
        <xref target="RFC6020" /><xref target="RFC7950" /> or YAML <xref
        target="YAML" />. Messages are to be delivered to target components via
        some message delivery protocol, such as NETCONF 
        <xref target="RFC6241" />, RESTCONF <xref target="RFC8040" />, or 
        REST API <xref target="REST" />.
        </t>
    </section>

    <section anchor="section:Problem-Statement" title="Problem Statement">
        <t>
        The goal of an Intent-Based System (IBS) is to enforce the service
        corresponding to a user's intent with an appropriate application in a
        target network in terms of functionality and quality 
        <xref target = "RFC9315" /><xref target="RFC8329" />
        <xref target="I-D.jeong-i2nsf-security-management-automation" />
        <xref target="I-D.jeong-nmrg-ibn-network-management-automation" />. To
        achieve this goal, first of all, an intent needs to be translated into
        either a network policy or an application policy by an intent translator
        <xref target="I-D.jeong-nmrg-ibn-network-management-automation" />
        <xref target="I-D.yang-i2nsf-security-policy-translation" />. Then those
        network policies and application policies need to be delivered to a
        network controller and an application controller, respectively. The
        network controller further translates the network policy into the
        network rules to be sent to the network entities (i.e., NFs). In the
        same way, the application controller further translates the application
        policy into the application rules to be sent to the application entities
        (i.e., AFs).
        </t>

        <t>
        For the translation of either an intent or a policy, the capabilities of
        NFs and AFs should be registered with databases (e.g., NF database and
        AF database). Thus, a capability data model for such NFs and AFs should
        be specified <xref target="I-D.ietf-i2nsf-capability-data-model" />.
        Also, a registration interface is required for an NF or AF vendor to
        register its NF or AF with the corresponding database such as the NF
        database and the AF database, respectively 
        <xref target="I-D.ietf-i2nsf-registration-interface-dm" />. Therefore, a
        data model for this registration interface should be specified to make a
        registration message for the Vendor's Management System (VMS) <xref
        target="RFC8329" />.
        </t>

        <t>
        An IBS user needs an interface to send an intent to an IBS controller
        (e.g.., Cloud Controller in <xref
        target="figure:Wireless-and-Wired-Networks-for-I2INF" />), it must have
        an intent translator, which translates the intent into a network policy
        or an application policy, and a dispatcher, which dispatches the
        policies to appropriate destinations (e.g, NF controller and AF
        controller). This interface is called a Customer-Facing Interface (CFI)
        for the IBS user 
        <xref target="I-D.ietf-i2nsf-consumer-facing-interface-dm" />. A data
        model for the Customer-Facing Interface should be specified.
        </t>

        <t>
        Both an NF controller and an AF controller need an interface to deliver
        the network rules and the application rules to the appropriate NFs and
        the appropriate AFs, respectively. This interface is called a Service
        Function-Facing Interface (SFI) for both the NF controller and the AF
        controller 
        <xref target="I-D.ietf-i2nsf-nsf-facing-interface-dm" />.
        </t>

        <t>
        For the assurance of the intent in the target network and application,
        the collection and analysis of monitoring data from the NFs and AFs is
        required. A Monitoring Interface <xref
        target="I-D.ietf-i2nsf-nsf-monitoring-data-model" /> is an interface to
        collect monitoring data from either an NF or an AF to a data collector
        (e.g., IBS analyzer
        <xref target="I-D.lingga-i2nsf-analytics-interface-dm" />
        <xref target="TS-23.288" /><xref target="TS-29.520" />). For the further
        actions, the analysis results of the NF and the AF should be reported to
        the NF controller and the AF controller, respectively. An Analytics
        Interface is an interface to deliver analysis results to either an NF
        controller or an AF controller 
        <xref target="I-D.lingga-i2nsf-analytics-interface-dm" />.          
        </t>

        <t>
        The data models for capability and interfaces can be constructed by
        either YANG <xref target="RFC6020" /><xref target="RFC7950" /> or YAML
        <xref target="YAML" />. The message delivery protocol for the interfaces
        can be one among NETCONF <xref target="RFC6241" />, RESTCONF <xref
        target="RFC8040" />, or REST API <xref target="REST" />. 
        </t>

    </section>
</section>

<section anchor="section:IANA-Considerations" title="IANA Considerations">
  <t>
    This document does not require any IANA actions.
  </t>
</section>

<section anchor="section:Security-Considerations" title="Security Considerations">
  <t>
    The same security considerations for the Interface to Network Security
    Functions (I2NSF) Framework <xref target="RFC8329" /> are applicable to the
    Intent-Based System this document.
  </t>

</section>

</middle>

<back>

<!-- START: Normative References -->
<references title="Normative References">

    <?rfc include="reference.RFC.6020"?>
    <?rfc include="reference.RFC.6241"?>
    <?rfc include="reference.RFC.7149"?>
    <?rfc include="reference.RFC.7950"?>
    <?rfc include="reference.RFC.8040"?>    
    <?rfc include="reference.RFC.8329"?>
    <?rfc include="reference.RFC.9315"?>
    <?rfc include="reference.RFC.9365"?>
    
</references>
<!-- END: Normative References -->

<!-- START: Informative References -->
<references title="Informative References">

    <?rfc include='reference.I-D.jeong-nmrg-ibn-network-management-automation'?>
    <?rfc include='reference.I-D.irtf-coinrg-coin-terminology'?>
    <?rfc include='reference.I-D.irtf-coinrg-use-cases'?>
    <?rfc include='reference.I-D.ietf-i2nsf-applicability'?>
    <?rfc include='reference.I-D.ietf-i2nsf-capability-data-model'?>
    <?rfc include='reference.I-D.ietf-i2nsf-registration-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-consumer-facing-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-nsf-facing-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-nsf-monitoring-data-model'?>
    <?rfc include='reference.I-D.lingga-i2nsf-analytics-interface-dm'?>
    <?rfc include='reference.I-D.jeong-i2nsf-security-management-automation'?>
    <?rfc include='reference.I-D.yang-i2nsf-security-policy-translation'?>

    <reference anchor="YAML">
        <front>
            <title>Yet Another Markup Language (YAML) 1.0</title>
            <author initials="B." surname="Ingerson" />
            <author initials="C." surname="Evans" />
            <author initials="O." surname="Ben-Kiki" />
            <date month="October" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://yaml.org/spec/history/2001-05-26.html" />
    </reference>

    <reference anchor="TS-23.501">
        <front>
            <title>System Architecture for the 5G System (5GS)</title>
            <author surname="3GPP TS 23.501 V18.3.0" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144" />
    </reference>

    <reference anchor="TS-28.312">
        <front>
            <title>Intent Driven Management Services for Mobile Networks</title>
            <author surname="3GPP TS 28.312 V18.1.1" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3554" />
    </reference>

    <reference anchor="TR-28.812">
        <front>
            <title>Study on Scenarios for Intent Driven Management Services for Mobile Networks</title>
            <author surname="3GPP TR 28.812 V17.1.0" />
            <date month="December" year="2020" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3553" />
    </reference>

    <reference anchor="TS-23.288">
        <front>
            <title>Architecture Enhancements for 5G System (5GS) to Support Network Data Analytics Services</title>
            <author surname="3GPP TS 23.288 V18.3.0" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3579" />
    </reference>

    <reference anchor="TS-29.520">
        <front>
            <title>Network Data Analytics Services</title>
            <author surname="3GPP TS 29.520 V18.3.0" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3355" />
    </reference>

    <reference anchor="ETSI-NFV">
        <front>
            <title>Network Functions Virtualisation (NFV); Architectural Framework</title>
            <author surname="ETSI GS NFV 002 V1.2.1" />
            <date month="December" year="2014" />
        </front>
        <seriesInfo name="Available:" value="https://www.etsi.org/deliver/etsi_gs/nfv/001_099/002/01.02.01_60/gs_nfv002v010201p.pdf" />
    </reference>

    <reference anchor="ETSI-NFV-Release-2">
        <front>
            <title>Network Functions Virtualisation (NFV) Release 2; 
            Management and Orchestration; Architectural Framework Specification</title>
            <author surname="ETSI GS NFV 006 V2.1.1" />
            <date month="January" year="2021" />
        </front>
        <seriesInfo name="Available:" value="https://www.etsi.org/deliver/etsi_gs/nfv/001_099/006/02.01.01_60/gs_nfv006v020101p.pdf" />
    </reference>

    <reference anchor="NFV-COIN">
        <front>
            <title>NFV-COIN: Unleashing The Power of In-Network Computing with Virtualization Technologies</title>
            <author initials="G." surname="Venancio" />
            <author initials="R." surname="Turchetti" />
            <author initials="E." surname="Duarte Jr." />
            <date month="December" year="2022" />
        </front>
        <seriesInfo name="SBC" value="Journal of Internet Services and Applications" />
        <seriesInfo name="Available:" value="https://journals-sol.sbc.org.br/index.php/jisa/article/view/2342" />
    </reference> 

    <reference anchor="REST">
        <front>
            <title>Principled Design of the Modern Web Architecture</title>
            <author initials="R." surname="Fielding" />
            <author initials="R." surname="Taylor" />
            <date month="May" year="2002" />
        </front>
        <seriesInfo name="ACM" value="Transactions on Internet Technology, Vol. 2, Issue 2," />
        <seriesInfo name="Available:" value="https://dl.acm.org/doi/10.1145/514183.514185" />
    </reference>

    <reference anchor="USENIX-ATC-Lumi">
        <front>
            <title>Hey, Lumi! Using Natural Language for Intent-Based Network Management</title>
            <author initials="A." surname="Jacobs" />
            <author initials="R." surname="Pfitscher" />
            <author initials="R." surname="Ribeiro" />
            <author initials="R." surname="Ferreira" />
            <author initials="L." surname="Granville" />
            <author initials="W." surname="Willinger" />
            <author initials="S." surname="Rao" />
            <date month="July" year="2021" />
        </front>
        <seriesInfo name="USENIX" value="Annual Technical Conference" />
        <seriesInfo name="Available:" value="https://www.usenix.org/conference/atc21/presentation/jacobs" />
    </reference>

    <reference anchor="BERT">
        <front>
            <title>BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding</title>
            <author initials="J." surname="Devlin" />
            <author initials="M." surname="Chang" />
            <author initials="K." surname="Lee" />
            <author initials="K." surname="Toutanova" />
            <date month="June" year="2019" />
        </front>
        <seriesInfo name="NAACL-HLT" value="Conference" />
        <seriesInfo name="Available:" value="https://aclanthology.org/N19-1423.pdf" />
    </reference>

    <reference anchor="Deep-Learning">
        <front>
            <title>Deep Learning</title>
            <author initials="I." surname="Goodfellow" />
            <author initials="Y." surname="Bengio" />
            <author initials="A." surname="Courville" />
            <date month="November" year="2016" />
        </front>
        <seriesInfo name="Publisher:" value="The MIT Press" />
    <seriesInfo name="Available:" value="https://www.deeplearningbook.org/" />
    </reference>

    <reference anchor="AUTOSAR-SDV">
        <front>
            <title>AUTOSAR Adaptive Platform</title>
            <author surname="AUTOSAR" />
            <date month="March" year="2024" />
        </front>
        <seriesInfo name="Available:" value="https://www.autosar.org/standards/adaptive-platform" />    
    </reference>

    <reference anchor="Eclipse-SDV">
        <front>
            <title>Eclipse Software Defined Vehicle Working Group Charter</title>
            <author surname="Eclipse" />
            <date month="March" year="2024" />
        </front>
        <seriesInfo name="Available:" value="https://www.eclipse.org/org/workinggroups/sdv-charter.php" />    
    </reference>

    <reference anchor="COVESA">
        <front>
            <title>Connected Vehicle Systems Alliance </title>
            <author surname="COVESA" />
            <date month="March" year="2024" />
        </front>
        <seriesInfo name="Available:" value="https://covesa.global/" />    
    </reference>

    <reference anchor="Kubernetes">
        <front>
            <title>Kubernetes: Cloud Native Computing Platform</title>
            <author surname="Kubernetes" />
            <date month="March" year="2024" />
        </front>
        <seriesInfo name="Available:" value="https://kubernetes.io/" />    
    </reference>

    <reference anchor="Survey-IBN-CST-2023">
        <front>
            <title>A Survey on Intent-Based Networking</title>
            <author initials="A." surname="Leivadeas" />
            <author initials="M." surname="Falkner" />
            <date month="March" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://ieeexplore.ieee.org/document/9925251" />    
    </reference>

    <reference anchor="ClickINC">
        <front>
            <title>ClickINC: In-network Computing as a Service in Heterogeneous Programmable Data-center Networks</title>
            <author initials="W." surname="Xu" />
            <author initials="Z." surname="Zhang" />
            <author initials="Y." surname="Feng" />
            <author initials="H." surname="Song" />
            <author initials="Z." surname="Chen" />
            <author initials="W." surname="Wu" />
            <author initials="G." surname="Liu" />
            <author initials="Y." surname="Zhang" />
            <author initials="S." surname="Liu" />
            <author initials="Z." surname="Tian" />
            <author initials="B." surname="Liu" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Publisher:" value="ACM SIGCOMM" />
        <seriesInfo name="Available:" value="https://dl.acm.org/doi/10.1145/3603269.3604835" />    
    </reference>
    
</references>
<!-- END: Informative References -->

<!-- START: Changes -->
<section title="Changes from draft-jeong-opsawg-i2inf-problem-statement-01">
    <t> 
    The following changes are made from
    draft-jeong-opsawg-i2inf-problem-statement-01:
    <list style="symbols">
        <t>
        The conents have been updated according to the discussion among the authors.
        </t>

        <t>
        This version updates the contents in terms of NFV-COIN.
        </t>
    </list>
    </t>
</section>
<!-- END: Changes -->

<!-- START: Acknowledgments -->
<section anchor="section:Acknowledgments" numbered="false" title="Acknowledgments">
    <t indent="0" pn="section-appendix.a-1">    
    This work was supported by Institute of Information &amp; Communications
    Technology Planning &amp; Evaluation (IITP) grant funded by the Korea
    Ministry of Science and ICT (MSIT) (No. RS-2024-00398199).
    </t>

    <t indent="0" pn="section-appendix.a-2">
    This work was supported in part by Institute of Information &amp;
    Communications Technology Planning &amp; Evaluation (IITP) grant funded by
    the Korea Ministry of Science and ICT (MSIT) (No. RS-2022-II221015, Development
    of Candidate Element Technology for Intelligent 6G Mobile Core Network).
    </t>
</section>
<!-- END: Acknowledgments -->

<!-- START: Contributors -->
<section anchor="section:Contributors" numbered="false" title="Contributors">
    <t indent="0" pn="section-appendix.b-1">
    This document is made by the group effort of OPWAWG, greatly benefiting 
    from inputs and texts by <contact fullname="Linda Dunbar"/> (Futurewei),
    <contact fullname="Yong-Geun Hong"/> (Daejeon University), and
    <contact fullname="Joo-Sang Youn"/> (Dong-Eui University).
    The authors sincerely appreciate their contributions.
    </t>

    <t indent="0" pn="section-appendix.b-2">  
    The following are coauthors of this document:
    </t>   

      <contact fullname="Mose Gu">
        <organization showOnFrontPage="true">Department of Computer Science &amp; Engineering</organization>
        <address>
          <postal>
            <extaddr>Sungkyunkwan University</extaddr>
            <street>2066 Seobu-Ro, Jangan-Gu</street>
            <city>Suwon</city>
            <region>Gyeonggi-Do</region>
            <code>16419</code>
            <country>Republic of Korea</country>
          </postal>
          <phone>+82 31 299 4106</phone>
          <email>rna0415@skku.edu</email>
          <uri>http://iotlab.skku.edu/people-Moses-Gu.php</uri>
        </address>
      </contact>
      <contact fullname="Juwon Hong">
        <organization showOnFrontPage="true">Department of Computer Science &amp; Engineering</organization>
        <address>
          <postal>
            <extaddr>Sungkyunkwan University</extaddr>
            <street>2066 Seobu-Ro, Jangan-Gu</street>
            <city>Suwon</city>
            <region>Gyeonggi-Do</region>
            <code>16419</code>
            <country>Republic of Korea</country>
          </postal>
          <phone>+82 31 299 4106</phone>
          <email>hongju2024@skku.edu</email>
          <uri>http://iotlab.skku.edu/people-Joo-Won-Hong.php</uri>
        </address>
      </contact>
</section>
<!-- END: Contributors -->

</back>

<!-- <vspace blankLines="100"/> -->
<!-- page break to put addresses onto one page-->

</rfc>
