<?xml version="1.0" encoding="US-ASCII"?>
<!-- <?xml version="1.0" encoding="UTF-8"?> -->
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private)
-->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">


<?rfc toc="yes"?>
<?rfc rfcedstyle="yes"?>
<?rfc subcompact="no"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" category="info" docName="draft-jeong-nmrg-ibn-network-management-automation-01">

<front>
    <title abbrev="IBN Network Management Automation">
    Intent-Based Network Management Automation in 5G Networks
    </title>

    <author role="editor" initials="J." surname="Jeong" fullname="Jaehoon Paul Jeong">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science and Engineering
        </organization>

        <address>
            <postal>
                <street>Sungkyunkwan University</street>
                <street>2066 Seobu-Ro, Jangan-Gu</street>
                <city>Suwon</city> <region>Gyeonggi-Do</region>
                <code>16419</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 31 299 4957</phone>
            <facsimile>+82 31 290 7996</facsimile>
            <email>pauljeong@skku.edu</email>
            <uri>http://iotlab.skku.edu/people-jaehoon-jeong.php
         </uri>
        </address>
    </author>

    <author initials="J." surname="Kim" fullname="Jeonghyeon Kim">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science and Engineering
        </organization>
        <address>
            <postal>
                <street>Sungkyunkwan University</street>
                <street>2066 Seobu-Ro, Jangan-Gu</street>
                <city>Suwon</city>
                <region>Gyeonggi-Do</region>
                <code>16419</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 31 299 4957</phone>
            <email>jeonghyeon12@skku.edu</email>
        </address>
    </author>

    <author initials="Y." surname="Noh" fullname="Yongjun Noh">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science and Engineering
        </organization>
        <address>
            <postal>
                <street>Sungkyunkwan University</street>
                <street>2066 Seobu-Ro, Jangan-Gu</street>
                <city>Suwon</city>
                <region>Gyeonggi-Do</region>
                <code>16419</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 31 299 4957</phone>
            <email>n0y0j@g.skku.edu</email>
        </address>
    </author>

    <author initials="Y." surname="Kim" fullname="Younghan Kim">
        <organization abbrev="Soongsil University">
        School of Electronic Engineering
        </organization>

        <address>
            <postal>
                <street>Soongsil University</street>
                <street>369, Sangdo-ro, Dongjak-gu</street>
                <city>Seoul</city>
                <code>06978</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 10 2691 0904</phone>
            <email>younghak@ssu.ac.kr</email>
        </address>
    </author>

    <date month="April" day="24" year="2023" />

    <area>Networking</area>
    
    <workgroup>Network Management Research Group</workgroup>

<!-- [rfced] Please insert any keywords (beyond those that appear in
the title) for use on http://www.rfc-editor.org/rfcsearch.html. -->

<keyword>Internet-Draft</keyword>

    <abstract>
        <t>
        This document describes Network Management Automation (NMA) of
        cellular network services in 5G networks.  For NMA, 
        it proposes a framework empowered with Intent-Based Networking (IBN).
        The NMA in this document deals with a closed-loop network control,
        network policy translation, and network management audit.  To support
        these three features in NMA, it specifies an architectural framework
        with system components and interfaces. Also, this framework can
        support the use cases of NMA in 5G networks such as the data
        aggregation of Internet of Things (IoT) devices, network slicing,
        and the Quality of Service (QoS) in Vehicle-to-Everything (V2X).
        </t>
    </abstract>
</front>

<middle>

<section anchor="section:Introduction" title="Introduction">
    <t>
    5G networks are evolutionary mobile networks over 4G networks
    in terms of high speed, wide bandwidth, high frequency bands, massive
    device connectivity, low energy consumption, and intelligence.
    Especially, the intelligence will be a key feature to understand 
    the intents of users and automate network management fully.
    5G networks are designed and implemented on the experience from
    4G networks and new technologies which include Software-Defined
    Networking (SDN) <xref target="RFC7149" /> and Network Functions
    Virtualization (NFV) <xref target="ETSI-NFV" /><xref target="ETSI-NFV-Release-2" />
    along with mmWave for low delivery delay, high data speed, and large
    network capacity <xref target="TS-23.501" />.
    </t>
    
    <t>
    The support of network intelligence is one of the main goals of 5G
    networks.  The network intelligence can provide the 5G networks with
    Network Management Automation (NMA) for a self-driving network that
    optimizes and adjusts itself by minimizing the interaction with humans
    (e.g., network administrators and users).
    </t>
  
    <t>
    Intent-Based Networking (IBN) is a feasible approach that can provide
    the 5G networks with the NMA services <xref target="RFC9315" />
    <xref target="TS-28.312" /><xref target="TR-28.812" />.
    The concept of IBN enables a closed-loop network control architecture
    that can adapt to the current status of a target network by collecting
    and analyzing monitoring data from Network Service Functions (NSFs).
    NSFs can be either Virtual Network Functions (VNFs) or Physical Network
    Functions (PNFs) in cloud and edge computing environments.  
    In the 3rd Generation Partnership Project (3GPP), Network Data Analytics
    Function (NWDAF) is defined to collect and analyze monitoring data from
    multiple VNFs and PNFs in cellular networks 
    <xref target="TS-23.288" /><xref target="TS-29.520" />.
    </t>
 
    <t>
    For the intelligent NMA services, this document proposes an architectural
    framework that combines the IBN and NWDAF to the 5G networks with
    Artificial Intelligence (AI) and Machine Learning (ML). The framework
    allows an intent from either a network operator or user to be translated
    into a high-level policy through a Natural Language Processing (NLP)
    technique such as Lumi <xref target="USENIX-ATC-Lumi" />.
    The high-level policy is then translated into a low-level policy through
    a Policy Data Model Mapping and a Network Policy Translator (NPT) 
    <xref target="I-D.yang-i2nsf-security-policy-translation" />. 
    This low-level policy is used to remotely configure a network policy into
    appropriate VNFs or PNFs in order to enforce the commanded intent in a
    target network (e.g., 5G Networks).  Also, it also collects and
    analyzes the monitoring data from VNFs and PNFs such that the policy can
    be verified and optimized to satisfy the requests for the intent.
    </t>

    <t>
    Therefore, the NMA in this document deals with closed-loop network
    control, network policy translation, and network management audit.
    To support these three features in NMA, it specifies an architectural
    framework with system components and interfaces.  In addition, this
    framework can support the use cases of NMA in 5G networks such as
    the data aggregation of Internet of Things (IoT) devices, network
    slicing, and the Quality of Service (QoS) in Vehicle-to-Everything (V2X).
    Especially, this document shows a use case of IoT in 5G networks
    such as the data collection and analysis of IoT devices.
    </t>
</section>

<section anchor="section:Terminology" title="Terminology">
    <t>
      This document uses the terminology described in <xref target="RFC8329" />, 
      <xref target="I-D.ietf-i2nsf-applicability" />, and 
      <xref target="I-D.jeong-i2nsf-security-management-automation"/>.
      In addition, the following terms are defined below:
    </t>

    <t>
    <list style="symbols">
      <t>
        Network Management Automation (NMA): It means that a high-level
        network policy from a user (or administrator) is well-enforced in
        a target network system. The high-level network policy can be
        translated into the corresponding low-level network policy by a
        network policy translator and dispatched to appropriate NSFs.
        Through the monitoring of the NSFs, the activity and performace of
        the NSFs is monitored and analyzed. If needed, the network rules of
        the low-level network policy are augmented or new network rules are
        generated and configured to appropriate NSFs.
      </t>

      <t>
        Network Policy Translation (NPT): It means that a high-level network
        policy is translated to a low-level network policy that can be
        understood and configured by an NSF for a specific network service,
        such as the data aggregation of Internet of Things (IoT) devices,
        network slicing, and the Quality of Service (QoS) provisioning in
        Vehicle-to-Everything (V2X) communications.
      </t>

        <t>
        Feedback-Based Network Management (FNM): It means that a network
        service is evolved by updating a network policy (having network rules)
        and adding new network rules for detected network problems by
        processing and analzing the monitoring data of NSFs.
        </t>
    </list>
    </t>

    <figure anchor="figure:Network-Management-Automation-in-IBN-Framework"
     title="Network Management Automation in IBN Framework for 5G Networks">
            <artwork><![CDATA[
   +------------+
   |  IBN User  |
   +------------+
          ^
          | Consumer-Facing Interface
          v
+-------------------+     Registration     +-----------------------+
|   IBN Controller  |<-------------------->|  Vendor's Mgmt System |
+-------------------+      Interface       +-----------------------+
          ^      ^
          |      |
          |      |   Analytics Interface   +-----------------------+
          |      +------------------------>|  IBN Analyzer (NWDAF) |
          |                                +-----------------------+
          | NSF-Facing Interface              ^       ^       ^
          |                                   |       |       |
          |                                   |       |       |
          |    +------------------------------+       |       |
          |    |              +-----------------------+       |
          |    |              |   Monitoring Interface        |
          v    v              v                               v
   +---------------+  +---------------+        +---------------+
   |     NSF-1     |--|     NSF-2     |........|     NSF-n     |
   |(Policy Control|  | (Application  |        |  (IoT Device) |
   | Function, PCF)|  |  Function, AF)|        |               |
   +---------------+  +---------------+        +---------------+
            ]]></artwork>
    </figure>


</section>

<section anchor="section:Network-Management-Automation-in-IBN-Framework" title="Network Management Automation in IBN Framework for 5G Networks">

    <t>
      This section describes an IBN framework for 5G networks.  Note that
      this IBN Framework is based on the Framework for Interface to Network
      Security Functions (I2NSF) <xref target="RFC8329" /><xref target="I-D.jeong-i2nsf-security-management-automation"/>.
      As shown in <xref target="figure:Network-Management-Automation-in-IBN-Framework" />,
      an IBN User can use network functions by delivering high-level network policies,
      which specify network requirements that the IBN User wants to enforce, to
      the IBN Controller via the Consumer-Facing Interface (CFI).      
    </t>

   <section anchor="section:IBN-Framework-Components-for-Network-Management-Automation" title="Components with IBN Framework for Network Management Automation">
   <t>
   The following are the system components for the IBN framework for network management automation in 5G networks.
   </t>

   <t>
       <list style="symbols">
           <t>
           IBN User: An entity that delivers a high-level network policy to
           Security Controller. It is assumed that an intent in a natural
           language (e.g., English) can be translated into a high-level
           network policy through a Natural Language Processing (called NLP)
           technique (e.g., Lumi <xref target="USENIX-ATC-Lumi" />).
           </t>

           <t>
           IBN Controller: An entity that controls and manages other system
           components in the IBN framework. It translates a high-level network
           policy into the corresponding low-level network policy and selects
           appropriate NSFs to execute the network rules of the low-level network
           policy.
           </t>

           <t>
           Vendor's Management System (VMS): An entity that provides an image of
           of a virtualized NSF for a network service to the IBN framework, and
           registers the capability and access information of an NSF with IBN
           Controller.
           </t>

           <t>
           Network Service Function (NSF): An entity that is a Virtual Network
           Function (called VNF), Physical Network Function (called PNF) and
           Container Network Function (CNF), which is also called Cloud-native
           Network Function, for a specific network service such as the data
           aggregation of IoT devices, network slicing, and the QoS provisioning
           in V2X communications.
           </t>

           <t>
           IBN Analyzer: An entity that collects monitoring data from NSFs and
           analyzes such data for checking the activity and performance of the NSFs
           using machine learning techniques (e.g., Deep Learning <xref target="Deep-Learning" />).
           IBN Analyzer can be a Network Data Analytics Function (NWDAF) in 5G
           networks <xref target="TS-23.288" /><xref target="TS-29.520" />.
           If there is a suspicious network problem (e.g., traffic congestion and
           QoS degradation) for the target network or NSF, IBN Analyzer delivers a
           report of the augmentation or generation of network rules to IBN
           Controller.
           </t>
       </list>
   </t>

   <t>
     For IBN-based network services with Feedback-Based Network Management (FNM),
     IBN Analyzer is a key IBN component for the IBN framework 
     <xref target="RFC9315" /> <!-- <xref target="RFC9316" /> -->
     to collect monitoring data from NSFs and analyzing the monitoring data.
     The actual implementation of the analysis of monitoring data is out of
     the scope of this document.
   </t>

   </section>

   <section anchor="section:IBN-Interfaces" title="Interfaces for the IBN Framework">
   <t>
     The following are the interfaces for the IBN framework. Note that
     the interfaces can be modeled with YANG <xref target="RFC6020" /> and network
     policies are delivered through either RESTCONF <xref target="RFC8040" /> or
     NETCONF <xref target="RFC6241" />. In addition, according to 3GPP
     specifications, REST API <xref target="REST" /> can be supported for those
     interfaces.
   </t>

   <t>
     <list style="symbols">
          <t>
           Consumer-Facing Interface: An interface between IBN User and IBN
           Controller for the delivery of a high-level network policy
           <xref target="I-D.ietf-i2nsf-consumer-facing-interface-dm" />.
          </t>

          <t>
           NSF-Facing Interface: An interface between IBN Controller and an
           NSF for the delivery of a low-level network policy
           <xref target="I-D.ietf-i2nsf-nsf-facing-interface-dm" />.
          </t>

          <t>
           Registration Interface: An interface between a VMS and IBN Controller
           for the registration of an NSF's capability and access information with the
           IBN Controller or the query of an NSF for a required low-level network
           policy <xref target="I-D.ietf-i2nsf-registration-interface-dm" />.
          </t>

          <t>
           Monitoring Interface: An interface between an NSF and IBN Analyzer for
           collecting monitoring data from an NSF to check the activity and performance
           of an NSF for a possible network problem <xref target="I-D.ietf-i2nsf-nsf-monitoring-data-model" />.
          </t>

          <t>
           Analytics Interface: An interface between IBN Analyzer and IBN
           Controller for the delivery of an analytics report of the augmentation
           or generation of network rules to IBN Controller, which lets
           IBN Controller apply the report for network rules to its network
           policy management.
          </t>
     </list>
   </t>

   <t>
     For IBN-based network services with FSM, Analytics Interface is a key
     interface in the IBN framework to deliver an analytics report of the
     augmentation or generation of network rules to IBN Controller through
     the analysis of the monitoring data from NSFs.
   </t>

   </section>

</section>

<section anchor="section:Network-Policy-Translation" title="Network Policy Translation">
    <t>
    To facilitate Network Policy Translation (NPT), IBN Controller needs to
    have a network policy translator that performs the translation of a high-level
    network policy into the corresponding low-level network policy.
    For the automatic NPT services, the IBN framework needs to bridge a high-level
    YANG data model and a low-level YANG data model in an automatic manner
    <xref target="I-D.yang-i2nsf-security-policy-translation" />.
    Note that a high-level YANG data model is for the IBN Consumer-Facing Interface,
    and a low-level YANG data model is for the IBN NSF-Facing Interface.
    </t>

  <t>
    <xref target="figure:Automatic-Data-Model-Mapping" /> shows automatic
    mapping of high-level and low-level data models for network policies. 
    Automatic Data Model Mapper takes a high-level YANG data module for the
    Consumer-Facing Inteface and a low-level YANG data module for the
    NSF-Facing Interface. It then constructs a mapping table associating
    the data attributes (or variables) of the high-level YANG data module
    with the corresponding data attributes (or variables) of the low-level
    YANG data module. Also, it generates a set of production rules of the
    grammar for the construction of an XML file of low-level network policy
    rules.
  </t>

  <t>
    <xref target="figure:High-to-Low-Network-Policy-Translation" /> shows
    the procedure of high-to-low network policy translation. A network
    policy translator is a component of IBN Controller. The translator
    consists of three components such as Policy Data Model Mapper, Policy
    Data Extractor, Policy Data Converter, and Policy Generator.

    <figure anchor="figure:Automatic-Data-Model-Mapping" title="Automatic Mapping of High-level and Low-level Data Models">
            <artwork><![CDATA[

       High-level YANG Data Module   Low-level YANG Data Model
                   |                              |
                   V                              V
         +---------+------------------------------+---------+
         |             Policy Data Model Mapper             |
         +------------------------+-------------------------+
                                  |                                  
               Mapping Model (Data Model Mapping Table)
                                  |
                                  V
         +--------------------------------------------------+
         |                  NSF Database                    |
         +--------------------------------------------------+
            ]]></artwork>
  </figure>

    <figure anchor="figure:High-to-Low-Network-Policy-Translation" title="High-to-Low Network Policy Translation">
            <artwork><![CDATA[
  +-------------------------------------------------+
  |                                                 |
  |                     IBN User                    |
  |                                                 |
  +------------------------+------------------------+
                           | Consumer-Facing Interface
                           |
               High-level Network Policy
                           |
       IBN Controller      V
+--------------------------+-----------------------------------------------+
|         Network Policy   |                                               |
|         Translator       V                                               |
|  +-----------------------+--------------------------------------------+  |
|  |                       |                                            |  |
|  |                       V                                            |  |
|  |       +---------------+-------+      +--------------------------+  |  |
|  |       | Policy Data Extractor |      | Policy Data Model Mapper |  |  |
|  |       +---------------+-------+      +--------+-----------------+  |  |
|  |                       |                       | Mapping            |  |
|  |                       V                       V Model              |  |
|  |       +---------------+-------+      +--------------------+        |  |
|  |       | Policy Data Converter |<---->|    NSF Database    |        |  |
|  |       +---------------+-------+      +--------------------+        |  |
|  |                       |                                            |  |
|  |                       V                                            |  |
|  |       +---------------+-------+                                    |  |
|  |       |    Policy Generator   |                                    |  |
|  |       +---------------+-------+                                    |  |
|  |                       |                                            |  |
|  |                       V                                            |  |
|  +-----------------------+--------------------------------------------+  |
|                          |                                               |
|                          V                                               |
+--------------------------+-----------------------------------------------+
                           |  NSF-Facing Interface
                           |
                Low-level Network Policy
                           |
                           V
  +------------------------+-------------------------+
  |                                                  |
  |                      NSF(s)                      |
  |                                                  |
  +--------------------------------------------------+
            ]]></artwork>
  </figure>

    </t>

  <t>
    Policy Data Model Mapper maps the attributes and their values of a
    high-level network policy to the corresponding attributes and their
    values of a low-level network policy. Note that the values of a high-level
    network policy may involve a human language and must be converted
    to an appropriate value for a low-level network policy (e.g.,
    employees -> 192.0.1.0/24).
  </t>

  <t>
    Policy Data Extractor extracts the values of the attributes related to
    a network policy from a high-level network policy that was delivered by
    an IBN User to an IBN Controller through the Consumer-Facing Interface
    <xref target="I-D.ietf-i2nsf-consumer-facing-interface-dm" />.
  </t>

  <t>
    Policy Data Converter converts the values of the high-level policy's
    attributes into the values of the corresponding low-level policy's
    attributes to generate the low-level network policy 
    <xref target="I-D.ietf-i2nsf-nsf-facing-interface-dm" />.
  </t>

  <t>
    Policy Generator generates the corresponding low-level network policy
    that is delivered by the IBN Controller to an appropriate NSF through
    NSF-Facing Interface <xref target="I-D.ietf-i2nsf-nsf-facing-interface-dm" />.
  </t>

</section>

<section anchor="section:Network-Audit-System" title="Network Audit System">
  <t>
    The IBN framework is weak to both an insider attack and a supply chain attack
    since it trusts in NSFs provided by VMS and assumes that NSFs work for their
    network services appropriately <xref target="I-D.ietf-i2nsf-applicability" />.
  </t>
  
  <t>
    To detect the malicious activity of either an insider attack by a malicious 
    VMS or a supply chain attack by a compromised VMS, a network audit 
    system is required by the IBN framework.  This network audit system can
    facilitate the non-repudiation of configuration commands and monitoring data
    generated in the IBN framework.
  </t>

  <t>
  A network audit system has the following four main objectives: 
   <list style="symbols">
     <t> To check the existence of a network policy, a management system, and
         its procedures; </t>
     <t> To identify and understand the existing vulnerabilities and risks of
         either an insider attack or a supply chain attack; </t>
     <t> To review existing network controls on operational and administrative
         issues; </t>
     <t> To provide recommendations and corrective actions to IBN Controller
         for further network and security improvement. </t>
   </list>
  </t>

  <figure anchor="figure:Activity-Auditing-with-Network-Audit-System" title="Activity Auditing with Network Audit System">
          <artwork><![CDATA[
+-----------------------------+                   +----------------+
|           IBN User          |                   |  Vendor's Mgmt | 
|                             +------------+      |     System     |
+--------------+--------------+            |      +--------+-------+
               | Consumer-Facing Interface |               |
               |                           |  Remote       |
   High-level Security Policy              |  Attestation  |
               |                           |  Interface    |
               |                           |               |
               V                           |               V
+--------------+--------------+            |     +---------+--------+
|                             |            V     |      Network     |
|        IBN Controller       +------------+---->|       Audit      |
|                             |            ^     |      System      |
+--------------+--------------+            |     +---------+--------+
               |  NSF-Facing Interface     |               ^
               |                           |  Remote       |
   Low-level Security Policy               |  Attestation  |
               |                           |  Interface    |
               V                           |               |
+--------------+--------------+            |      +--------+-------+
|            NSF(s)           +------------+      |  IBN Analyzer  | 
|                             +------------------>|                |
+-----------------------------+    Monitoring     +----------------+ 
                                   Interface
       ]]></artwork>
</figure>

  <t>
    <xref target="figure:Activity-Auditing-with-Network-Audit-System" />
    shows activity auditing with a network audit system in the IBN
    framework. All the components in the IBN framwork report its
    activities (such as configuration commands and monitoring data)
    to Network Audit System as transactions through Remote Attestation 
    Interface <xref target="I-D.yang-i2nsf-remote-attestation-interface-dm"/>.  
    The network audit system can analyze the reported activities from the
    IBN components to detect malicious activities such as an insider attack
    and a supply chain attack.
    Note that such a network audit system can be implemented by remote
    attestation <xref target="I-D.ietf-rats-architecture"/><xref target="I-D.yang-i2nsf-remote-attestation-interface-dm"/>
    or Blockchain <xref target="Bitcoin"/>.  The details of the implementation
    of the network audit system are out of the scope of this document.
  </t>
  
  <t>
    In order to determine a minimum set of controls required to reduce the
    risks from either an insider attack or a supply chain attack, the network
    audit system should analyze the activities of all the components in the
    IBN framework periodically, evaluate possible risks, and take an action
    to such risks since vulnerabilities and threats may change in
    different environments over time.
  </t>
</section>

<section anchor="section:IoT-Device-Data-Aggregation" title="A Use Case of IoT Device Data Aggregation">
  <t>
  This section describes a use case where a policy of IoT device data
  aggregation is set up in the IBN framework for 5G networks.
  </t>

  <t>
  <xref target="figure:Procedure-of-IoT-Device-Data-Aggregation-Policy-Enforcement"/>
  shows the procedure of the enforcement for an IoT device data aggregation
  policy in the IBN Framework as follows:
  <list style="numbers">
    <t>
    IBN User sends a High-level Policy Request to IBN Controller.
    </t>

    <t>
    IBN Controller translates the request with its Network Policy Translator
    (called NPT).  The NPT identifies NSFs (i.e., IoT Devices) for the
    request after the steps of Policy Data Extraction and Policy Data
    Conversion.
    </t>

    <t>
    If the NSFs are available for the requested network policy, go to the step
    of Policy Generation in NPT.
    If the NSFs are unavailable for the requested network policy, go to the
    next step.    
    </t>

    <t>
    IBN Controller sends an NSF Query Request to Vendor's Management System
    (called VMS) to find an appropriate NSF for the request network policy.
    </t>

    <t>
    If there is such an NSF registered with VMS, VMS sends an NSF
    Initializtion Request to Cloud (or Edge Server) to initialize the NSF.
    </t>

    <t>
    Cloud (or Edge Server) forwards  the NSF Initializtion Request to the
    appropriate NSF to let it initialize itself.
    </t>

    <t>
    The NSF performs an initialization to perform a task for a network policy
    in 5G networks.
    </t>

    <t>
    The NSF sends an NSF Initialization Response to Cloud (or Edge Server)
    to tell Cloud (or Edge Server) its readiness to perform a task.
    </t>

    <t>
    Cloud (or Edge Server) forwards the NSF Initialization Response to VMS
    to tell an NSF's readiness to perform a task.
    </t>

    <t>
    VMS sends an NSF Query Response to IBN Controller to tell an NSF's
    readiness to perform a task along with the network access information for
    the NSF.
    </t>

    <t>
    IBN Controller performs the step of Policy Generation in its NPT along
    with the network access information of an appropriate NSF(s).
    </t>

    <t>
    IBN Controller sends a Low-level Policy Request to the appropriate NSF.
    </t>

    <t>
    The NSF performs the configration in the given Low-level Policy Request
    to perform the requested task (e.g., sensing and reporting).
    </t>

    <t>
    The NSF sends a Low-level Policy Response to IBN Controller to tell its
    readiness to perform the requested task.
    </t>
  </list>
  </t>

   <figure anchor="figure:Procedure-of-IoT-Device-Data-Aggregation-Policy-Enforcement"
    title="Procedure of an IoT Device Data Aggregation Policy Enforcement in the IBN Framework">
            <artwork><![CDATA[
IBN             IBN             Vendor's           Cloud              NSF1
User         Controller       Mgmt System    (or Edge Server)    (IoT Device)
 |               |                 |                 |                 | 
 |-High-level--->|                 |                 |                 | 
 | Policy Request|                 |                 |                 | 
 |               |                 |                 |                 | 
 |          Translation:           |                 |                 | 
 |        Data Extraction &        |                 |                 |
 |        Data Conversion          |                 |                 | 
 |               |                 |                 |                 | 
 |*** Case 1: NSFs available: Go to Policy Generation ***              | 
 |               |                 |                 |                 | 
 |*** Case 2: NSFs unavailable (START) ***           |                 | 
 |               |                 |                 |                 | 
 |               |-NSF Query------>|                 |                 | 
 |               | Request         |-NSF Initiation->|                 |
 |               |                 | Request         |                 |
 |               |                 |                 |-NSF Initiation->|
 |               |                 |                 | Request         |
 |               |                 |                 |                 | 
 |               |                 |                 |                NSF 
 |               |                 |                 |         Initialization
 |               |                 |                 |                 | 
 |               |                 |                 |<-NSF Initiation-|
 |               |                 |<-NSF Initiation-|  Response       |
 |               |<-NSF Query------|  Response       |                 | 
 |               |  Response       |                 |                 |
 |               |                 |                 |                 | 
 |*** Case 2: NSFs unavailable (END) ***             |                 | 
 |               |                 |                 |                 | 
 |          Translation:           |                 |                 | 
 |       Policy Generation         |                 |                 | 
 |               |                 |                 |                 | 
 |               |--Low-level Policy Request-------------------------->|
 |               |                 |                 |                 | 
 |               |                 |                 |                NSF
 |               |                 |                 |          Configuration
 |               |                 |                 |                 | 
 |               |<-Low-level Policy Response--------------------------| 
 |               |                 |                 |                 | 
            ]]></artwork>
    </figure>

      <t>
      <xref target="figure:Procedure-of-IoT-Device-Data-Aggregation-Reporting"/> 
      shows the procedure of the reporting for IoT device data aggregation in
      the IBN Framework as follows:
      </t>

      <list style="numbers">
        <t>
        NSF1 (as an IoT Device) sends its Sensing Data to IBN Analyzer
        (as an NWDAF).
        </t>

        <t>
        NSF2 (as an IoT Device) sends its Sensing Data to IBN Analyzer
        (as an NWDAF).
        </t>

        <t>
        IBN Analyzer performs Sensing Data Aggregation and analyzes the
        aggregated sensing data through Machine Learning (ML) techniques.
        It then generates a Sensing Report for IBN Controller.
        </t>

        <t>
        IBN Analyzer sends a Sensing Report to IBN Controller.
        </t>

        <t>
        IBN Controller analyzes the Sensing Report for a further action.
        If a further action is needed, it updates the existing network policy
        or generates a new network policy.
        </t>

        <t>
        IBN Controller sends the report for the further action to IBN User
        optionally if the reporting is needed.
        </t>

        <t>
        For the further action, IBN Controller sends an Updated NSF Policy
        Request or a New NSF Policy Request to the appropriate NSF(s).
        </t>

        <t>
        The appropriate NSF(s) reconfigures the Updated NSF Policy or
        configures the new NSF Policy in its own system.
        </t>

        <t>
        The appropriate NSF(s) sends an Updated NSF Policy Response
        or a NEW NSF Policy Response to IBN Controller.
        </t>
      </list>

       <figure anchor="figure:Procedure-of-IoT-Device-Data-Aggregation-Reporting"
        title="Procedure of IoT Device Data Aggregation Reporting in the IBN Framework">
            <artwork><![CDATA[
IBN             IBN               IBN               NSF1              NSF2
User         Controller         Analyzer       (IoT Device)      (IoT Device)
 |               |                 |                 |                 | 
 |               |                 |<----Sensing-----|                 | 
 |               |                 |     Data        |                 | 
 |               |                 |                 |                 | 
 |               |                 |<----Sending-----------------------| 
 |               |                 |     Data        |                 | 
 |               |                 |                 |                 | 
 |               |              Sensing              |                 | 
 |               |               Data                |                 |
 |               |            Aggregation            |                 |
 |               |                 |                 |                 | 
 |               |<---Sensing------|                 |                 | 
 |               |    Report       |                 |                 |
 |               |                 |                 |                 | 
 |             Policy              |                 |                 |
 |             Update              |                 |                 |
 |        (or Generation)          |                 |                 |
 |               |                 |                 |                 | 
 |<---Report-----|                 |                 |                 |
 |               |--Updated/New Low-level Policy Request-------------->|
 |               |                 |                 |                 |
 |               |                 |                 |                NSF
 |               |                 |                 |      (Re)Configuration
 |               |                 |                 |                 |
 |               |<-Updated/New Low-level Policy Response--------------| 
 |               |                 |                 |                 |
            ]]></artwork>
    </figure>

</section>

<section anchor="section:IANA-Considerations" title="IANA Considerations">
  <t>
    This document does not require any IANA actions.
  </t>
</section>

<section anchor="section:Security-Considerations" title="Security Considerations">
  <t>
    The same security considerations for the IBN framework
    <xref target="RFC8329" /> are applicable to this document.
  </t>
  <t>
    The development and introduction of IBN Analyzer and Network Audit
    System in the IBN Framework may create new security concerns that
    have to be anticipated at the design and specification time.  The usage
    of machine learning to analyze monitoring data of malicious NSFs may add a
    risk to its model to be attacked (e.g., adversarial attack) and can result
    in a bad security policy that is deployed into the IBN system.
  </t>
</section>

</middle>

<back>

<!-- START: Normative References -->
<references title="Normative References">

    <?rfc include="reference.RFC.6020"?>
    <?rfc include="reference.RFC.6241"?>
    <?rfc include="reference.RFC.8040"?>    
    <?rfc include="reference.RFC.8329"?>
    <?rfc include="reference.RFC.9315"?>
    <!-- <?rfc include="reference.RFC.9316"?> -->
    
</references>
<!-- END: Normative References -->

<!-- START: Informative References -->
<references title="Informative References">

    <?rfc include='reference.I-D.ietf-i2nsf-consumer-facing-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-nsf-facing-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-registration-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-nsf-monitoring-data-model'?>    
    <?rfc include='reference.I-D.ietf-i2nsf-applicability'?>
    <?rfc include='reference.I-D.jeong-i2nsf-security-management-automation'?>
    <?rfc include='reference.I-D.yang-i2nsf-security-policy-translation'?>
    <?rfc include='reference.I-D.ietf-rats-architecture'?>
    <?rfc include='reference.I-D.yang-i2nsf-remote-attestation-interface-dm'?>

    <reference anchor="TS-23.501">
        <front>
            <title>System Architecture for the 5G System (5GS)</title>
            <author surname="3GPP TS 23.501 V17.6.0" />
            <date month="September" year="2022" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144" />
    </reference>

    <reference anchor="TS-28.312">
        <front>
            <title>Intent Driven Management Services for Mobile Networks</title>
            <author surname="3GPP TS 28.312 V17.1.1" />
            <date month="September" year="2022" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3554" />
    </reference>

    <reference anchor="TR-28.812">
        <front>
            <title>Study on Scenarios for Intent Driven Management Services for Mobile Networks</title>
            <author surname="3GPP TR 28.812 V17.1.0" />
            <date month="December" year="2020" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3553" />
    </reference>

    <reference anchor="TS-23.288">
        <front>
            <title>Architecture Enhancements for 5G System (5GS) to Support Network Data Analytics Services</title>
            <author surname="3GPP TS 23.288 V17.6.0" />
            <date month="September" year="2022" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3579" />
    </reference>

    <reference anchor="TS-29.520">
        <front>
            <title>Network Data Analytics Services</title>
            <author surname="3GPP TS 29.520 V17.8.0" />
            <date month="September" year="2022" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3355" />
    </reference>

    <reference anchor="RFC7149">
        <front>
            <title>Software-Defined Networking: A Perspective from within a Service Provider Environment</title>
            <author initials="M." surname="Boucadair" />
            <author initials="C." surname="Jacquenet" />
            <date month="March" year="2014" />
        </front>
        <seriesInfo name="RFC" value="7149" />
    </reference>

    <reference anchor="ETSI-NFV">
        <front>
            <title>Network Functions Virtualisation (NFV); Architectural Framework</title>
            <author surname="ETSI GS NFV 002 V1.2.1" />
            <date month="December" year="2014" />
        </front>
        <seriesInfo name="Available:" value="https://www.etsi.org/deliver/etsi_gs/nfv/001_099/002/01.02.01_60/gs_nfv002v010201p.pdf" />
    </reference>

    <reference anchor="ETSI-NFV-Release-2">
        <front>
            <title>Network Functions Virtualisation (NFV) Release 2; 
            Management and Orchestration; Architectural Framework Specification</title>
            <author surname="ETSI GS NFV 006 V2.1.1" />
            <date month="January" year="2021" />
        </front>
        <seriesInfo name="Available:" value="https://www.etsi.org/deliver/etsi_gs/nfv/001_099/006/02.01.01_60/gs_nfv006v020101p.pdf" />
    </reference>

    <reference anchor="Bitcoin">
        <front>
            <title>Bitcoin: A Peer-to-Peer Electronic Cash System</title>
            <author initials="S." surname="Nakamoto" />
            <date month="May" year="2009" />
        </front>
        <seriesInfo name="Available:" value="https://bitcoin.org/bitcoin.pdf" />
    </reference>

   <reference anchor="USENIX-ATC-Lumi">
        <front>
            <title>Hey, Lumi! Using Natural Language for Intent-Based Network Management</title>
            <author initials="A." surname="Jacobs" />
            <author initials="R." surname="Pfitscher" />
            <author initials="R." surname="Ribeiro" />
            <author initials="R." surname="Ferreira" />
            <author initials="L." surname="Granville" />
            <author initials="W." surname="Willinger" />
            <author initials="S." surname="Rao" />
            <date month="July" year="2021" />
        </front>
        <seriesInfo name="USENIX" value="Annual Technical Conference" />
    <seriesInfo name="Available:" value="https://www.usenix.org/conference/atc21/presentation/jacobs" />
    </reference>

   <reference anchor="REST">
        <front>
            <title>Principled Design of the Modern Web Architecture</title>
            <author initials="R." surname="Fielding" />
            <author initials="R." surname="Taylor" />
            <date month="May" year="2002" />
        </front>
        <seriesInfo name="ACM" value="Transactions on Internet Technology, Vol. 2, Issue 2," />
    <seriesInfo name="Available:" value="https://dl.acm.org/doi/10.1145/514183.514185" />
    </reference>

    <reference anchor="Deep-Learning">
        <front>
            <title>Deep Learning</title>
            <author initials="I." surname="Goodfellow" />
            <author initials="Y." surname="Bengio" />
            <author initials="A." surname="Courville" />
            <date month="November" year="2016" />
        </front>
        <seriesInfo name="Publisher:" value="The MIT Press" />
    <seriesInfo name="URL:" value="https://www.deeplearningbook.org/" />
    </reference>

</references>
<!-- END: Informative References -->

<section anchor="section:Acknowledgments" title="Acknowledgments">
    <t>
    This work was supported by Institute of Information &amp; Communications
    Technology Planning &amp; Evaluation (IITP) grant funded by the Korea
    Ministry of Science and ICT (MSIT)(No. 2022-0-01015, Development of
    Candidate Element Technology for Intelligent 6G Mobile Core Network).
    </t>

    <t>
    This work was supported in part by Institute of Information &amp;
    Communications Technology Planning &amp; Evaluation (IITP) grant
    funded by the Korea Ministry of Science and ICT (MSIT) (No. 2022-0-01199,
    Regional strategic industry convergence security core talent training
    business).
    </t>
</section>

<section anchor="section:Contributors" title="Contributors">
    <t>
    This document is made by the group effort of NMRG.
    Many people actively contributed to this document, such as Linda Dunbar,
    Yoav Nir, Susan Hares, and Qin Wu.
    The authors sincerely appreciate their contributions.
    </t>
    <t> The following are co-authors of this document: </t>
        <t>
        Patrick Lingga - 
        Department of Electronic, Electrical and Computer Engineering,
        Sungkyunkwan University,
        2066 Seobu-Ro Jangan-Gu,
        Suwon, Gyeonggi-do 16419,
        Republic of Korea.
        EMail: patricklink@skku.edu
        </t>

        <t>
        Jung-Soo Park - 
        Electronics and Telecommunications Research Institute,
        218 Gajeong-Ro, Yuseong-Gu,
        Daejeon, 34129,
        Republic of Korea. 
        EMail: pjs@etri.re.kr
        </t>

        <t>
        Yunchul Choi - 
        Electronics and Telecommunications Research Institute,
        218 Gajeong-Ro, Yuseong-Gu,
        Daejeon, 34129,
        Republic of Korea. 
        EMail: cyc79@etri.re.kr
        </t>

</section>

<section title="Changes from draft-jeong-nmrg-ibn-network-management-automation-00">
    <t>
    The following changes are made from draft-jeong-nmrg-ibn-network-management-automation-00:
    <list style="symbols">
      <t>
      There is an update of the author list.
      </t>

      <t>
      There are updates in the References.
      </t>
    </list>
    </t>
</section>

</back>

<!-- <vspace blankLines="100"/> -->
<!-- page break to put addresses onto one page-->

</rfc>
