<?xml version="1.0" encoding="US-ASCII"?>
<!-- <?xml version="1.0" encoding="UTF-8"?> -->
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private)
-->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">


<?rfc toc="yes"?>
<?rfc rfcedstyle="yes"?>
<?rfc subcompact="no"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" category="info" docName="draft-jeong-opsawg-i2inf-framework-02">

<front>
    <title abbrev="I2INF Framework">
    A Framework for the Interface to In-Network Functions (I2INF)
    </title>

    <author role="editor" initials="J." surname="Jeong" fullname="Jaehoon Paul Jeong">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science &amp; Engineering
        </organization>
        <address>
            <postal>                
                <extaddr>Sungkyunkwan University</extaddr>
                <street>2066 Seobu-Ro, Jangan-Gu</street>
                <city>Suwon</city> <region>Gyeonggi-Do</region>
                <code>16419</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 31 299 4957</phone>
            <facsimile>+82 31 290 7996</facsimile>
            <email>pauljeong@skku.edu</email>
            <uri>http://iotlab.skku.edu/people-jaehoon-jeong.php
         </uri>
        </address>
    </author>

    <author initials="Y." surname="Shen" fullname="Yiwen Shen">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science &amp; Engineering
        </organization>	
		<address>
            <postal>
			    <extaddr>Sungkyunkwan University</extaddr>
  			    <street>2066 Seobu-Ro, Jangan-Gu</street>
			    <city>Suwon</city>
			    <region>Gyeonggi-Do</region>
			    <code>16419</code>
			    <country>Republic of Korea</country>
			</postal>
			<phone>+82 31 299 4106</phone>
			<email>chrisshen@skku.edu</email>
			<uri>https://chrisshen.github.io</uri>
		</address>
    </author>

    <author initials="Y." surname="Ahn" fullname="Yoseop Ahn">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science &amp; Engineering
        </organization>	
		<address>
		    <postal>
			    <extaddr>Sungkyunkwan University</extaddr>
  			    <street>2066 Seobu-Ro, Jangan-Gu</street>
				<city>Suwon</city>
				<region>Gyeonggi-Do</region>
				<code>16419</code>
				<country>Republic of Korea</country>
			</postal>
			<phone>+82 31 299 4106</phone>
		    <email>ahnjs124@skku.edu</email>
			<uri>http://iotlab.skku.edu/people-Ahn-Yoseop.php</uri>
		</address>
    </author>

    <author initials="Y." surname="Kim" fullname="Younghan Kim">
        <organization abbrev="Soongsil University">
        School of Electronic Engineering
        </organization>
		<address>
            <postal>
                <extaddr>Soongsil University</extaddr>
                <street>369, Sangdo-ro, Dongjak-gu</street>
                <city>Seoul</city>
                <code>06978</code>
                <country>Republic of Korea</country>
            </postal>
            <phone></phone>
            <email>younghak@ssu.ac.kr</email>
		</address>
    </author>

    <author initials="E." surname="Duarte Jr." fullname="Elias P. Duarte Jr.">
        <organization abbrev="Federal University of Parana">
        Department of Informatics
        </organization>	
	    <address>
            <postal>
                <extaddr>Federal University of Parana</extaddr>
                <street></street>
                <city></city> <region></region>
                <code></code>
                <country>Brazil</country>
            </postal>
            <phone></phone>
            <email>elias@inf.ufpr.br</email>
        </address>
    </author>

    <author initials="K." surname="Yao" fullname="Kehan Yao">
        <organization abbrev="China Mobile">
        China Mobile
        </organization>
        <address>
            <postal>
                <street/>
                <city>Beijing</city>
                <code>100053</code>
                <country>China</country>
            </postal>
            <email>yaokehan@chinamobile.com</email>
        </address>
    </author>
    
    <date month="November" day="3" year="2024" />

    <area>Operations and Management Area</area>
    
    <workgroup>Operations and Management Area Working Group</workgroup>

<!-- [rfced] Please insert any keywords (beyond those that appear in
the title) for use on http://www.rfc-editor.org/rfcsearch.html. -->

<keyword>Internet-Draft</keyword>

    <abstract>
        <t>
        This document specifies a framework to define Interface to In-Network
        Functions (I2INF) for user services both on the network-level and
        application-level. In-Network Functions (INF) include In-Network
        Computing Functions (INCF), defined in the context of Network Functions
        Virtualization (NFV) and Software-Defined Networking (SDN). INF also
        includes In-Network Application Functions (INAF) which appear in the
        context of Internet-of-Things (IoT) Devices, Software-Defined Vehicles
        (SDV), and Unmanned Aerial Vehicles (UAV). This document describes an
        I2INF framework, which includes components and interfaces to configure
        and monitor the INFs that implement applications and services.
        </t>
    </abstract>
</front>

<middle>

<section anchor="section:Introduction" title="Introduction">
    <t>
    Network softwarization has been widely adopted in multiple environments,
    such as in cloud and edge computing, as well as in the network
    infrastructure itself, facilitating the deployment of network services
    (e.g., 5G mobile networks <xref target="TS-23.501" />). The multiple
    technologies behind network softwarization include Network Functions
    Virtualization (NFV) <xref target="ETSI-NFV" /><xref
    target="ETSI-NFV-Release-2" /> and Software-Defined Networking (SDN) <xref
    target="RFC7149" />. Furthermore, there is also an integration with
    Intent-BasedNetworking (IBN)<xref target="RFC9315" /><xref
    target="Survey-IBN-CST-2023" />, which can be used to define and deploy
    intelligent network services as well as intelligent application services.
    </t>

    <t>
    In the context of Computing in the Network (COIN) terminology 
    <xref target="I-D.irtf-coinrg-coin-terminology" />, a Programmable Network
    Device (PND) in an In-Network Computing (INC) environment can have multiple
    kinds of features and capabilities. A PND can also interact with other PNDs.
    PNDs from different product lines or vendors can provide different
    functionalities for INC functions. In order to compose a COIN system
    consisting of multiple PDNs that interact among themselves, it is necessary
    to define a standard interface for PNDs to be exposed so that they can learn
    about each other&apos;s capabilities and properly interact with each other.
    </t>

    <t>
    A standard framework to define the  interfaces of Application Functions
    (AFs) and Network Functions (NFs) is required to allow the configuration and
    monitoring of applications and network services consisting of those
    functions. There is currently no standard data model to describe the
    capabilities of AFs and NFs. Furthermore, there is no standard data model
    defining an interface to register the capabilities of AFs and NFs with a
    controller-like device that would process service requests for those
    functions. In addition, there are no standard interfaces to configure and
    monitor those AFs and NFs according to a user's intent. The Interface to
    Network Security Functions (I2NSF) was standardized for the control and
    management of Network Security Services with Network Security Functions
    (NSFs)  <xref target="RFC8329" />
    <xref target="I-D.ietf-i2nsf-applicability" />. The present document is
    defined taking into account the I2NSF document, but the purpose is beyond
    the scope of Security Functions, defining a more general control and
    management framework for intelligent services consisting of AFs and NFs. 
    </t>

    <t>
    This document specifies a framework for the definition of the  Interface to
    In-Network Functions (I2INF) for In-Network Functions (INFs), assuming
    arbitrary functionalities, features and capabilities. The INFs consist of
    Network Functions (NFs) including PNDs and Application Functions (AFs) and
    are used to compose user services. First of all, INFs include In-Network
    Computing Functions (INCF) which are NFs defined within the context of NFV
    and SDN <xref target="I-D.irtf-coinrg-use-cases" />. Secondly, they also
    include In-Network Application Functions (INAF) which are AFs employed by
    Internet-of-Things (IoT) Devices, Software-Defined Vehicles (SDV)
    <xref target="AUTOSAR-SDV" /><xref target="Eclipse-SDV" /><xref
    target="COVESA" />, and Unmanned Aerial Vehicles (UAV). Finally, this
    document shows how Intent-Based Networking (IBN) can be realized with the
    proposed I2INF framework and its interfaces for user services that consist
    of a combination of INFs in a target network. 
    </t>
</section>

<section anchor="section:Terminology" title="Terminology">
    <t>
      This document uses the terminology described in <xref target="RFC9315" />,
      <xref target="RFC8329" />,
      <xref target="I-D.irtf-coinrg-coin-terminology" />,
      <xref target="I-D.irtf-coinrg-use-cases" />,
      <xref target="I-D.jeong-i2nsf-security-management-automation"/>, <xref
      target="I-D.jeong-nmrg-ibn-network-management-automation"/>, and <xref
      target="I-D.yang-i2nsf-security-policy-translation"/>. In addition, the
      following terms are defined below:
    </t>

    <t>
    <list style="symbols">
      <t>
        Intent: the set of operational goals (that a network should meet) and
        outcomes (that a network is supposed to deliver) defined in a
        declarative manner without specifying how they are achieved or should be
        implemented <xref target="RFC9315" />.
      </t>

      <t>
        Intent-Based System (IBS): the system that enforces an intent from a user
        (or administrator) into a target system (e.g., SDV). An intent can be
        expressed in Natural Language (e.g., English) and can be translated into
        a policy (i.e., network policy and application policy) using Natural
        Language Processing (NLP)  
        <xref target="USENIX-ATC-Lumi" /><xref target="BERT" />
        <xref target="Deep-Learning" />. In this document, the intent can be
        translated into a corresponding high-level policy by an intent
        translator <xref
        target="I-D.jeong-i2nsf-security-management-automation"/>. The
        high-level policy can also be translated into the corresponding
        low-level policy by a policy translator 
        <xref target="I-D.yang-i2nsf-security-policy-translation"/>. The
        low-level policy is dispatched to appropriate Service Functions (SFs).
        Through the monitoring of the SFs, the activity and performance of the
        SFs is monitored and analyzed. If needed, the rules of the high-level or
        low-level network policy are augmented or new rules are generated and
        configured to appropriate SFs.
      </t>

      <t>
        Mobile Object (MO): the object that is capable of moving with its own
        power source and wireless communication capability, e.g., in the context
        of 5G Vehicle-to-Everything (e.g., 5G V2X). An MO can be an Internet-of-Things
        (IoT) device, Software-Defined Vehicle (SDV) <xref target="AUTOSAR-SDV"
        /><xref target="Eclipse-SDV" /><xref target="COVESA" />, and Unmanned
        Aerial Vehicle (UAV). An MO is a Programmable Network Device (PND) <xref
        target="I-D.irtf-coinrg-coin-terminology" /> that can be reconfigured
        for different network requirements inside the MO.
      </t>

      <t>
        In-Network Computing Functions (INCF): the service functions that work
        for computing in the network infrastructure. They are a group of COIN
        programs <xref target="I-D.irtf-coinrg-coin-terminology" /> to provide
        required computing tasks and functions.
      </t>

      <t>
        In-Network Application Functions (INAF): the service functions that work
        for applications in Mobile Objects. They are a group of COIN programs
        <xref target="I-D.irtf-coinrg-coin-terminology" /> to provide the
        required application tasks and functions.              
      </t>

      <t>
        Interface to In-Network Functions (I2INF): the interfaces that are used
        between a pair of INFs for the interaction, configuration and
        monitoring.
      </t>

      <t>
        A Framework for the Interface to In-Network Functions (I2INF): the
        framework that consists of components and interfaces to configure and
        monitor INFs that can be employed by applications and services in the
        network infrastructure and MOs.
      </t>      

    </list>
    </t>

</section>

<section title="A Framework for the Interface to In-Network Functions">
    <t>
    This section specifies a framework for defining the Interface to In-Network
    Functions (I2INF), including its components and the interfaces among those
    components. <xref target="figure:Wireless-and-Wired-Networks-for-I2INF" />
    shows Wireless and Wired Networks of a Central Cloud. The I2INF framework
    includes network entities and Mobile Objects (MO). <xref
    target="figure:VNF-Consensus-Architecture-for-I2INF" /> shows a
    VNF-Consensus Architecture that allows the I2INF framework to synchronize
    flow table information of all the replicated SDN Controllers in the same Edge
    Cloud <xref target="NFV-COIN" />.
    </t>

      <figure anchor="figure:Wireless-and-Wired-Networks-for-I2INF" align="center"
          title="I2INF Framework: Wireless and Wired Networks in a Central Cloud">
          <artwork align="left"><![CDATA[
                                  Central Cloud
                   *******************************************
                 *                                             *
                *              +------------------+             *
               *               | Cloud Controller |              *
               *               +------------------+              *
               *                         ^                       *
                *                        |                      *
                 *                       v                     *
                   *******************************************
                    ^                   ^                    ^
                    |                   |                    |
                    V                   V                    V
              +-----------+       +-----------+        +-----------+
              |Edge-Cloud1|       |Edge-Cloud2|        |Edge-Cloud3|
              +-----------+       +-----------+        +-----------+
                    ^                   ^                    ^
                    |                   |                    |
                    V                   V                    V
               +---------+         +---------+         +---------+
               | IP-RSU1 |<------->| IP-RSU2 |<------->| IP-RSU3 |
               +---------+         +---------+         +---------+
                    ^                   ^                    ^
                    :                   :                    :
           +-----------------+ +-----------------+   +-----------------+
           |        : V2I    | |        : V2I    |   |       : V2I     |
           |        v        | |        v        |   |       v         |
+--------+ |   +--------+    | |   +--------+    |   |   +--------+    |
|   MO1  |===> |   MO2  |===>| |   |   MO3  |===>|   |   |   MO4  |===>|
+--------+<...>+--------+<........>+--------+    |   |   +--------+    |
           V2V     ^         V2V        ^        |   |        ^        |
           |       : V2V     | |        : V2V    |   |        : V2V    |
           |       v         | |        v        |   |        v        |
           |  +--------+     | |   +--------+    |   |    +--------+   |
           |  |   MO5  |===> | |   |   MO6  |===>|   |    |   MO7  |==>|
           |  +--------+     | |   +--------+    |   |    +--------+   |
           +-----------------+ +-----------------+   +-----------------+
                 Subnet1              Subnet2              Subnet3
                (Prefix1)            (Prefix2)            (Prefix3)

        <----> Wired Link   <....> Wireless Link   ===> Moving Direction
]]></artwork>
      </figure>

      <figure anchor="figure:VNF-Consensus-Architecture-for-I2INF" align="center"
          title="I2INF Framework: VNF-Consensus Architecture in an Edge Cloud">
          <artwork align="left"><![CDATA[
                        Edge Cloud                      Central Cloud  
        ******************************************        **********
       *                                          *     *            *
      *                                            *   * +----------+ *
      *  +---------------+   +-----------------+   *   * |  Cloud   | *
      *  | VNF-Consensus |<->| Edge Controller |<->*<->* |Controller| *
      *  +-------^-------+   +--------^--------+   *   * +----------+ *
      *          |                    |            *   *              *
       *         v                    V           *     *            *
        ******************************************        **********
        ^                    ^                    ^
        |                    |                    |
        V                    V                    V
+---------------+    +---------------+    +---------------+
|SDN-Controller1|    |SDN-Controller2|    |SDN-Controller3|
+---------------+    +---------------+    +---------------+
        ^                    ^                    ^
        |                    |                    |
        V                    V                    V
+---------------+    +---------------+    +---------------+
|   +-----+     |    |   +-----+     |    |   +-----+     |
|   | SW1 |     |    |   | SW3 |     |    |   | SW5 |     |
|   +---^-+     |    |   +---^-+     |    |   +---^-+     | 
|       |       |    |       |       |    |       |       |
|     +-V---+   |    |     +-V---+   |    |     +-V---+   |
|     | SW2 |   |    |     | SW4 |   |    |     | SW6 |   |
|     +-----+   |    |     +-----+   |    |     +-----+   |
+---------------+    +---------------+    +---------------+     
   SDN-Network1         SDN-Network2         SDN-Network3
     (Prefix1)            (Prefix2)            (Prefix3)

<----> Wired Link
]]></artwork>
      </figure>

    <t>
    An intent-based management strategy is required between the central cloud
    and MOs to allow the automatic configuration of MOs <xref
    target="I-D.jeong-nmrg-ibn-network-management-automation"/>. <xref
    target="figure:I2INF-Framework-for-MO" /> shows an instance of the I2INF
    framework as an IBS for an MO. The framework in this case includes a Central
    Cloud and an MO. <xref target="figure:I2INF-Framework-for-EC" /> shows an
    I2INF framework as an IBS for an Edge Cloud. The framework in this case
    consists of a Central Cloud and an Edge Cloud.
    </t>

    <figure anchor="figure:I2INF-Framework-for-MO"
     title="I2INF Framework for a Mobile Object">
            <artwork><![CDATA[   
                         <Central Cloud (CC)>            
+---------------------------------------------------------------------+
| +------------------+                      +--------------------+    |
| |    I2INF User    |          +---------->|   I2INF Database   |    |
| +------------------+          |           +--------------------+    |
|          ^                    |                     ^               |
|          |                    | Database            | Database      |
|          |                    | Interface           | Interface     |
|          | Consumer-Facing    |                     V               |
|          | Interface (Intent) |           +--------------------+    |
|          |                    | +-------->|    Cloud Analyzer  |<-+ |
|          |                    | |         +--------------------+  | |
|          V                    | |Analytics                        | |
| +------------------+<---------+ |Interface                        | |
| | Cloud Controller |<-----------+         +--------------------+  | |
| +------------------+<-------------------->|Vendor's Mgmt System|  | |
|          ^         Registration Interface +--------------------+  | |
|          |                                          ^             | |
+----------|------------------------------------------|-------------|-+
           | Controller-Facing Interface   VMS-Facing |   Analyzer- |
           |     (High-level Policy)        Interface |   Facing    |
           |                                          |   Interface |
+----------|------------------------------------------|-------------|-+
|          |                                          |             | |
|          v                                          v             | |
| +------------------+     Registration     +--------------------+  | |
| |  MO Controller   |<-------------------->|    MO Vendor's     |  | |
| +------------------+      Interface       |    Mgmt System     |  | |
|          ^      ^                         +--------------------+  | |
|          |      |                                                 | |
|          |      |                                                 | |
|          |      |   Analytics Interface   +--------------------+  | |
|          |      +------------------------>|    MO Analyzer     |<-+ |
|          |                                +--------------------+    |
|          | SF-Facing Interface                      ^               |
|          |  (Low-level Policy)                      |               |
|          |                                          |               |
|          |    +--------------+----------------------+---+           |
|          |    |              |   Monitoring Interface   |           |
|          v    v              v                          v           |
|   +---------------+  +---------------+        +---------------+     |
|   |     SF-1      |  |     SF-2      |........|     SF-n      |     |
|   |   (Router)    |  |  (Firewall)   |        |  (Navigator)  |     |
|   +---------------+  +---------------+        +---------------+     |
+---------------------------------------------------------------------+
                        <Mobile Object (MO)>
            ]]></artwork>
    </figure>

    <figure anchor="figure:I2INF-Framework-for-EC"
     title="I2INF Framework for an Edge Cloud">
            <artwork><![CDATA[   
                         <Central Cloud (CC)>            
+---------------------------------------------------------------------+
| +------------------+                      +--------------------+    |
| |    I2INF User    |          +---------->|   I2INF Database   |    |
| +------------------+          |           +--------------------+    |
|          ^                    |                     ^               |
|          |                    | Database            | Database      |
|          |                    | Interface           | Interface     |
|          | Consumer-Facing    |                     V               |
|          | Interface (Intent) |           +--------------------+    |
|          |                    | +-------->|    Cloud Analyzer  |<-+ |
|          |                    | |         +--------------------+  | |
|          V                    | |Analytics                        | |
| +------------------+<---------+ |Interface                        | |
| | Cloud Controller |<-----------+         +--------------------+  | |
| +------------------+<-------------------->|Vendor's Mgmt System|  | |
|          ^         Registration Interface +--------------------+  | |
|          |                                          ^             | |
+----------|------------------------------------------|-------------|-+
           | Controller-Facing Interface   VMS-Facing |   Analyzer- |
           |     (High-level Policy)        Interface |   Facing    |
           |                                          |   Interface |
+----------|------------------------------------------|-------------|-+
|          |                                          |             | |
|          v                                          v             | |
| +------------------+     Registration     +--------------------+  | |
| |  Edge Controller |<-------------------->|   Edge Vendor's    |  | |
| +------------------+      Interface       |    Mgmt System     |  | |
|          ^      ^                         +--------------------+  | |
|          |      |                                                 | |
|          |      |                                                 | |
|          |      |   Analytics Interface   +--------------------+  | |
|          |      +------------------------>|    Edge Analyzer   |<-+ |
|          |                                +--------------------+    |
|          | SF-Facing Interface                      ^               |
|          |  (Low-level Policy)                      |               |
|          |                                          |               |
|          |    +--------------+----------------------+---+           |
|          |    |              |   Monitoring Interface   |           |
|          v    v              v                          v           |
|   +---------------+  +----------------------+   +---------------+   |
|   |     SF-1      |  |         SF-2         |...|      SF-n     |   |
|   |(VNF-Consensus)|  |(NFV-Failure-Detector)|   |  (NFV-RBCast) |   |
|   +---------------+  +----------------------+   +---------------+   |
+---------------------------------------------------------------------+
                          <Edge Cloud (EC)>
            ]]></artwork>
    </figure>

    <t>
    A Central Cloud (CC) consists of an I2INF User (as network administrator), a
    Cloud Controller (which acts as an orchestrator for the central cloud), an
    I2INF Database (which is the main repository for INF management and
    monitoring information), and a Cloud Analyzer (as a monitoring data analyzer
    for MOs and ECs) such as Network Data Analytics Function (NWDAF) in 5G
    networks <xref target="TS-23.288" /><xref target="TS-29.520" />. These and
    other components are defined next:
    <list style="symbols">
    <t>
    I2INF User: the software (e.g., web-browser-based user
    interface) that is used by I2INF administrators to deliver network intents to MO
    controllers and edge controllers. In the 3GPP intent-driven management
    service document, it is assumed that a network intent is configured by an
    intent data model <xref target="TS-28.312" />
    <xref target="TR-28.812" />.
    </t>
    
    <t>
    Cloud Controller: the main component that is responsible for the management
    and control of other system components of the central cloud, including
    security. From a security point of view, a security service policy can be
    transmitted to the service function (SF) by converting the I2INF User's
    security service intent into the corresponding security service policy and
    selecting an SF that provides an appropriate security service.
    </t>

    <t>
    Cloud Vendor's Management System: the component that provides images of
    virtualized SFs for cloud services and registers the SFs and access
    information with the Cloud Controller.
    </t>

    <t>
    Cloud Analyzer: the component that gathers and evaluates monitoring data from MO Analyzers
    and Edge Analyzers to ensure the functionality and performance of SFs, e.g.,
    the network data analytics function (NWDAF) in 5G networks.
    </t>

    <t>
    I2INF Database: the database that manages the information of MOs and ECs,
    including network and security configuration and status of MOs and ECs. For
    example, for MOs it maintains the current locations and navigation paths
    (e.g., SDVs). For ECs, it maintains network configuration information,
    including for instance the status of AFs and NFs within the edge cloud.
    </t>
    </list>
    </t>

    <t>
    An IBS in an MO (or EC) is composed of an MO Controller (or Edge Controller)
    which acts as a manager for the MO (or EC), an MO Analyzer (or Edge
    Analyzer) which acts as a monitoring data analyzer for an MO (or EC)) <xref
    target="I-D.jeong-nmrg-ibn-network-management-automation"/>, it can also
    include a Vendor's Management System (as a vendor system to provide
    cloud-native containers) <xref target="RFC8329" />, and Service Functions
    (SFs). SFs for the MO require NFs such as routers, DNS servers, and
    firewalls <xref
    target="I-D.jeong-nmrg-ibn-network-management-automation"/>), and AFs
    include safe driver devices and navigators.  SFs for the EC include NFs such
    as VNF-Consensus, NFV-Failure-Detector, and NFV-RBCast (i.e., NFV
    Reliable-Ordered Broadcast) <xref target="NFV-COIN"/>). Those components are
    further described next: 
    <list style="symbols">
    <t>
    MO Controller: the component that controls and manages other components of the
    MO framework (or the EC framework). It translates the high-level policies
    received from the Cloud Controller into a low-level policies that the SF can
    understand. Any SF can be selected to execute any low-level service. Yet
    another task is the transmission of the policy to the SF.
    </t>
    <t>
    MO Vendor Management System (or Edge Vendor Management System): the component
    that provides an image of a virtualized SF for MO services (or EC services)
    to the MO framework (or the EC framework). Also responsible for registering
    functions and SF access control information on MO Controller (or the Edge
    Controller). 
    </t>
    <t>
    Service Function (SF): the component that can be either a virtual network
    function (VNF), cloud native network function (CNF), or physical network
    function (PNF) of a specific service. In the context of security, SFs
    provide security services such as firewalls, web filters, DDoS attack
    mitigators, and anti-viruses. In addition, networks and application services
    can also operate as SFs.
    </t>
    <t>
    MO Analyzer (or Edge Analyzer): the component that collects monitoring data
    from SFs of MOs (or ECs) and analyzes the collected data to monitor the
    activity and performance of SFs. The MO Analyzer (or Edge Analyzer) acts as
    NWDAF of a 5G network. If there are problems (e.g., security attacks,
    traffic congestion, QoS degradation) in the MO network (or EC network), the
    MO Analyzer (or Edge Analyzer) requests either policy reconfigurations or
    feedback information to MO Controller (or Edge Controller) to restore
    security or troubleshoot the network.
    </t>
    </list>
    </t>
</section>

<section title="Interfaces in the I2INF Framework">

    <t>
    Together with the I2INF framework, interfaces are also defined between pairs
    of system components in the central cloud and MO (or EC), respectively.
    These interfaces are shown in <xref
    target="figure:I2INF-Framework-for-MO" /> and <xref
    target="figure:I2INF-Framework-for-EC" /> and include the following: 
    <list style="symbols">
    <t>
    Consumer-Facing Interface: the interface between I2INF User Internet and the
    Cloud Controller. This interface is used for communicating intents.
    </t> 
    <t>
    Controller-Facing Interface: the interface between the Cloud Controller and
    the MO Controller (or Edge Controller) for the transmission of high-level
    policies corresponding to translated intents.
    </t> 
    <t>
    SF-Facing Interface: the interface between the MO Controller (or Edge
    Controller) and SF for the transmission of translated lower-level policies.
    </t> 
    <t>
    Registration Interface: the interface used to transfer information about SF
    capabilities and access control for the registration of the SF with either the
    Cloud Controller or MO Controller (or Edge Controller). This interface is
    also used to deliver SF queries issued for searching for a requested SF. For
    an MO, this can be the interface between the Cloud Controller and the Cloud
    Vendor Management System (Cloud VMS), or between MO Controller and MO Vendor
    Management System (MO VMS). Also, for an EC, this can be the interface
    between the Cloud Controller and the Cloud Vendor Management System (Cloud
    VMS), or between Edge Controller and Edge Vendor Management System (Edge
    VMS).
    </t> 
    <t>
    Monitoring Interface: the interface between the SF and the MO Analyzer (or
    Edge Analyzer) used to collect the SF monitoring data and is employed to
    identify security, system, and network issues related to the SF.
    </t> 
    <t>
    Analytics Interface: the interface for the transmission of policy
    reconfigurations or feedback produced as a result of analyzing the SF
    monitoring data. For an MO, this is an interface between the MO Analyzer
    and MO Controller, or between the Cloud Analyzer and Cloud Controller.
    Also, for an EC, this is an interface between the Edge Analyzer and the
    Edge Controller, or between the Cloud Analyzer and the Cloud Controller.
    </t> 
    <t>
    Analyzer-Facing Interface: the interface between the MO Analyzer (or Edge
    Analyzer) and the Cloud Analyzer for the exchange of security, network, and
    system-related analysis of SFs.
    </t> 
    <t>
    VMS-Facing Interface: the interface between the Cloud VMS and the MO VMS (or
    Edge VMS) used to exchange SF feature information, such as SF container
    images.
    </t> 
    <t>
    Database Interface: the interface for exchanging data of an I2INF database.
    This is an interface between the I2INF Database and the Cloud Controller, or
    between the I2INF Database and the Cloud Analyzer.
    </t> 
    </list>
    </t>

    <t>
    The intents, high-level policies, and low-level policies can be either XML
    documents <xref target="RFC6020" /><xref target="RFC7950" /> or YAML
    documents <xref target="YAML" />. They can be delivered to the destination
    components using NETCONF <xref target="RFC6241" />, RESTCONF <xref
    target="RFC8040" />, or REST API <xref target="REST" />.  
    </t>

    <t>
    As shown in <xref target="figure:I2INF-Framework-for-MO" /> and <xref
    target="figure:I2INF-Framework-for-EC" />, the I2INF Framework receives an
    intent from the I2INF User, entered by a user (who can be an
    administrator) into a target system such as an MO (e.g., SDV) or an Edge
    Cloud. The intent from the I2INF User can be translated into the
    corresponding high-level policy by an intent translator in the Cloud
    Controller of the Central Cloud <xref
    target="I-D.jeong-i2nsf-security-management-automation"/>. The high-level
    policy can also be translated into the corresponding low-level policy by a
    policy translator in the MO Controller of the MO or the Edge Controller of
    the Edge Cloud <xref target="I-D.yang-i2nsf-security-policy-translation"/>.
    For the MO, as shown in <xref target="figure:I2INF-Framework-for-MO" />, the
    low-level policy is dispatched from the MO Controller to the appropriate
    Service Functions (SFs) in the MO, examples of which include a Router or a
    Firewall. Also, in the context of the EC, as shown in <xref
    target="figure:I2INF-Framework-for-EC" />, the low-level policy is
    dispatched from the Edge Controller to appropriate Service Functions (SFs)
    in the EC, such as VNF-Consensus, NFV-Failure-Detector, and NFV-RBCast.
    Through the monitoring of the SFs, the activity and performance of the SFs
    in the MO (or EC) is monitored and analyzed by the MO Analyzer (or Edge
    Analyzer) in the MO (or EC). If needed, the rules of the high-level or
    low-level network policy can be augmented by the MO Analyzer (or Edge
    Analyzer). Also, new rules can be automatically generated and configured to
    appropriate SFs by the MO Analyzer (or Edge Analyzer).
    </t>

    <t>
    In conclusion, this document proposed an I2INF framework as an IBS for both
    MOs and ECs. Through this IBS, the SFs (i.e., NFs and AFs) in the MOs and
    ECs can be configured and managed. Based on the proposed framework, both
    virtualized NFs and AFs can be efficiently orchestrated, also allowing agile
    resource reconfigurations and flexible updates.
    </t>
</section>

<section anchor="section:IANA-Considerations" title="IANA Considerations">
  <t>
    This document does not require any IANA actions.
  </t>
</section>

<section anchor="section:Security-Considerations" title="Security Considerations">
  <t>
    The same security considerations for the Interface to Network Security
    Functions (I2NSF) Framework <xref target="RFC8329" /> are applicable to the
    Intent-Based System this document.
  </t>

</section>

</middle>

<back>

<!-- START: Normative References -->
<references title="Normative References">

    <?rfc include="reference.RFC.6020"?>
    <?rfc include="reference.RFC.6241"?>
    <?rfc include="reference.RFC.7149"?>
    <?rfc include="reference.RFC.7950"?>
    <?rfc include="reference.RFC.8040"?>    
    <?rfc include="reference.RFC.8329"?>
    <?rfc include="reference.RFC.9315"?>
    <?rfc include="reference.RFC.9365"?>
    
</references>
<!-- END: Normative References -->

<!-- START: Informative References -->
<references title="Informative References">

    <?rfc include='reference.I-D.ietf-i2nsf-applicability'?>
    <?rfc include='reference.I-D.irtf-coinrg-coin-terminology'?>
    <?rfc include='reference.I-D.irtf-coinrg-use-cases'?>
    <?rfc include='reference.I-D.ietf-i2nsf-capability-data-model'?>
    <?rfc include='reference.I-D.ietf-i2nsf-registration-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-consumer-facing-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-nsf-facing-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-nsf-monitoring-data-model'?>
    <?rfc include='reference.I-D.lingga-i2nsf-analytics-interface-dm'?>
    <?rfc include='reference.I-D.jeong-i2nsf-security-management-automation'?>
    <?rfc include='reference.I-D.jeong-nmrg-ibn-network-management-automation'?>
    <?rfc include='reference.I-D.yang-i2nsf-security-policy-translation'?>

    <reference anchor="YAML">
        <front>
            <title>Yet Another Markup Language (YAML) 1.0</title>
            <author initials="B." surname="Ingerson" />
            <author initials="C." surname="Evans" />
            <author initials="O." surname="Ben-Kiki" />
            <date month="October" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://yaml.org/spec/history/2001-05-26.html" />
    </reference>

    <reference anchor="TS-23.501">
        <front>
            <title>System Architecture for the 5G System (5GS)</title>
            <author surname="3GPP TS 23.501 V18.3.0" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144" />
    </reference>

    <reference anchor="TS-28.312">
        <front>
            <title>Intent Driven Management Services for Mobile Networks</title>
            <author surname="3GPP TS 28.312 V18.1.1" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3554" />
    </reference>

    <reference anchor="TR-28.812">
        <front>
            <title>Study on Scenarios for Intent Driven Management Services for Mobile Networks</title>
            <author surname="3GPP TR 28.812 V17.1.0" />
            <date month="December" year="2020" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3553" />
    </reference>

    <reference anchor="TS-23.288">
        <front>
            <title>Architecture Enhancements for 5G System (5GS) to Support Network Data Analytics Services</title>
            <author surname="3GPP TS 23.288 V18.3.0" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3579" />
    </reference>

    <reference anchor="TS-29.520">
        <front>
            <title>Network Data Analytics Services</title>
            <author surname="3GPP TS 29.520 V18.3.0" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3355" />
    </reference>

    <reference anchor="ETSI-NFV">
        <front>
            <title>Network Functions Virtualisation (NFV); Architectural Framework</title>
            <author surname="ETSI GS NFV 002 V1.2.1" />
            <date month="December" year="2014" />
        </front>
        <seriesInfo name="Available:" value="https://www.etsi.org/deliver/etsi_gs/nfv/001_099/002/01.02.01_60/gs_nfv002v010201p.pdf" />
    </reference>

    <reference anchor="ETSI-NFV-Release-2">
        <front>
            <title>Network Functions Virtualisation (NFV) Release 2; 
            Management and Orchestration; Architectural Framework Specification</title>
            <author surname="ETSI GS NFV 006 V2.1.1" />
            <date month="January" year="2021" />
        </front>
        <seriesInfo name="Available:" value="https://www.etsi.org/deliver/etsi_gs/nfv/001_099/006/02.01.01_60/gs_nfv006v020101p.pdf" />
    </reference>

    <reference anchor="NFV-COIN">
        <front>
            <title>NFV-COIN: Unleashing The Power of In-Network Computing with Virtualization Technologies</title>
            <author initials="G." surname="Venancio" />
            <author initials="R." surname="Turchetti" />
            <author initials="E." surname="Duarte Jr." />
            <date month="December" year="2022" />
        </front>
        <seriesInfo name="SBC" value="Journal of Internet Services and Applications" />
        <seriesInfo name="Available:" value="https://journals-sol.sbc.org.br/index.php/jisa/article/view/2342" />
    </reference> 

    <reference anchor="REST">
        <front>
            <title>Principled Design of the Modern Web Architecture</title>
            <author initials="R." surname="Fielding" />
            <author initials="R." surname="Taylor" />
            <date month="May" year="2002" />
        </front>
        <seriesInfo name="ACM" value="Transactions on Internet Technology, Vol. 2, Issue 2," />
        <seriesInfo name="Available:" value="https://dl.acm.org/doi/10.1145/514183.514185" />
    </reference>

    <reference anchor="USENIX-ATC-Lumi">
        <front>
            <title>Hey, Lumi! Using Natural Language for Intent-Based Network Management</title>
            <author initials="A." surname="Jacobs" />
            <author initials="R." surname="Pfitscher" />
            <author initials="R." surname="Ribeiro" />
            <author initials="R." surname="Ferreira" />
            <author initials="L." surname="Granville" />
            <author initials="W." surname="Willinger" />
            <author initials="S." surname="Rao" />
            <date month="July" year="2021" />
        </front>
        <seriesInfo name="USENIX" value="Annual Technical Conference" />
        <seriesInfo name="Available:" value="https://www.usenix.org/conference/atc21/presentation/jacobs" />
    </reference>

    <reference anchor="BERT">
        <front>
            <title>BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding</title>
            <author initials="J." surname="Devlin" />
            <author initials="M." surname="Chang" />
            <author initials="K." surname="Lee" />
            <author initials="K." surname="Toutanova" />
            <date month="June" year="2019" />
        </front>
        <seriesInfo name="NAACL-HLT" value="Conference" />
        <seriesInfo name="Available:" value="https://aclanthology.org/N19-1423.pdf" />
    </reference>

    <reference anchor="Deep-Learning">
        <front>
            <title>Deep Learning</title>
            <author initials="I." surname="Goodfellow" />
            <author initials="Y." surname="Bengio" />
            <author initials="A." surname="Courville" />
            <date month="November" year="2016" />
        </front>
        <seriesInfo name="Publisher:" value="The MIT Press" />
        <seriesInfo name="Available:" value="https://www.deeplearningbook.org/" />
    </reference>

    <reference anchor="AUTOSAR-SDV">
        <front>
            <title>AUTOSAR Adaptive Platform</title>
            <author surname="AUTOSAR" />
            <date month="March" year="2024" />
        </front>
        <seriesInfo name="Available:" value="https://www.autosar.org/standards/adaptive-platform" />    
    </reference>

    <reference anchor="Eclipse-SDV">
        <front>
            <title>Eclipse Software Defined Vehicle Working Group Charter</title>
            <author surname="Eclipse" />
            <date month="March" year="2024" />
        </front>
        <seriesInfo name="Available:" value="https://www.eclipse.org/org/workinggroups/sdv-charter.php" />    
    </reference>

    <reference anchor="COVESA">
        <front>
            <title>Connected Vehicle Systems Alliance </title>
            <author surname="COVESA" />
            <date month="March" year="2024" />
        </front>
        <seriesInfo name="Available:" value="https://covesa.global/" />    
    </reference>

    <reference anchor="Kubernetes">
        <front>
            <title>Kubernetes: Cloud Native Computing Platform</title>
            <author surname="Kubernetes" />
            <date month="March" year="2024" />
        </front>
        <seriesInfo name="Available:" value="https://kubernetes.io/" />    
    </reference>

    <reference anchor="Survey-IBN-CST-2023">
        <front>
            <title>A Survey on Intent-Based Networking</title>
            <author initials="A." surname="Leivadeas" />
            <author initials="M." surname="Falkner" />
            <date month="March" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://ieeexplore.ieee.org/document/9925251" />    
    </reference>

    <reference anchor="ClickINC-Sigcomm-2023">
        <front>
            <title>ClickINC: In-network Computing as a Service in Heterogeneous Programmable Data-center Networks</title>
            <author initials="W." surname="Xu" />
            <author initials="Z." surname="Zhang" />
            <author initials="Y." surname="Feng" />
            <author initials="H." surname="Song" />
            <author initials="Z." surname="Chen" />
            <author initials="W." surname="Wu" />
            <author initials="G." surname="Liu" />
            <author initials="Y." surname="Zhang" />
            <author initials="S." surname="Liu" />
            <author initials="Z." surname="Tian" />
            <author initials="B." surname="Liu" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Publisher:" value="ACM SIGCOMM" />
        <seriesInfo name="Available:" value="https://dl.acm.org/doi/10.1145/3603269.3604835" />    
    </reference>

</references>
<!-- END: Informative References -->

<!-- START: Changes -->
<section title="Changes from draft-jeong-opsawg-i2inf-framework-01">
    <t> 
    The following changes are made from draft-jeong-opsawg-i2inf-framework-01:
    <list style="symbols">
        <t>
        The conents have been updated for further clarification.
        </t>
    </list>
    </t>
</section>
<!-- END: Changes -->

<!-- START: Acknowledgments -->
<section anchor="section:Acknowledgments" numbered="false" title="Acknowledgments">
    <t indent="0" pn="section-appendix.a-1">    
    This work was supported by Institute of Information &amp; Communications
    Technology Planning &amp; Evaluation (IITP) grant funded by the Korea
    Ministry of Science and ICT (MSIT) (No. RS-2024-00398199 and
    RS-2022-II221015).
    </t>
</section>
<!-- END: Acknowledgments -->

<!-- START: Contributors -->
<section anchor="section:Contributors" numbered="false" title="Contributors">
    <t indent="0" pn="section-appendix.b-1">
    This document is made by the group effort of OPWAWG, greatly benefiting 
    from inputs and texts by <contact fullname="Linda Dunbar"/> (Futurewei),
    <contact fullname="Yong-Geun Hong"/> (Daejeon University), and
    <contact fullname="Joo-Sang Youn"/> (Dong-Eui University).
    The authors sincerely appreciate their contributions.
    </t>

    <t indent="0" pn="section-appendix.b-2">  
    The following are coauthors of this document:
    </t>   

      <contact fullname="Mose Gu">
        <organization showOnFrontPage="true">Department of Computer Science &amp; Engineering</organization>
        <address>
          <postal>
            <extaddr>Sungkyunkwan University</extaddr>
            <street>2066 Seobu-Ro, Jangan-Gu</street>
            <city>Suwon</city>
            <region>Gyeonggi-Do</region>
            <code>16419</code>
            <country>Republic of Korea</country>
          </postal>
          <phone>+82 31 299 4106</phone>
          <email>rna0415@skku.edu</email>
          <uri>http://iotlab.skku.edu/people-Moses-Gu.php</uri>
        </address>
      </contact>
      <contact fullname="Juwon Hong">
        <organization showOnFrontPage="true">Department of Computer Science &amp; Engineering</organization>
        <address>
          <postal>
            <extaddr>Sungkyunkwan University</extaddr>
            <street>2066 Seobu-Ro, Jangan-Gu</street>
            <city>Suwon</city>
            <region>Gyeonggi-Do</region>
            <code>16419</code>
            <country>Republic of Korea</country>
          </postal>
          <phone>+82 31 299 4106</phone>
          <email>hongju2024@skku.edu</email>
          <uri>http://iotlab.skku.edu/people-Joo-Won-Hong.php</uri>
        </address>
      </contact>
      <contact fullname="Giovanni Venancio">
        <organization showOnFrontPage="true">Department of Informatics</organization>
        <address>
          <postal>
            <extaddr>Federal University of Parana</extaddr>
            <country>Brazil</country>
          </postal>
          <email>giovanni@inf.ufpr.br</email>
        </address>
      </contact>      
</section>
<!-- END: Contributors -->

</back>

<!-- <vspace blankLines="100"/> -->
<!-- page break to put addresses onto one page-->

</rfc>
