<?xml version="1.0" encoding="US-ASCII"?>
<!-- <?xml version="1.0" encoding="UTF-8"?> -->
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private)
-->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">


<?rfc toc="yes"?>
<?rfc rfcedstyle="yes"?>
<?rfc subcompact="no"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" category="info" docName="draft-jeong-nmrg-ibn-network-management-automation-06">

<front>
    <title abbrev="IBN Network Management Automation">
    Intent-Based Network Management Automation in 5G Networks
    </title>

    <author role="editor" initials="J." surname="Jeong" fullname="Jaehoon Paul Jeong">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science &amp; Engineering
        </organization>

        <address>
            <postal>
                <extaddr>Sungkyunkwan University</extaddr>
                <street>2066 Seobu-Ro, Jangan-Gu</street>
                <city>Suwon</city> <region>Gyeonggi-Do</region>
                <code>16419</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 31 299 4957</phone>
            <facsimile>+82 31 290 7996</facsimile>
            <email>pauljeong@skku.edu</email>
            <uri>http://iotlab.skku.edu/people-jaehoon-jeong.php
         </uri>
        </address>
    </author>

    <author initials="Y." surname="Ahn" fullname="Yoseop Ahn">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science &amp; Engineering
        </organization>	

		    <address>
			      <postal>
			          <extaddr>Sungkyunkwan University</extaddr>
  			        <street>2066 Seobu-Ro, Jangan-Gu</street>
				        <city>Suwon</city>
				        <region>Gyeonggi-Do</region>
				        <code>16419</code>
				        <country>Republic of Korea</country>
			      </postal>
			      <phone>+82 31 299 4106</phone>
			      <email>ahnjs124@skku.edu</email>
			      <uri>http://iotlab.skku.edu/people-Ahn-Yoseop.php</uri>
		    </address>
    </author>

    <author initials="M." surname="Gu" fullname="Mose Gu">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science &amp; Engineering
        </organization>	

		    <address>
			      <postal>
			          <extaddr>Sungkyunkwan University</extaddr>
  			        <street>2066 Seobu-Ro, Jangan-Gu</street>
				        <city>Suwon</city>
				        <region>Gyeonggi-Do</region>
				        <code>16419</code>
				        <country>Republic of Korea</country>
			      </postal>
			      <phone>+82 31 299 4106</phone>
			      <email>rna0415@skku.edu</email>
			      <uri>http://iotlab.skku.edu/people-Moses-Gu.php</uri>
		    </address>
    </author>

    <author initials="Y." surname="Kim" fullname="Younghan Kim">
        <organization abbrev="Soongsil University">
        School of Electronic Engineering
        </organization>

        <address>
            <postal>
                <extaddr>Soongsil University</extaddr>
                <street>369, Sangdo-ro, Dongjak-gu</street>
                <city>Seoul</city>
                <code>06978</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 10 2691 0904</phone>
            <email>younghak@ssu.ac.kr</email>
        </address>
    </author>

    <author initials="J." surname="Park" fullname="Jung-Soo Park">
        <organization abbrev="ETRI">
        Standards &amp; Open Source Research Division
        </organization>

        <address>
            <postal>
                <extaddr>Electronics and Telecommunications Research Institute</extaddr>
                <street>218 Gajeong-Ro, Yuseong-Gu</street>
                <city>Daejeon</city>
                <code>34129</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 42 860 6514</phone>
            <email>pjs@etri.re.kr</email>
        </address>
    </author>

    <date month="June" day="9" year="2025" />

    <area>Networking</area>
    
    <workgroup>Network Management Research Group</workgroup>

<!-- [rfced] Please insert any keywords (beyond those that appear in
the title) for use on http://www.rfc-editor.org/rfcsearch.html. -->

<keyword>Internet-Draft</keyword>

    <abstract>
        <t>
        This document describes Network Management Automation (NMA) of
        cellular network services in 5G networks.  For NMA, 
        it proposes a framework empowered with Intent-Based Networking (IBN).
        The NMA in this document deals with a closed-loop network control,
        network intent translator, and network management audit.  To support
        these three features in NMA, it specifies an architectural framework
        with system components and interfaces. Also, this framework can
        support the use cases of NMA in 5G networks such as the data
        aggregation of Internet of Things (IoT) devices, network slicing,
        and the Quality of Service (QoS) in Vehicle-to-Everything (V2X).
        </t>
    </abstract>
</front>

<middle>

<section anchor="section:Introduction" title="Introduction">
    <t>
    5G networks are evolutionary mobile networks over 4G networks
    in terms of high speed, wide bandwidth, high frequency bands, massive
    device connectivity, low energy consumption, and intelligence.
    Especially, the intelligence will be a key feature to understand 
    the intents of users and automate network management fully.
    5G networks are designed and implemented on the experience from
    4G networks and new technologies which include Software-Defined
    Networking (SDN) <xref target="RFC7149" /> and Network Functions
    Virtualization (NFV) <xref target="ETSI-NFV" /><xref target="ETSI-NFV-Release-2" />
    along with mmWave for low delivery delay, high data speed, and large
    network capacity <xref target="TS-23.501" />.
    </t>
    
    <t>
    The support of network intelligence is one of the main goals of 5G
    networks.  The network intelligence can provide the 5G networks with
    Network Management Automation (NMA) for a self-driving network that
    optimizes and adjusts itself by minimizing the interaction with humans
    (e.g., network administrators and users).
    </t>
  
    <t>
    Intent-Based Networking (IBN) is a feasible approach that can provide
    the 5G networks with the NMA services <xref target="RFC9315" />
    <xref target="TS-28.312" /><xref target="TR-28.812" />.
    The concept of IBN enables a closed-loop network control architecture
    <xref target="RFC9315" />
    that can adapt to the current status of a target network by collecting
    and analyzing monitoring data from Network Functions (NFs).
    NFs can be either Virtual Network Functions (VNFs), Cloud-Native
    Network Functions (CNFs) or Physical Network Functions (PNFs) in cloud
    and edge computing environments.  
    In the 3rd Generation Partnership Project (3GPP), Network Data Analytics
    Function (NWDAF) is defined to collect and analyze monitoring data from
    multiple VNFs and PNFs in cellular networks 
    <xref target="TS-23.288" /><xref target="TS-29.520" />.
    </t>
 
    <t>
    For the intelligent NMA services, this document proposes an architectural
    framework that combines the IBN and NWDAF to the 5G networks with
    Artificial Intelligence (AI) and Machine Learning (ML). The framework
    allows a network intent from either a network operator or user, which is
    expressed in the form in <xref target="TS-28.312" />, to be translated 
    into a network policy by a Network Intent Translator (NIT) 
    <xref target="I-D.yang-i2nsf-security-policy-translation" />. 
    A Natural Language Processing (NLP) technique can be used to design and implementation
    of such an NIT <xref target="USENIX-ATC-Lumi" />.
    For the intent translation, the data model mapping between a network indent
    data model and a network policy needs to be performed by a data model mapper
    in advance <xref target="I-D.yang-i2nsf-security-policy-translation" />.
    The translated network policy can be used to remotely configure NFs running 
    on top of VNFs, CNFs or PNFs in order to enforce the commanded intent in a
    target network (e.g., 5G Networks).  Also, it also collects and
    analyzes the monitoring data from VNFs, CNFs and PNFs such that the network policy can
    be verified and optimized to satisfy the requests for the network intent.
    </t>

    <t>
    Therefore, the NMA in this document deals with closed-loop network
    control, network intent translator, and network management audit.
    To support these three features in NMA, it specifies an architectural
    framework with system components and interfaces.  In addition, this
    framework can support the use cases of NMA in 5G networks such as
    the data aggregation of Internet of Things (IoT) devices, network
    slicing, and the Quality of Service (QoS) in Vehicle-to-Everything (V2X).
    Especially, this document shows a use case of IoT in 5G networks
    such as the data collection and analysis of IoT devices.
    </t>
</section>

<section anchor="section:Terminology" title="Terminology">
    <t>
      This document uses the terminology described in <xref target="RFC8329" />, 
      <xref target="I-D.ietf-i2nsf-applicability" />, and 
      <xref target="I-D.jeong-i2nsf-security-management-automation"/>.
      In addition, the following terms are defined below:
    </t>

    <t>
    <list style="symbols">
      <t>
        Intent: A set of operational goals (that a network should meet) and
        outcomes (that a network is supposed to deliver) defined in a
        declarative manner without specifying how to achieve or implement
        them <xref target="RFC9315" />.
      </t>

      <t>
        Network Management Automation (NMA): It enforces a network
        intent from a user (or administrator) into a target network system. 
        The network intent can be translated into the corresponding network
        policy by a network intent translator (NIT) and dispatched to appropriate NFs.
        Through the monitoring of the NFs, the activity and performace of
        the NFs is monitored and analyzed. If needed, the network rules of
        the network policy are augmented or new network rules are
        generated and configured to appropriate NFs.
      </t>

      <t>
        Network Intent Translator (NIT): It translates a network intent to 
        a network policy that can be understood and configured by an NF for
        a specific network service, such as the data aggregation of Internet
        of Things (IoT) devices, network slicing, and the Quality of Service
        (QoS) provisioning in Vehicle-to-Everything (V2X) communications.
      </t>

        <t>
        Feedback-Based Network Management (FNM): It means that a network
        service is evolved by updating a network policy (having network rules)
        and adding new network rules for detected network problems by
        processing and analzing the monitoring data of NFs.
        </t>
    </list>
    </t>

    <figure anchor="figure:Network-Management-Automation-in-IBN-Framework"
     title="Network Management Automation in IBN Framework for 5G Networks">
            <artwork><![CDATA[
   +------------+
   |  IBN User  |
   +------------+
          ^
          | Consumer-Facing Interface (Intent)
          v
+-------------------+     Registration     +-----------------------+
|   IBN Controller  |<-------------------->|  Vendor's Mgmt System |
+-------------------+      Interface       +-----------------------+
          ^      ^
          |      |
          |      |   Analytics Interface   +-----------------------+
          |      +------------------------>|  IBN Analyzer (NWDAF) |
          |                                +-----------------------+
          | NF-Facing Interface (Policy)      ^       ^       ^
          |                                   |       |       |
          |                                   |       |       |
          |    +------------------------------+       |       |
          |    |              +-----------------------+       |
          |    |              |   Monitoring Interface        |
          v    v              v                               v
   +---------------+  +---------------+        +---------------+
   |      NF-1     |--|      NF-2     |........|      NF-n     |
   |(Net Exposure  |  |(Policy Control|        |  (IoT Device) |
   | Function, NEF)|  | Function, PCF)|        |               |
   +---------------+  +---------------+        +---------------+
            ]]></artwork>
    </figure>


</section>

<section anchor="section:Network-Management-Automation-in-IBN-Framework" title="Network Management Automation in IBN Framework for 5G Networks">

    <t>
      This section describes an IBN framework for 5G networks.  Note that
      this IBN Framework is based on the Framework for Interface to Network
      Security Functions (I2NSF) <xref target="RFC8329" /><xref target="I-D.jeong-i2nsf-security-management-automation"/>.
      As shown in <xref target="figure:Network-Management-Automation-in-IBN-Framework" />,
      an IBN User can use network functions by delivering network intents,
      which specify network requirements and goals that the IBN User wants
      to enforce, to the IBN Controller via the Consumer-Facing Interface (CFI).      
    </t>

   <section anchor="section:IBN-Framework-Components-for-Network-Management-Automation" title="Components with IBN Framework for Network Management Automation">
   <t>
   The following are the system components for the IBN framework for
   network management automation in 5G networks.
   </t>

   <t>
       <list style="symbols">
           <t>
           IBN User: An entity that delivers a network intent to
           IBN Controller. It is assumed that a network intent is constructed  
           by the intent data model in the 3GPP intent document 
           <xref target="TS-28.312"/>.
           </t>

           <t>
           IBN Controller: An entity that controls and manages other system
           components in the IBN framework. It translates a network intent into
           the corresponding network policy and selects appropriate NFs to
           execute the network rules of the network policy.
           </t>

           <t>
           Vendor's Management System (VMS): An entity that provides an image of
           of a virtualized NF for a network service to the IBN framework, and
           registers the capability and access information of an NF with IBN
           Controller.
           </t>

           <t>
           Network Function (NF): An entity that is a Virtual Network
           Function (called VNF), Cloud-Native Network Function (CNF), and 
           Physical Network Function (called PNF) which is also called Cloud-native
           Network Function, for a specific network service such as the data
           aggregation of IoT devices, network slicing, and the QoS provisioning
           in V2X communications.
           </t>

           <t>
           IBN Analyzer: An entity that collects monitoring data from NFs and
           analyzes such data for checking the activity and performance of the NFs
           using machine learning techniques (e.g., Deep Learning <xref target="Deep-Learning" />).
           IBN Analyzer can be a Network Data Analytics Function (NWDAF) in 5G
           networks <xref target="TS-23.288" /><xref target="TS-29.520" />.
           If there is a suspicious network problem (e.g., traffic congestion and
           QoS degradation) for the target network or NF, IBN Analyzer delivers a
           report of the augmentation or generation of network rules to IBN
           Controller.
           </t>
       </list>
   </t>

   <t>
     For IBN-based network services with Feedback-Based Network Management (FNM),
     IBN Analyzer is a key IBN component for the IBN framework 
     <xref target="RFC9315" /> <!-- <xref target="RFC9316" /> -->
     to collect monitoring data from NFs and analyzing the monitoring data.
     The actual implementation of the analysis of monitoring data is out of
     the scope of this document.
   </t>

   </section>

   <section anchor="section:IBN-Interfaces" title="Interfaces for the IBN Framework">
   <t>
     The following are the interfaces for the IBN framework. Note that
     the interfaces can be modeled with YANG <xref target="RFC6020" /> or
     YAML <xref target="YAML" /> and network policies are delivered
     through either RESTCONF <xref target="RFC8040" /> or
     NETCONF <xref target="RFC6241" />. In addition, according to 3GPP
     specifications, REST API <xref target="REST" /> can be supported for those
     interfaces.
   </t>

   <t>
     <list style="symbols">
          <t>
           Consumer-Facing Interface: An interface between IBN User and IBN
           Controller for the delivery of a network intent
           <xref target="I-D.ietf-i2nsf-consumer-facing-interface-dm" />.
          </t>

          <t>
           NF-Facing Interface: An interface between IBN Controller and an
           NF (e.g., Network Exposure Function (NEF) in 5G Core Network) 
           for the delivery of a network policy
           <xref target="I-D.ietf-i2nsf-nsf-facing-interface-dm" />.
          </t>

          <t>
           Registration Interface: An interface between a VMS and IBN Controller
           for the registration of an NF's capability and access information with the
           IBN Controller or the query of an NF for a required low-level network
           policy <xref target="I-D.ietf-i2nsf-registration-interface-dm" />.
          </t>

          <t>
           Monitoring Interface: An interface between an NF and IBN Analyzer for
           collecting monitoring data from an NF to check the activity and performance
           of an NF for a possible network problem <xref target="I-D.ietf-i2nsf-nsf-monitoring-data-model" />.
          </t>

          <t>
           Analytics Interface: An interface between IBN Analyzer and IBN
           Controller for the delivery of an analytics report of the augmentation
           or generation of network rules to IBN Controller, which lets
           IBN Controller apply the report for network rules to its network
           policy management <xref target="I-D.lingga-i2nsf-analytics-interface-dm" />.
          </t>
     </list>
   </t>

   <t>
     For IBN-based network services with FSM, Analytics Interface is a key
     interface in the IBN framework to deliver an analytics report of the
     augmentation or generation of network rules to IBN Controller through
     the analysis of the monitoring data from NFs.
   </t>

   </section>

</section>

<section anchor="section:Network-Intent-Translator" title="Network Intent Translator">
    <t>
    To facilitate Network Intent Translation, IBN Controller needs to
    have a Network Intent Translator (NIT) that performs the translation of a network intent
    (called intent) into the corresponding network policy (called policy).
    For the automatic NIT services, the IBN framework needs to bridge an intent
    data model and a policy data model in an automatic manner
    <xref target="I-D.yang-i2nsf-security-policy-translation" />.
    Note that an intent data model is for the IBN Consumer-Facing Interface,
    and a policy data model is for the IBN NF-Facing Interface.
    </t>

  <t>
    <xref target="figure:Automatic-Data-Model-Mapping" /> shows automatic
    mapping of intent and policy data models for network policies. 
    Automatic Data Model Mapper takes an intent data module for the
    Consumer-Facing Inteface and a policy data module for the
    NF-Facing Interface. It then constructs a mapping table associating
    the data attributes (or variables) of the intent data module
    with the corresponding data attributes (or variables) of the policy
    data module. Also, it generates a set of production rules of the
    grammar for the construction of an XML (or JSON) file of network policy
    rules.
  </t>

  <t>
    <xref target="figure:Network-Intent-Translation" /> shows
    the procedure of network intent translation. A network
    policy translator is a component of IBN Controller. The translator
    consists of three components such as Data Model Mapper, Policy
    Data Extractor, Policy Data Converter, and Policy Generator.

    <figure anchor="figure:Automatic-Data-Model-Mapping" title="Automatic Mapping of Intent and Policy Data Models">
            <artwork><![CDATA[

           Intent Data Module              Policy Data Module
                   |                              |
                   V                              V
         +---------+------------------------------+---------+
         |                Data Model Mapper                 |
         +------------------------+-------------------------+
                                  |                                  
               Mapping Model (Data Model Mapping Table)
                                  |
                                  V
         +--------------------------------------------------+
         |                   NF Database                    |
         +--------------------------------------------------+
            ]]></artwork>
  </figure>

    <figure anchor="figure:Network-Intent-Translation" title="Network Intent Translation">
            <artwork><![CDATA[
  +-------------------------------------------------+
  |                                                 |
  |                     IBN User                    |
  |                                                 |
  +------------------------+------------------------+
                           | Consumer-Facing Interface
                           |
                    Network Intent
                           |
       IBN Controller      V
+--------------------------+-----------------------------------------------+
|         Network Intent   |                                               |
|         Translator       V                                               |
|  +-----------------------+--------------------------------------------+  |
|  |                       |                                            |  |
|  |                       V                                            |  |
|  |           +----------------------+      +---------------------+    |  |
|  |           |    Data Extractor    |      |  Data Model Mapper  |    |  |
|  |           +----------------------+      +-----+---------------+    |  |
|  |                       |                       | Mapping            |  |
|  |                       V                       V Model              |  |
|  |           +----------------------+      +--------------------+     |  |
|  |           |    Data Converter    |<---->|    NF Database     |     |  |
|  |           +----------------------+      +--------------------+     |  |
|  |                       |                                            |  |
|  |                       V                                            |  |
|  |           +---------------+------+                                 |  |
|  |           |   Policy Generator   |                                 |  |
|  |           +---------------+------+                                 |  |
|  |                       |                                            |  |
|  |                       V                                            |  |
|  +-----------------------+--------------------------------------------+  |
|                          |                                               |
|                          V                                               |
+--------------------------+-----------------------------------------------+
                           |  NF-Facing Interface
                           |
                    Network Policy
                           |
                           V
  +------------------------+-------------------------+
  |                                                  |
  |                       NF(s)                      |
  |                                                  |
  +--------------------------------------------------+
            ]]></artwork>
  </figure>

    </t>

  <t>
    Data Model Mapper maps the attributes and their values of a
    network intent to the corresponding attributes and their
    values of a network policy. Note that the values of a network
    intent may involve a human language and must be converted
    to an appropriate value for a network policy (e.g.,
    employees -> 192.0.1.0/24).
  </t>

  <t>
    Data Extractor extracts the values of the attributes related to
    the network intent that was delivered by an IBN User to an IBN
    Controller through the Consumer-Facing Interface
    <xref target="I-D.ietf-i2nsf-consumer-facing-interface-dm" />.
  </t>

  <t>
    Data Converter converts the values of the network intent's
    attributes into the values of the corresponding network policy's
    attributes to generate the network policy 
    <xref target="I-D.ietf-i2nsf-nsf-facing-interface-dm" />.
  </t>

  <t>
    Policy Generator generates the corresponding network policy
    that is delivered by the IBN Controller to an appropriate NF through
    NF-Facing Interface <xref target="I-D.ietf-i2nsf-nsf-facing-interface-dm" />.
  </t>

</section>

<section anchor="section:Network-Audit-System" title="Network Audit System">
  <t>
    The IBN framework is weak to both an insider attack and a supply chain attack
    since it trusts in NFs provided by VMS and assumes that NFs work for their
    network services appropriately <xref target="I-D.ietf-i2nsf-applicability" />.
  </t>
  
  <t>
    To detect the malicious activity of either an insider attack by a malicious 
    VMS or a supply chain attack by a compromised VMS, a network audit 
    system is required by the IBN framework.  This network audit system can
    facilitate the non-repudiation of configuration commands and monitoring data
    generated in the IBN framework.
  </t>

  <t>
  A network audit system has the following four main objectives: 
   <list style="symbols">
     <t> To check the existence of a network policy, a management system, and
         its procedures; </t>
     <t> To identify and understand the existing vulnerabilities and risks of
         either an insider attack or a supply chain attack; </t>
     <t> To review existing network controls on operational and administrative
         issues; </t>
     <t> To provide recommendations and corrective actions to IBN Controller
         for further network and security improvement. </t>
   </list>
  </t>

  <figure anchor="figure:Activity-Auditing-with-Network-Audit-System" title="Activity Auditing with Network Audit System">
          <artwork><![CDATA[
+-----------------------------+                   +----------------+
|           IBN User          |                   |  Vendor's Mgmt | 
|                             +------------+      |     System     |
+--------------+--------------+            |      +--------+-------+
               | Consumer-Facing Interface |               |
               |                           |  Remote       |
        Network Intent                     |  Attestation  |
               |                           |  Interface    |
               |                           |               |
               V                           |               V
+--------------+--------------+            |     +---------+--------+
|                             |            V     |      Network     |
|        IBN Controller       +------------+---->|       Audit      |
|                             |            ^     |      System      |
+--------------+--------------+            |     +---------+--------+
               |  NF-Facing Interface      |               ^
               |                           |  Remote       |
        Network Policy                     |  Attestation  |
               |                           |  Interface    |
               V                           |               |
+--------------+--------------+            |      +--------+-------+
|             NF(s)           +------------+      |  IBN Analyzer  | 
|                             +------------------>|                |
+-----------------------------+    Monitoring     +----------------+ 
                                   Interface
       ]]></artwork>
</figure>

  <t>
    <xref target="figure:Activity-Auditing-with-Network-Audit-System" />
    shows activity auditing with a network audit system in the IBN
    framework. All the components in the IBN framwork report its
    activities (such as configuration commands and monitoring data)
    to Network Audit System as transactions through Remote Attestation 
    Interface <xref target="I-D.yang-i2nsf-remote-attestation-interface-dm"/>.  
    The network audit system can analyze the reported activities from the
    IBN components to detect malicious activities such as an insider attack
    and a supply chain attack.
    Note that such a network audit system can be implemented by remote
    attestation <xref target="I-D.ietf-rats-architecture"/><xref target="I-D.yang-i2nsf-remote-attestation-interface-dm"/>
    or Blockchain <xref target="Bitcoin"/>.  The details of the implementation
    of the network audit system are out of the scope of this document.
  </t>
  
  <t>
    In order to determine a minimum set of controls required to reduce the
    risks from either an insider attack or a supply chain attack, the network
    audit system should analyze the activities of all the components in the
    IBN framework periodically, evaluate possible risks, and take an action
    to such risks since vulnerabilities and threats may change in
    different environments over time.
  </t>
</section>

<section anchor="section:IoT-Device-Data-Aggregation" title="A Use Case of IoT Device Data Aggregation">
  <t>
  This section describes a use case where a policy of IoT device data
  aggregation is set up in the IBN framework for 5G networks.
  </t>

  <t>
  <xref target="figure:Procedure-of-IoT-Device-Data-Aggregation-Intent-Enforcement"/>
  shows the procedure of the enforcement for an IoT device data aggregation
  intent in the IBN Framework as follows:
  <list style="numbers">
    <t>
    IBN User sends a Network Intent Request to IBN Controller.
    </t>

    <t>
    IBN Controller translates the request with its Network Intent Translator
    (called NIT).  The NIT identifies NFs (i.e., IoT Devices) for the
    request after the steps of Data Extraction and Data Conversion.
    </t>

    <t>
    If the NFs are available for the requested network policy, go to the step
    of Policy Generation in NIT.
    If the NFs are unavailable for the requested network policy, go to the
    next step.    
    </t>

    <t>
    IBN Controller sends an NF Query Request to Vendor's Management System
    (called VMS) to find an appropriate NF for the request network policy.
    </t>

    <t>
    If there is such an NF registered with VMS, VMS sends an NF
    Initializtion Request to Cloud (or Edge Server) to initialize the NF.
    </t>

    <t>
    Cloud (or Edge Server) forwards the NF Initializtion Request to the
    appropriate NF to let it initialize itself.
    </t>

    <t>
    The NF performs an initialization to perform a task for a network policy
    in 5G networks.
    </t>

    <t>
    The NF sends an NF Initialization Response to Cloud (or Edge Server)
    to tell Cloud (or Edge Server) its readiness to perform a task.
    </t>

    <t>
    Cloud (or Edge Server) forwards the NF Initialization Response to VMS
    to tell an NF's readiness to perform a task.
    </t>

    <t>
    VMS sends an NF Query Response to IBN Controller to tell an NF's
    readiness to perform a task along with the network access information for
    the NF.
    </t>

    <t>
    IBN Controller performs the step of Policy Generation in its NIT along
    with the network access information of an appropriate NF(s).
    </t>

    <t>
    IBN Controller sends a Network Policy Request to the appropriate NF.
    </t>

    <t>
    The NF performs the configration in the given Network Policy Request
    to perform the requested task (e.g., sensing and reporting).
    </t>

    <t>
    The NF sends a Network Policy Response to IBN Controller to tell its
    readiness to perform the requested task.
    </t>
  </list>
  </t>

   <figure anchor="figure:Procedure-of-IoT-Device-Data-Aggregation-Intent-Enforcement"
    title="Procedure of an IoT Device Data Aggregation Intent Enforcement in the IBN Framework">
            <artwork><![CDATA[
IBN             IBN             Vendor's           Cloud              NF1
User         Controller       Mgmt System    (or Edge Server)    (IoT Device)
 |               |                 |                 |                 | 
 |-Network------>|                 |                 |                 | 
 | Intent Request|                 |                 |                 | 
 |               |                 |                 |                 | 
 |          Translation:           |                 |                 | 
 |        Data Extraction &        |                 |                 |
 |        Data Conversion          |                 |                 | 
 |               |                 |                 |                 | 
 |*** Case 1: NFs available: Go to Policy Generation ***               | 
 |               |                 |                 |                 | 
 |*** Case 2: NFs unavailable (START) ***            |                 | 
 |               |                 |                 |                 | 
 |               |-NF Query------->|                 |                 | 
 |               | Request         |-NF Initiation-->|                 |
 |               |                 | Request         |                 |
 |               |                 |                 |-NF Initiation-->|
 |               |                 |                 | Request         |
 |               |                 |                 |                 | 
 |               |                 |                 |                 NF 
 |               |                 |                 |         Initialization
 |               |                 |                 |                 | 
 |               |                 |                 |<-NF Initiation--|
 |               |                 |<-NF Initiation--|  Response       |
 |               |<-NF Query-------|  Response       |                 | 
 |               |  Response       |                 |                 |
 |               |                 |                 |                 | 
 |*** Case 2: NFs unavailable (END) ***              |                 | 
 |               |                 |                 |                 | 
 |          Translation:           |                 |                 | 
 |       Policy Generation         |                 |                 | 
 |               |                 |                 |                 | 
 |               |--Network Policy Request---------------------------->|
 |               |                 |                 |                 | 
 |               |                 |                 |                 NF
 |               |                 |                 |          Configuration
 |               |                 |                 |                 | 
 |               |<-Network Policy Response----------------------------| 
 |               |                 |                 |                 | 
            ]]></artwork>
    </figure>

      <t>
      <xref target="figure:Procedure-of-IoT-Device-Data-Aggregation-Reporting"/> 
      shows the procedure of the reporting for IoT device data aggregation in
      the IBN Framework as follows:
      </t>

      <list style="numbers">
        <t>
        NF1 (as an IoT Device) sends its Sensing Data to IBN Analyzer
        (as an NWDAF).
        </t>

        <t>
        NF2 (as an IoT Device) sends its Sensing Data to IBN Analyzer
        (as an NWDAF).
        </t>

        <t>
        IBN Analyzer performs Sensing Data Aggregation and analyzes the
        aggregated sensing data through Machine Learning (ML) techniques.
        It then generates a Sensing Report for IBN Controller.
        </t>

        <t>
        IBN Analyzer sends a Sensing Report to IBN Controller.
        </t>

        <t>
        IBN Controller analyzes the Sensing Report for a further action.
        If a further action is needed, it updates the existing network policy
        or generates a new network policy.
        </t>

        <t>
        IBN Controller sends the report for the further action to IBN User
        optionally if the reporting is needed.
        </t>

        <t>
        For the further action, IBN Controller sends an Updated NF Policy
        Request or a New NF Policy Request to the appropriate NF(s).
        </t>

        <t>
        The appropriate NF(s) reconfigures the Updated NF Policy or
        configures the new NF Policy in its own system.
        </t>

        <t>
        The appropriate NF(s) sends an Updated NF Policy Response
        or a New NF Policy Response to IBN Controller.
        </t>
      </list>

       <figure anchor="figure:Procedure-of-IoT-Device-Data-Aggregation-Reporting"
        title="Procedure of IoT Device Data Aggregation Reporting in the IBN Framework">
            <artwork><![CDATA[
IBN             IBN               IBN                NF1               NF2
User         Controller         Analyzer       (IoT Device)      (IoT Device)
 |               |                 |                 |                 | 
 |               |                 |<----Sensing-----|                 | 
 |               |                 |     Data        |                 | 
 |               |                 |                 |                 | 
 |               |                 |<----Sending-----------------------| 
 |               |                 |     Data        |                 | 
 |               |                 |                 |                 | 
 |               |              Sensing              |                 | 
 |               |               Data                |                 |
 |               |            Aggregation            |                 |
 |               |                 |                 |                 | 
 |               |<---Sensing------|                 |                 | 
 |               |    Report       |                 |                 |
 |               |                 |                 |                 | 
 |             Policy              |                 |                 |
 |             Update              |                 |                 |
 |        (or Generation)          |                 |                 |
 |               |                 |                 |                 | 
 |<---Report-----|                 |                 |                 |
 |               |--Updated(New) Network Policy Request--------------->|
 |               |                 |                 |                 |
 |               |                 |                 |                 NF
 |               |                 |                 |      (Re)Configuration
 |               |                 |                 |                 |
 |               |<-Updated(New) Network Policy Response---------------| 
 |               |                 |                 |                 |
            ]]></artwork>
    </figure>

</section>

<section anchor="section:IANA-Considerations" title="IANA Considerations">
  <t>
    This document does not require any IANA actions.
  </t>
</section>

<section anchor="section:Security-Considerations" title="Security Considerations">
  <t>
    The same security considerations for the IBN framework
    <xref target="RFC8329" /> are applicable to this document.
  </t>
  <t>
    The development and introduction of IBN Analyzer and Network Audit
    System in the IBN Framework may create new security concerns that
    have to be anticipated at the design and specification time.  The usage
    of machine learning to analyze monitoring data of malicious NFs may add a
    risk to its model to be attacked (e.g., adversarial attack) and can result
    in a bad security policy that is deployed into the IBN system.
  </t>
</section>

</middle>

<back>

<!-- START: Normative References -->
<references title="Normative References">

    <?rfc include="reference.RFC.6020"?>
    <?rfc include="reference.RFC.6241"?>
    <?rfc include="reference.RFC.8040"?>    
    <?rfc include="reference.RFC.8329"?>
    <?rfc include="reference.RFC.9315"?>
    
</references>
<!-- END: Normative References -->

<!-- START: Informative References -->
<references title="Informative References">

    <?rfc include='reference.I-D.ietf-i2nsf-consumer-facing-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-nsf-facing-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-registration-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-nsf-monitoring-data-model'?>
    <?rfc include='reference.I-D.lingga-i2nsf-analytics-interface-dm'?>    
    <?rfc include='reference.I-D.ietf-i2nsf-applicability'?>
    <?rfc include='reference.I-D.jeong-i2nsf-security-management-automation'?>
    <?rfc include='reference.I-D.yang-i2nsf-security-policy-translation'?>
    <?rfc include='reference.I-D.ietf-rats-architecture'?>
    <?rfc include='reference.I-D.yang-i2nsf-remote-attestation-interface-dm'?>

    <reference anchor="YAML">
        <front>
            <title>Yet Another Markup Language (YAML) 1.0</title>
            <author initials="B." surname="Ingerson" />
            <author initials="C." surname="Evans" />
            <author initials="O." surname="Ben-Kiki" />
            <date month="October" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://yaml.org/spec/history/2001-05-26.html" />
    </reference>

    <reference anchor="TS-23.501">
        <front>
            <title>System Architecture for the 5G System (5GS)</title>
            <author surname="3GPP TS 23.501 V18.3.0" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144" />
    </reference>

    <reference anchor="TS-28.312">
        <front>
            <title>Intent Driven Management Services for Mobile Networks</title>
            <author surname="3GPP TS 28.312 V18.1.1" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3554" />
    </reference>

    <reference anchor="TR-28.812">
        <front>
            <title>Study on Scenarios for Intent Driven Management Services for Mobile Networks</title>
            <author surname="3GPP TR 28.812 V17.1.0" />
            <date month="December" year="2020" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3553" />
    </reference>

    <reference anchor="TS-23.288">
        <front>
            <title>Architecture Enhancements for 5G System (5GS) to Support Network Data Analytics Services</title>
            <author surname="3GPP TS 23.288 V18.3.0" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3579" />
    </reference>

    <reference anchor="TS-29.520">
        <front>
            <title>Network Data Analytics Services</title>
            <author surname="3GPP TS 29.520 V18.3.0" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3355" />
    </reference>

    <reference anchor="RFC7149">
        <front>
            <title>Software-Defined Networking: A Perspective from within a Service Provider Environment</title>
            <author initials="M." surname="Boucadair" />
            <author initials="C." surname="Jacquenet" />
            <date month="March" year="2014" />
        </front>
        <seriesInfo name="RFC" value="7149" />
    </reference>

    <reference anchor="ETSI-NFV">
        <front>
            <title>Network Functions Virtualisation (NFV); Architectural Framework</title>
            <author surname="ETSI GS NFV 002 V1.2.1" />
            <date month="December" year="2014" />
        </front>
        <seriesInfo name="Available:" value="https://www.etsi.org/deliver/etsi_gs/nfv/001_099/002/01.02.01_60/gs_nfv002v010201p.pdf" />
    </reference>

    <reference anchor="ETSI-NFV-Release-2">
        <front>
            <title>Network Functions Virtualisation (NFV) Release 2; 
            Management and Orchestration; Architectural Framework Specification</title>
            <author surname="ETSI GS NFV 006 V2.1.1" />
            <date month="January" year="2021" />
        </front>
        <seriesInfo name="Available:" value="https://www.etsi.org/deliver/etsi_gs/nfv/001_099/006/02.01.01_60/gs_nfv006v020101p.pdf" />
    </reference>

    <reference anchor="Bitcoin">
        <front>
            <title>Bitcoin: A Peer-to-Peer Electronic Cash System</title>
            <author initials="S." surname="Nakamoto" />
            <date month="May" year="2009" />
        </front>
        <seriesInfo name="Available:" value="https://bitcoin.org/bitcoin.pdf" />
    </reference>

   <reference anchor="USENIX-ATC-Lumi">
        <front>
            <title>Hey, Lumi! Using Natural Language for Intent-Based Network Management</title>
            <author initials="A." surname="Jacobs" />
            <author initials="R." surname="Pfitscher" />
            <author initials="R." surname="Ribeiro" />
            <author initials="R." surname="Ferreira" />
            <author initials="L." surname="Granville" />
            <author initials="W." surname="Willinger" />
            <author initials="S." surname="Rao" />
            <date month="July" year="2021" />
        </front>
        <seriesInfo name="USENIX" value="Annual Technical Conference" />
    <seriesInfo name="Available:" value="https://www.usenix.org/conference/atc21/presentation/jacobs" />
    </reference>

   <reference anchor="REST">
        <front>
            <title>Principled Design of the Modern Web Architecture</title>
            <author initials="R." surname="Fielding" />
            <author initials="R." surname="Taylor" />
            <date month="May" year="2002" />
        </front>
        <seriesInfo name="ACM" value="Transactions on Internet Technology, Vol. 2, Issue 2," />
    <seriesInfo name="Available:" value="https://dl.acm.org/doi/10.1145/514183.514185" />
    </reference>

    <reference anchor="Deep-Learning">
        <front>
            <title>Deep Learning</title>
            <author initials="I." surname="Goodfellow" />
            <author initials="Y." surname="Bengio" />
            <author initials="A." surname="Courville" />
            <date month="November" year="2016" />
        </front>
        <seriesInfo name="Publisher:" value="The MIT Press" />
    <seriesInfo name="URL:" value="https://www.deeplearningbook.org/" />
    </reference>

</references>
<!-- END: Informative References -->

<section title="Acknowledgments">
    <t indent="0" pn="section-appendix.a-1">
    This work was supported by Institute of Information &amp; Communications
    Technology Planning &amp; Evaluation (IITP) grant funded by the Korea
    Ministry of Science and ICT (MSIT) (No. RS-2024-00398199 and RS-2022-II221015).
    </t>
</section>

<section anchor="section:Contributors" title="Contributors">
    <t indent="0" pn="section-appendix.b-1">
    This document is made by the group effort of NMRG, greatly benefiting 
    from inputs and texts by <contact fullname="Linda Dunbar"/> (Futurewei)
    and <contact fullname="Susan Hares"/> (Huawei).
    The authors sincerely appreciate their contributions.
    </t>

    <t indent="0" pn="section-appendix.b-2">  
    The following are coauthors of this document:
    </t>   

      <contact fullname="Jiwon Suh">
        <organization showOnFrontPage="true">Department of Computer Science &amp; Engineering</organization>
        <address>
          <postal>
            <extaddr>Sungkyunkwan University</extaddr>
            <street>2066 Seobu-Ro, Jangan-Gu</street>
            <city>Suwon</city>
            <region>Gyeonggi-Do</region>
            <code>16419</code>
            <country>Republic of Korea</country>
          </postal>
          <phone>+82 31 299 4106</phone>
          <email>sjw6136@skku.edu</email>
          <uri>http://iotlab.skku.edu/people-Ji-Won-Suh.php</uri>
        </address>
      </contact>      
      <contact fullname="Yiwen Shen">
        <organization showOnFrontPage="true">Department of Computer Science &amp; Engineering</organization>
        <address>
          <postal>
            <extaddr>Sungkyunkwan University</extaddr>
            <street>2066 Seobu-Ro, Jangan-Gu</street>
            <city>Suwon</city>
            <region>Gyeonggi-Do</region>
            <code>16419</code>
            <country>Republic of Korea</country>
          </postal>
          <phone>+82 31 299 4106</phone>
          <email>chrisshen@skku.edu</email>
          <uri>https://chrisshen.github.io/</uri>
        </address>
      </contact>
      <contact fullname="Patrick Lingga">
        <organization showOnFrontPage="true">Department of Electrical &amp; Computer Engineering</organization>
        <address>
          <postal>
            <extaddr>Sungkyunkwan University</extaddr>
            <street>2066 Seobu-Ro, Jangan-Gu</street>
            <city>Suwon</city>
            <region>Gyeonggi-Do</region>
            <code>16419</code>
            <country>Republic of Korea</country>
          </postal>
          <phone>+82 31 299 4106</phone>
          <email>patricklink@skku.edu</email>
          <uri>http://iotlab.skku.edu/people-Patrick-Lingga.php</uri>
        </address>
      </contact>
      <contact fullname="Yunchul Choi">
        <organization showOnFrontPage="true">Standards &amp; Open Source Research Division</organization>
        <address>
          <postal>
            <extaddr>Electronics and Telecommunications Research Institute</extaddr>
            <street>218 Gajeong-Ro, Yuseong-Gu</street>
            <city>Daejeon</city>            
            <code>34129</code>
            <country>Republic of Korea</country>
          </postal>
          <phone>+82 42 860 5978</phone>
          <email>cyc79@etri.re.kr</email>
        </address>
      </contact>
</section>

<section title="Changes from draft-jeong-nmrg-ibn-network-management-automation-05">
    <t>
    The following changes are made from draft-jeong-nmrg-ibn-network-management-automation-05:
    <list style="symbols">
      <t>
      This version is submitted for the maintanance of draft-jeong-nmrg-ibn-network-management-automation.
      </t>
    </list>
    </t>
</section>

</back>

<!-- <vspace blankLines="100"/> -->
<!-- page break to put addresses onto one page-->

</rfc>
