<?xml version="1.0" encoding="US-ASCII"?>
<!-- <?xml version="1.0" encoding="UTF-8"?> -->
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private)
-->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">


<?rfc toc="yes"?>
<?rfc rfcedstyle="yes"?>
<?rfc subcompact="no"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" category="info" docName="draft-jeong-opsawg-i2inf-problem-statement-00">

<front>
    <title abbrev="I2INF Problem Statement">
    Interface to In-Network Functions (I2INF): Problem Statement
    </title>

    <author role="editor" initials="J." surname="Jeong" fullname="Jaehoon Paul Jeong">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science and Engineering
        </organization>

        <address>
            <postal>
                <street>Sungkyunkwan University</street>
                <street>2066 Seobu-Ro, Jangan-Gu</street>
                <city>Suwon</city> <region>Gyeonggi-Do</region>
                <code>16419</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 31 299 4957</phone>
            <facsimile>+82 31 290 7996</facsimile>
            <email>pauljeong@skku.edu</email>
            <uri>http://iotlab.skku.edu/people-jaehoon-jeong.php
         </uri>
        </address>
    </author>

    <author initials="Y." surname="Shen" fullname="Yiwen Shen">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science and Engineering
        </organization>	
		    <address>
			    <postal>
			        <extaddr>Sungkyunkwan University</extaddr>
  			        <street>2066 Seobu-Ro, Jangan-Gu</street>
				    <city>Suwon</city>
				    <region>Gyeonggi-Do</region>
				    <code>16419</code>
				    <country>Republic of Korea</country>
			    </postal>
			    <phone>+82 31 299 4106</phone>
			    <email>chrisshen@skku.edu</email>
			    <uri>https://chrisshen.github.io</uri>
		    </address>
    </author>

    <author initials="Y." surname="Ahn" fullname="Yoseop Ahn">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science and Engineering
        </organization>	
		    <address>
			    <postal>
			        <extaddr>Sungkyunkwan University</extaddr>
  			        <street>2066 Seobu-Ro, Jangan-Gu</street>
				    <city>Suwon</city>
				    <region>Gyeonggi-Do</region>
				    <code>16419</code>
				    <country>Republic of Korea</country>
			    </postal>
			    <phone>+82 31 299 4106</phone>
			    <email>ahnjs124@skku.edu</email>
			    <uri>http://iotlab.skku.edu/people-Ahn-Yoseop.php</uri>
		    </address>
    </author>

    <author initials="Y." surname="Kim" fullname="Younghan Kim">
        <organization abbrev="Soongsil University">
        School of Electronic Engineering
        </organization>
		    <address>
                <postal>
                    <extaddr>Soongsil University</extaddr>
                    <street>369, Sangdo-ro, Dongjak-gu</street>
                    <city>Seoul</city>
                    <code>06978</code>
                    <country>Republic of Korea</country>
                </postal>
                <phone></phone>
                <email>younghak@ssu.ac.kr</email>
		    </address>
    </author>

    <author initials="E." surname="Duarte Jr." fullname="Elias P. Duarte Jr.">
        <organization abbrev="Federal University of Parana">
        Department of Computer Science and Engineering
        </organization>	

		    <address>
                <postal>
                    <street>Federal University of Parana</street>
                    <street></street>
                    <city></city> <region></region>
                    <code></code>
                    <country>Brazil</country>
                </postal>
                <phone></phone>
                <email>elias@inf.ufpr.br</email>
            </address>
    </author>

    <date month="July" day="22" year="2024" />

    <area>Operations and Management Area</area>
    
    <workgroup>Operations and Management Area Working Group</workgroup>

<!-- [rfced] Please insert any keywords (beyond those that appear in
the title) for use on http://www.rfc-editor.org/rfcsearch.html. -->

<keyword>Internet-Draft</keyword>

    <abstract>
        <t>
        This document specifies the problem statement for Interface to
        In-Network Functions (I2INF) for a user's services involved in 
        both networks and applications. In-Network Functions (INF) 
        include In-Network Computing Functions (INCF) in Network Functions
        Virtualization (NFV) and Software-Defined Networking (SDN). 
        They also include In-Network Application Functions (INAF) in
        Internet-of-Things (IoT) Devices, Software-Defined Vehicles
        (SDV), and Unmanned Aerial Vehicles (UAV). Intent-Based Networking
        (IBN) can be used to realize the user's services consisting of a
        combination of INFs in a target network. This document analyzes
        the gap for an IBN-based system to perform the user's service and 
        specifies the requirements for the I2INF for intelligent service
        provisioning.
        </t>
    </abstract>
</front>

<middle>

<section anchor="section:Introduction" title="Introduction">
    <t>
    Network softwarization is widely used for network services
    in network infrastructure (e.g., 5G mobile networks <xref target="TS-23.501" />),
    clouding computing, and edge computing.
    This network softwarization is enabled by the technologies of Network
    Functions Virtualization (NFV) <xref target="ETSI-NFV" /><xref target="ETSI-NFV-Release-2" />
    and Software-Defined Networking (SDN) <xref target="RFC7149" />.
    In addition, Intent-Based Networking (IBN) <xref target="RFC9315" /><xref target="Survey-IBN-CST-2023" />
    has been intensively 
    researched and realized for the last five yearly.
    Many end-user devices such as smartphones and smart watches are 
    connected to various Internet-of-Things (IoT) devices for 
    customer-tailored services. 
    Recently Software-Defined Vehicles (SDVs)
    <xref target="AUTOSAR-SDV" /><xref target="Eclipse-SDV" /><xref target="COVESA" />
    have been spotlighted as 
    the next-generation user devices after the smartphones.
    SDVs are intended to use the network softwarization technologies such
    as NFV and SDN. System components and applications in the SDVs are
    working in the form of containers in a cloud native environment (e.g.,
    Kubernetes <xref target="Kubernetes" />).
    </t>

    <t>
    In this trend, the network automation and management has become
    more important to realize intelligent services for both end users
    and network operators <xref target="I-D.jeong-nmrg-ibn-network-management-automation" />. 
    For this network automation and management, an intent of a user 
    (e.g., end user and network operator) in the form of either text or
    voice needs to be understood and processed by the service systems.
    Note that an intent is a declarative request for a specific goal
    rather than an imperative request having a series of configuration
    or commands for specific operations. This intent needs to be
    translated into a network policy and an application policy for the
    satisfaction of the user's service request.
    First, the network policy contains rules to execute the service's 
    network demands in terms of Quality of Service (QoS) such as 
    throughput and delay. 
    Second, the application policy contains rules to execute the service's 
    application demands in terms of functionality and timing.
    These translated network and application polices need to be delivered 
    to appropriate Network Functions (NF) in network infrastructure,
    edge computing, and cloud computing.  
    Thus, an intent of a user's service needs to be translated into 
    both a network policy for a network infrastructure for a network service
    and an application policy for a client and a server for an application
    service.
    </t>

    <t>
    For example, services for user applications (e.g., video
    conference) need to be accurately configured to and efficiently processed
    by not only Application Functions (AF) like a client (e.g., a video
    conference client) and a server (e.g., a video conference server), 
    but also Network Functions (NF) (e.g., video broadcast coordinator) in
    Computing in the Network (COIN)
    <xref target="I-D.irtf-coinrg-use-cases" /><xref target="NFV-COIN" />.
    </t>

    <t>
    As per definitions of Computing in the Network (COIN), a Programmable
    Network Device (PND) in an In-Network Computing (INC) environment can have
    multiple kinds of capabilities (i.e., features) 
    <xref target="I-D.irtf-coinrg-coin-terminology" /> to work with other PNDs.
    PNDs from different product lines or vendors can have different capabilities
    for INC functions. When working togther for a COIN system, the PDNs may be
    unaware of capabilities of others. Therefore, it is necessary to define a
    standard interface for PNDs to exchange their capabilities.
    </t>

    <t>
    For the configuration and monitoring of Application Functions (AFs)
    for applications and Network Functions (NFs) for network services
    for a given user's service, a standard framework with interfaces is
    required. 
    There is no standard data model to describe the capabilities of AFs and 
    NFs for a user-demanded service. Also, there is no standard 
    data model for a registration interface that is used to register 
    the capabilities of those AFs and NFs with a controller for the requested
    service. In addition, there are no standard interfaces to configure
    and monitor those AFs and NFs according to a user's intent.   
    In the past, Interface to Network Security Functions (I2NSF) was
    standardized for the control and management of Network Security Services
    with Network Security Functions (NSFs) <xref target="RFC8329" />
    <xref target="I-D.ietf-i2nsf-applicability" />.
    This document takes advantage of the work of I2NSF for 
    a more general control and management framework for intelligent 
    services consisting of AFs and NFs. 
    </t>

    <t>
    This document specifies the problem statement and use cases 
    for Interface to In-Network Functions (I2INF) for In-Network
    Functions (INFs) having different capabilities. The INFs consist of
    Network Functions (NFs) including PNDs and Application Functions (AFs)
    in order to compose a user's services.
    First of all, INFs include In-Network Computing Functions (INCF)
    as NFs within NFV and SDN <xref target="I-D.irtf-coinrg-use-cases" />. 
    Secondly, they also include In-Network Application Functions
    (INAF) as AFs within Internet-of-Things (IoT) Devices, 
    Software-Defined Vehicles (SDV), and Unmanned Aerial Vehicles
    (UAV). Finally, Intent-Based Networking (IBN) can be realized
    with the network services consisting of a combination of INFs in
    a target network.
    </t>
</section>

<section anchor="section:Terminology" title="Terminology">
    <t>
      This document uses the terminology described in <xref target="RFC9315" />,
      <xref target="RFC8329" />,
      <xref target="I-D.irtf-coinrg-coin-terminology" />,
      <xref target="I-D.irtf-coinrg-use-cases" />,
      <xref target="I-D.jeong-i2nsf-security-management-automation"/>, <xref
      target="I-D.jeong-nmrg-ibn-network-management-automation"/>, and <xref
      target="I-D.yang-i2nsf-security-policy-translation"/>. In addition, the
      following terms are defined below:
    </t>

    <t>
    <list style="symbols">
      <t>
        Intent: A set of operational goals (that a network should meet) and
        outcomes (that a network is supposed to deliver) defined in a
        declarative manner without specifying how to achieve or implement
        them <xref target="RFC9315" />.
      </t>

      <t>
        Intent-Based System (IBS): A system that enforces an intent
        from a user (or administrator) into a target system (e.g., SDV). An
        intent can be expressed as a Natural Language (e.g., English) and can
        be translated into a policy (i.e., network policy and application
        policy) by a Natural Language Processing (NLP) 
        <xref target="USENIX-ATC-Lumi" /><xref target="BERT" />
        <xref target="Deep-Learning" />. In this document, the intent can be
        translated into the corresponding high policy by an intent translator <xref
        target="I-D.jeong-i2nsf-security-management-automation"/>. 
        The high-level policy can also be translated into the corresponding
        low-level policy by a policy translator 
        <xref target="I-D.yang-i2nsf-security-policy-translation"/>. The low-level
        policy is dispatched to appropriate Service Functions (SFs). Through the
        monitoring of the SFs, the activity and performance of the SFs is
        monitored and analyzed. If needed, the rules of the high-level or
        low-level network policy are augmented or new rules are generated and
        configured to appropriate SFs.
      </t>

      <t>
        Mobile Object (MO): An object that is capable of moving by its power
        source with wireless communication capability such as 5G 
        Vehicle-to-Everything (e.g., 5G V2X).
        It can be an Internet-of-Things (IoT) device, Software-Defined Vehicle
        (SDV) <xref target="AUTOSAR-SDV" /><xref target="Eclipse-SDV" /><xref target="COVESA" />,
        and Unmanned Aerial Vehicle (UAV).
        An MO is a Programmable Network Device (PND) <xref target="I-D.irtf-coinrg-coin-terminology" />
        that can be reconfigured for different network requirements inside the MO.        
      </t>

      <t>
        In-Network Computing Functions (INCF): The service functions that work
        for computing in the network infrastructure.
        They are a group of COIN programs <xref target="I-D.irtf-coinrg-coin-terminology" />
        to provide required computing tasks and functions.
      </t>

      <t>
        In-Network Application Functions (INAF): The service functions that 
        work for applications in Mobile Objects.
        They are a group of COIN programs <xref target="I-D.irtf-coinrg-coin-terminology" />
        to provide required application tasks and functions.              
      </t>

      <t>
        Interface to In-Network Functions (I2INF): Interfaces that are used
        between a pair of INFs for the interaction for configuration and
        monitoring. 
      </t>

      <t>
        A Framework for Interface to In-Network Functions (I2INF): a framework
        that consists of components and interfaces to configure and monitor
        INFs for various services in the network infrastructure and MOs. 
      </t>      

    </list>
    </t>

</section>

<section anchor="section:Problem-Statement-for-I2INF"
title="Problem Statement for Interface to In-Network Functions">
    <t>
    This section specifies the Gap Analysis, Intent-Based Networking (IBN),
    and Problem Statement for Interface to In-Network Functions (I2INF).
    First, <xref target="figure:Wireless-and-Wired-Networks-for-I2INF" /> shows 
    Wireless and Wired Networks in a Central Cloud for the I2INF framework
    having network entities and Mobile Objects (MO) to run network
    functions and application functions for a user's service, respectively.
    Second, <xref target="figure:VNF-Consensus-Architecture-for-I2INF" />
    shows a VNF-Consensus Architecture in an Edge Cloud in the I2INF
    framework to synchonize the SDN Controllers for flow table information
    in the same Edge Cloud <xref target="NFV-COIN" />.
    These networks are assumed for the problem space for the I2INF.
    </t>
    
      <figure anchor="figure:Wireless-and-Wired-Networks-for-I2INF" align="center"
          title="Wireless and Wired Networks in Central Cloud for I2INF Framework">
          <artwork align="left"><![CDATA[
                                  Central Cloud
                   *******************************************
                 *                                             *
                *              +------------------+             *
               *               | Cloud Controller |              *
               *               +------------------+              *
               *                         ^                       *
                *                        |                      *
                 *                       v                     *
                   *******************************************
                    ^                   ^                    ^
                    |                   |                    |
                    V                   V                    V
              +-----------+       +-----------+        +-----------+
              |Edge-Cloud1|       |Edge-Cloud2|        |Edge-Cloud3|
              +-----------+       +-----------+        +-----------+
                    ^                   ^                    ^
                    |                   |                    |
                    V                   V                    V
               +---------+         +---------+         +---------+
               | IP-RSU1 |<------->| IP-RSU2 |<------->| IP-RSU3 |
               +---------+         +---------+         +---------+
                    ^                   ^                    ^
                    :                   :                    :
           +-----------------+ +-----------------+   +-----------------+
           |        : V2I    | |        : V2I    |   |       : V2I     |
           |        v        | |        v        |   |       v         |
+--------+ |   +--------+    | |   +--------+    |   |   +--------+    |
|   MO1  |===> |   MO2  |===>| |   |   MO3  |===>|   |   |   MO4  |===>|
+--------+<...>+--------+<........>+--------+    |   |   +--------+    |
           V2V     ^         V2V        ^        |   |        ^        |
           |       : V2V     | |        : V2V    |   |        : V2V    |
           |       v         | |        v        |   |        v        |
           |  +--------+     | |   +--------+    |   |    +--------+   |
           |  |   MO5  |===> | |   |   MO6  |===>|   |    |   MO7  |==>|
           |  +--------+     | |   +--------+    |   |    +--------+   |
           +-----------------+ +-----------------+   +-----------------+
                 Subnet1              Subnet2              Subnet3
                (Prefix1)            (Prefix2)            (Prefix3)

        <----> Wired Link   <....> Wireless Link   ===> Moving Direction
]]></artwork>
      </figure>

      <figure anchor="figure:VNF-Consensus-Architecture-for-I2INF" align="center"
          title="VNF-Consensus Architecture in Edge Cloud for I2INF Framework">
          <artwork align="left"><![CDATA[
                        Edge Cloud                      Central Cloud
        ******************************************        **********
       *                                          *     *            *
      *                                            *   * +----------+ *
      *  +---------------+   +-----------------+   *   * |  Cloud   | *
      *  | VNF-Consensus |<->| Edge Controller |<->*<->* |Controller| *
      *  +-------^-------+   +--------^--------+   *   * +----------+ *
      *          |                    |            *   *              *
       *         v                    V           *     *            *
        ******************************************        **********
        ^                    ^                    ^
        |                    |                    |
        V                    V                    V
+---------------+    +---------------+    +---------------+
|SDN-Controller1|    |SDN-Controller2|    |SDN-Controller3|
+---------------+    +---------------+    +---------------+
        ^                    ^                    ^
        |                    |                    |
        V                    V                    V
+---------------+    +---------------+    +---------------+
|   +-----+     |    |   +-----+     |    |   +-----+     |
|   | SW1 |     |    |   | SW3 |     |    |   | SW5 |     |
|   +---^-+     |    |   +---^-+     |    |   +---^-+     | 
|       |       |    |       |       |    |       |       |
|     +-V---+   |    |     +-V---+   |    |     +-V---+   |
|     | SW2 |   |    |     | SW4 |   |    |     | SW6 |   |
|     +-----+   |    |     +-----+   |    |     +-----+   |
+---------------+    +---------------+    +---------------+     
   SDN-Network1         SDN-Network2         SDN-Network3
     (Subnet1)            (Prefix2)            (Prefix3)

<----> Wired Link
]]></artwork>
      </figure>

    <section anchor="section:Gap-Analysis" title="Gap Analysis">
        <t>
        In-Network Computing Functions (INCF) are proposed for various
        computing services in the area of COIN on top of network
        softwarization environments of NFV and SDN 
        <xref target="I-D.irtf-coinrg-use-cases" /><xref target="NFV-COIN" />.
        </t>

        <t>
        The COIN Use Cases Document in <xref target="I-D.irtf-coinrg-use-cases" />
        proposes four kinds of use cases for In-Network Computing. Its use
        cases are (i) Providing New COIN Experiences, (ii) Supporting New
        COIN Systems, (iii) Improving Existing COIN Capabilities, and (iv)
        Enabling New COIN Capabilities.
            <list style="numbers">
            <t>
            For Providing New COIN Experiences, the document describes mobile
            application offloading and Extended Reality (XR) and immersive media.
            </t> 

            <t>
            For Supporting New COIN Systems, the document describes
            In-Network Control, Time-Sensitive Application, Large Volume
            Applications, and Industrial Safety.
            </t>

            <t>
            For Improving Existing COIN Capabilities, the document 
            describes Content Delivery Networks (CDN), 
            Compute-Fabric-as-a-Service (CFaaS), and Virtual Networks Programming 
            (e.g., P4 programs and OpenFlow rules).
            </t>

            <t>
            For Enabling New COIN Capabilities, the document describes
            Distributed AI Training among distributed endpoints for large-scale
            problems.
            </t>
            </list>
        </t>

        <t>
        The NFV-COIN Paper in <xref target="NFV-COIN" /> proposes three kinds
        of use cases for In-Network Computing. Its use cases are (i) NFV
        Failure Detection, (ii) Virtual Network Function (VNF) Consensus, and
        (iii) NFV Reliable Broadcast.
            <list style="numbers">
            <t>
            NFV Failure Detection is that an NFV-based failure detector 
            gets monitoring data from SDN Switches via SDN Controller and
            detects the failure of communication links. This failure
            detector can work within the SDN Controller by sacrificing 
            the performance (e.g., CPU usage) of the SDN Controller. 
            </t>

            <t>
            VNF Consensus is that a VNF-Consensus service performs 
            the sychronization of the control planes of multiple 
            SDN Controllers. This consensus service does not require
            any modification of both the data plane at SDN switches and
            SDN control plane (e.g., OpenFlow). Through the consensus 
            service, if a new rule is configured by an SDN Controller,
            this rule is distributed to all the other SDN Controllers
            through the VNF-Consensus.
            </t>

            <t>
            NFV Reliable Broadcast is that an NFV-based broadcast (NFV-RBCast)
            performs reliable and in-order delivery of broadcasted data packets.
            This reliable and in-order broadcast for applications is
            provisioned by NFV-RBCast using a VNF-Sequencer. A flow using the 
            NFV-RBCast service lets a forwarding rule be installed at 
            SDN Switches through an SDN Controller. All the packets of the
            flow are forwarded to the VNF-Sequencer via the SDN Controller.
            The VNF-Sequencer inserts a sequence number into each of those 
            forwarded packets, and sends them to the destination hosts running
            an RBCast application.  
            </t>                        
            </list>
        </t>

        <t>
        Functionalities of each service needs to be decomposed into AFs and NFs 
        in edge computing. The generation and configuration of those AFs and NFs
        are needed by a service coordinator for COIN-based network services.
        However, a framework and interfaces are missing and not standardized
        for the life cycle management for the COIN-based network services. 
        </t>
    </section>

    <section anchor="section:Intent-Based-Networking" title="Intent-Based Networking">
    <t>
    According to the life cycle design of IBN <xref target = "RFC9315" />, 
    <xref target = "figure:Life-Cycle-of-IBS-for-Intent-Management" /> shows
    the life cycle of an Intent-Based System (IBS) for the intent management for 
    network entities and MOs.
    It divides the life cycle into three spaces, namely MO User Space, 
    Translation &amp; IBS Space, and Network Operations (Ops) &amp; Application (App) Space. 
    Each space is further divided into two sections, fulfillment and assurance. 
    The fulfillment section pipelines the steps (i.e., intent input, translation/refinement,
    learning/planning/rendering, and configuration/provisioning) toward the final SFs such as
    Network Functions (NFs) and Application Functions (AFs) in MOs. 
    The assurance section monitors final results of the intent fulfillment to validate and
    analyze the resulted NFs and applications for MOs. 
    </t>

    <figure anchor="figure:Life-Cycle-of-IBS-for-Intent-Management" align="center"
        title="The Life Cycle of IBS for Intent Management">
        <artwork align="left"><![CDATA[
        IBS User     :            Translation/          : Network Ops/
          Space      :             IBS Space            :  App Space
Fulfill              :                                  :
       +----------+  :  +------------+   +------------+ : +-----------+
       |Recognize/|---->| Translate/ |-->|   Learn/   |-->| Configure/|
       | Generate |  :  |   Refine   |   |   Plan/    | : | Provision |
       | Intent   |<----|            |   |   Render   | : |           |
       +----------+  :  +------------+   +------------+ : +-----------+
            ^        :                         ^        :       |
............|..................................|................|.....
            |        :                    +----------+  :       v
            |        :                    | Validate |  :  +----------+
            |        :                    +----^-----+<----| Monitor/ |
Assure      |        :                         |        :  | Observe  |
        +--------+   :  +----------+      +----------+<----|          |
        | Report |<-----| Abstract |<-----| Analyze/ |  :  +----------+
        +--------+   :  +----------+      | Aggregate|  :
                     :                    +----------+  :
]]>
    </artwork>
    </figure>

        <t>
        The life cycle in <xref target = "figure:Life-Cycle-of-IBS-for-Intent-Management" />
        is so conceptual for the implementation of an IBS. It needs to be
        concretized in the form of a framework with interfaces among components
        in the framework. The data models of an intent, a network policy, and
        an application policy should be specified by either YANG
        <xref target="RFC6020" /><xref target="RFC7950" /> 
        or YAML <xref target="YAML" /> to make messages that will be delivered
        to target components via a message delivery protocol, such as NETCONF
        <xref target="RFC6241" />, RESTCONF <xref target="RFC8040" />, and 
        REST API <xref target="REST" />.
        </t>
    </section>

    <section anchor="section:Problem-Statement" title="Problem Statemet">
        <t>
        The goal of an Intent-Based System (IBS) is to enforce the service
        corresponding to a user's intent with an appropriate application in
        a target network in terms of functionality and quality
        <xref target = "RFC9315" /><xref target="RFC8329" />
        <xref target="I-D.jeong-i2nsf-security-management-automation" />
        <xref target="I-D.jeong-nmrg-ibn-network-management-automation" />.
        To achieve this goal, first of all, an intent needs to be translated
        into both a network policy and an application policy by an intent 
        translator <xref target="I-D.jeong-nmrg-ibn-network-management-automation" />
        <xref target="I-D.yang-i2nsf-security-policy-translation" />. Then these
        network policy and application policy needs to delivered to a network
        controller and an application controller, respectively.
        The network controller further translates the network policy into
        the network rules to be sent to the network entities (i.e., NFs).
        In the same way, the application controller further translates the
        application policy into the application rules to be sent to the 
        application entities (i.e., AFs).
        </t>

        <t>
        For the translation of either an intent or a policy, the capabilities 
        of NFs and AFs should be registered with databases (e.g., NF database
        and AF database). Thus, a capability data model for such NFs and AFs
        should be specified in advance <xref target="I-D.ietf-i2nsf-capability-data-model" />. 
        Also, a registration interface is required for a vendor for either
        an NF or an AF to register its NF or AF with the corresponding
        database such as the NF database and the AF database, respectively
        <xref target="I-D.ietf-i2nsf-registration-interface-dm" />. 
        Therefore, a data model for this registration interface should be
        specified to make a registration message for the Vendor's Management
        System (VMS) <xref target="RFC8329" />.
        </t>

        <t>
        An IBS user needs an interface to deliver its intent to an IBS
        controller (e.g.., Cloud Controller in <xref target="figure:Wireless-and-Wired-Networks-for-I2INF" />)
        having an intent translator, which translates the intent into a
        network policy and an application policy, and a dispatcher,
        which dispatches the policies to appropriate destinations (e.g, 
        NF controller and AF controller). This interface is called a 
        Customer-Facing Interface (CFI) for the IBS user
        <xref target="I-D.ietf-i2nsf-consumer-facing-interface-dm" />. 
        A data model for the Customer-Facing Interface should be specified.
        </t>

        <t>
        Both an NF controller and an AF controller need an interface to
        deliver the network rules and the application rules to the
        appropriate NFs and the appropriate AFs, respectively.
        This interface is called a Service Function-Facing Interface (SFI) for
        both the NF controller and the AF controller
        <xref target="I-D.ietf-i2nsf-nsf-facing-interface-dm" />.
        </t>

        <t>
        For the assurance of the intent in the target network and application,
        the collection and analysis of monitoring data from the NFs and AFs
        is required. A Monitoring Interface <xref target="I-D.ietf-i2nsf-nsf-monitoring-data-model" /> 
        is an interface to collect monitoring data from either an NF or an AF
        to a data collector (e.g., IBS analyzer 
        <xref target="I-D.lingga-i2nsf-analytics-interface-dm" />
        <xref target="TS-23.288" /><xref target="TS-29.520" />). 
        For the further actions, the analysis results of the NF and the AF
        should be reported to the NF controller and the AF controller,
        respectively. An Analytics Interface is an interface to deliver
        analysis results to either an NF controller or an AF controller
        <xref target="I-D.lingga-i2nsf-analytics-interface-dm" />.          
        </t>

        <t>
        The data models for capability and interfaces can be contructed by
        either YANG <xref target="RFC6020" /><xref target="RFC7950" /> or
        YAML <xref target="YAML" />.
        The message delivery protocol for the interfaces can be one among
        NETCONF <xref target="RFC6241" />, RESTCONF <xref target="RFC8040" />,
        and REST API <xref target="REST" />. 
        </t>

    </section>
</section>

<section anchor="section:IANA-Considerations" title="IANA Considerations">
  <t>
    This document does not require any IANA actions.
  </t>
</section>

<section anchor="section:Security-Considerations" title="Security Considerations">
  <t>
    The same security considerations for the Interface to Network Security
    Functions (I2NSF) Framework <xref target="RFC8329" /> are applicable to the
    Intent-Based System this document.
  </t>

</section>

</middle>

<back>

<!-- START: Normative References -->
<references title="Normative References">

    <?rfc include="reference.RFC.6020"?>
    <?rfc include="reference.RFC.6241"?>
    <?rfc include="reference.RFC.7149"?>
    <?rfc include="reference.RFC.7950"?>
    <?rfc include="reference.RFC.8040"?>    
    <?rfc include="reference.RFC.8329"?>
    <?rfc include="reference.RFC.9315"?>
    <?rfc include="reference.RFC.9365"?>
    
</references>
<!-- END: Normative References -->

<!-- START: Informative References -->
<references title="Informative References">

    <?rfc include='reference.I-D.jeong-nmrg-ibn-network-management-automation'?>
    <?rfc include='reference.I-D.irtf-coinrg-coin-terminology'?>
    <?rfc include='reference.I-D.irtf-coinrg-use-cases'?>
    <?rfc include='reference.I-D.ietf-i2nsf-applicability'?>
    <?rfc include='reference.I-D.ietf-i2nsf-capability-data-model'?>
    <?rfc include='reference.I-D.ietf-i2nsf-registration-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-consumer-facing-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-nsf-facing-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-nsf-monitoring-data-model'?>
    <?rfc include='reference.I-D.lingga-i2nsf-analytics-interface-dm'?>
    <?rfc include='reference.I-D.jeong-i2nsf-security-management-automation'?>
    <?rfc include='reference.I-D.yang-i2nsf-security-policy-translation'?>

    <reference anchor="YAML">
        <front>
            <title>Yet Another Markup Language (YAML) 1.0</title>
            <author initials="B." surname="Ingerson" />
            <author initials="C." surname="Evans" />
            <author initials="O." surname="Ben-Kiki" />
            <date month="October" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://yaml.org/spec/history/2001-05-26.html" />
    </reference>

    <reference anchor="TS-23.501">
        <front>
            <title>System Architecture for the 5G System (5GS)</title>
            <author surname="3GPP TS 23.501 V18.3.0" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144" />
    </reference>

    <reference anchor="TS-28.312">
        <front>
            <title>Intent Driven Management Services for Mobile Networks</title>
            <author surname="3GPP TS 28.312 V18.1.1" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3554" />
    </reference>

    <reference anchor="TR-28.812">
        <front>
            <title>Study on Scenarios for Intent Driven Management Services for Mobile Networks</title>
            <author surname="3GPP TR 28.812 V17.1.0" />
            <date month="December" year="2020" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3553" />
    </reference>

    <reference anchor="TS-23.288">
        <front>
            <title>Architecture Enhancements for 5G System (5GS) to Support Network Data Analytics Services</title>
            <author surname="3GPP TS 23.288 V18.3.0" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3579" />
    </reference>

    <reference anchor="TS-29.520">
        <front>
            <title>Network Data Analytics Services</title>
            <author surname="3GPP TS 29.520 V18.3.0" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3355" />
    </reference>

    <reference anchor="ETSI-NFV">
        <front>
            <title>Network Functions Virtualisation (NFV); Architectural Framework</title>
            <author surname="ETSI GS NFV 002 V1.2.1" />
            <date month="December" year="2014" />
        </front>
        <seriesInfo name="Available:" value="https://www.etsi.org/deliver/etsi_gs/nfv/001_099/002/01.02.01_60/gs_nfv002v010201p.pdf" />
    </reference>

    <reference anchor="ETSI-NFV-Release-2">
        <front>
            <title>Network Functions Virtualisation (NFV) Release 2; 
            Management and Orchestration; Architectural Framework Specification</title>
            <author surname="ETSI GS NFV 006 V2.1.1" />
            <date month="January" year="2021" />
        </front>
        <seriesInfo name="Available:" value="https://www.etsi.org/deliver/etsi_gs/nfv/001_099/006/02.01.01_60/gs_nfv006v020101p.pdf" />
    </reference>

    <reference anchor="NFV-COIN">
        <front>
            <title>NFV-COIN: Unleashing The Power of In-Network Computing with Virtualization Technologies</title>
            <author initials="G." surname="Venancio" />
            <author initials="R." surname="Turchetti" />
            <author initials="E." surname="Duarte Jr." />
            <date month="December" year="2022" />
        </front>
        <seriesInfo name="SBC" value="Journal of Internet Services and Applications" />
        <seriesInfo name="Available:" value="https://journals-sol.sbc.org.br/index.php/jisa/article/view/2342" />
    </reference> 

    <reference anchor="REST">
        <front>
            <title>Principled Design of the Modern Web Architecture</title>
            <author initials="R." surname="Fielding" />
            <author initials="R." surname="Taylor" />
            <date month="May" year="2002" />
        </front>
        <seriesInfo name="ACM" value="Transactions on Internet Technology, Vol. 2, Issue 2," />
        <seriesInfo name="Available:" value="https://dl.acm.org/doi/10.1145/514183.514185" />
    </reference>

    <reference anchor="USENIX-ATC-Lumi">
        <front>
            <title>Hey, Lumi! Using Natural Language for Intent-Based Network Management</title>
            <author initials="A." surname="Jacobs" />
            <author initials="R." surname="Pfitscher" />
            <author initials="R." surname="Ribeiro" />
            <author initials="R." surname="Ferreira" />
            <author initials="L." surname="Granville" />
            <author initials="W." surname="Willinger" />
            <author initials="S." surname="Rao" />
            <date month="July" year="2021" />
        </front>
        <seriesInfo name="USENIX" value="Annual Technical Conference" />
        <seriesInfo name="Available:" value="https://www.usenix.org/conference/atc21/presentation/jacobs" />
    </reference>

    <reference anchor="BERT">
        <front>
            <title>BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding</title>
            <author initials="J." surname="Devlin" />
            <author initials="M." surname="Chang" />
            <author initials="K." surname="Lee" />
            <author initials="K." surname="Toutanova" />
            <date month="June" year="2019" />
        </front>
        <seriesInfo name="NAACL-HLT" value="Conference" />
        <seriesInfo name="Available:" value="https://aclanthology.org/N19-1423.pdf" />
    </reference>


    <reference anchor="Deep-Learning">
        <front>
            <title>Deep Learning</title>
            <author initials="I." surname="Goodfellow" />
            <author initials="Y." surname="Bengio" />
            <author initials="A." surname="Courville" />
            <date month="November" year="2016" />
        </front>
        <seriesInfo name="Publisher:" value="The MIT Press" />
    <seriesInfo name="Available:" value="https://www.deeplearningbook.org/" />
    </reference>

    <reference anchor="AUTOSAR-SDV">
        <front>
            <title>AUTOSAR Adaptive Platform</title>
            <author surname="AUTOSAR" />
            <date month="March" year="2024" />
        </front>
        <seriesInfo name="Available:" value="https://www.autosar.org/standards/adaptive-platform" />    
    </reference>

    <reference anchor="Eclipse-SDV">
        <front>
            <title>Eclipse Software Defined Vehicle Working Group Charter</title>
            <author surname="Eclipse" />
            <date month="March" year="2024" />
        </front>
        <seriesInfo name="Available:" value="https://www.eclipse.org/org/workinggroups/sdv-charter.php" />    
    </reference>

    <reference anchor="COVESA">
        <front>
            <title>Connected Vehicle Systems Alliance </title>
            <author surname="COVESA" />
            <date month="March" year="2024" />
        </front>
        <seriesInfo name="Available:" value="https://covesa.global/" />    
    </reference>

    <reference anchor="Kubernetes">
        <front>
            <title>Kubernetes: Cloud Native Computing Platform</title>
            <author surname="Kubernetes" />
            <date month="March" year="2024" />
        </front>
        <seriesInfo name="Available:" value="https://kubernetes.io/" />    
    </reference>

    <reference anchor="Survey-IBN-CST-2023">
        <front>
            <title>A Survey on Intent-Based Networking</title>
            <author initials="A." surname="Leivadeas" />
            <author initials="M." surname="Falkner" />
            <date month="March" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://ieeexplore.ieee.org/document/9925251" />    
    </reference>

</references>
<!-- END: Informative References -->

<section title="Acknowledgments">
    <t indent="0" pn="section-appendix.a-1">    
    This work was supported by Institute of Information &amp; Communications
    Technology Planning &amp; Evaluation (IITP) grant funded by the Korea
    Ministry of Science and ICT (MSIT) (No. RS-2024-00398199).
    </t>

    <t indent="0" pn="section-appendix.a-2">
    This work was supported in part by Institute of Information &amp; Communications
    Technology Planning &amp; Evaluation (IITP) grant funded by the Korea
    Ministry of Science and ICT (MSIT) (No. 2022-0-01015, Development of
    Candidate Element Technology for Intelligent 6G Mobile Core Network).
    </t>
</section>

<section anchor="section:Contributors" title="Contributors">
    <t indent="0" pn="section-appendix.b-1">
    This document is made by the group effort of OPWAWG, greatly benefiting 
    from inputs and texts by <contact fullname="Linda Dunbar"/> (Futurewei),
    <contact fullname="Yong-Geun Hong"/> (Daejeon University), and
    <contact fullname="Joo-Sang Youn"/> (Dong-Eui University).
    The authors sincerely appreciate their contributions.
    </t>

    <t indent="0" pn="section-appendix.b-2">  
    The following are coauthors of this document:
    </t>   

      <contact fullname="Mose Gu">
        <organization showOnFrontPage="true">Department of Computer Science &amp; Engineering</organization>
        <address>
          <postal>
            <extaddr>Sungkyunkwan University</extaddr>
            <street>2066 Seobu-Ro, Jangan-Gu</street>
            <city>Suwon</city>
            <region>Gyeonggi-Do</region>
            <code>16419</code>
            <country>Republic of Korea</country>
          </postal>
          <phone>+82 31 299 4106</phone>
          <email>rna0415@skku.edu</email>
          <uri>http://iotlab.skku.edu/people-Moses-Gu.php</uri>
        </address>
      </contact>
      <contact fullname="Juwon Hong">
        <organization showOnFrontPage="true">Department of Computer Science &amp; Engineering</organization>
        <address>
          <postal>
            <extaddr>Sungkyunkwan University</extaddr>
            <street>2066 Seobu-Ro, Jangan-Gu</street>
            <city>Suwon</city>
            <region>Gyeonggi-Do</region>
            <code>16419</code>
            <country>Republic of Korea</country>
          </postal>
          <phone>+82 31 299 4106</phone>
          <email>hongju2024@skku.edu</email>
          <uri>http://iotlab.skku.edu/people-Joo-Won-Hong.php</uri>
        </address>
      </contact>

</section>

</back>

<!-- <vspace blankLines="100"/> -->
<!-- page break to put addresses onto one page-->

</rfc>
