<?xml version="1.0" encoding="US-ASCII"?>
<!-- <?xml version="1.0" encoding="UTF-8"?> -->
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private)
-->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">


<?rfc toc="yes"?>
<?rfc rfcedstyle="yes"?>
<?rfc subcompact="no"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" category="info" docName="draft-park-nmrg-ibn-network-management-srv6-00">

<front>
    <title abbrev="IBN Network Management">
    Intent-Based Network Management in SRv6 network
    </title>

    <!-- add 'role="editor"' below for the editors if appropriate -->
    <!-- Another author who claims to be an editor -->
    <author fullname="Jungsoo Park" role="editor" surname="Park">
      <organization abbrev="ETRI">Electronics and Telecommunications Research Institute</organization>
      <address>
        <postal>
          <street>218 Gajeongno, Yuseung-gu</street>
          <city>Daejeon</city>
          <region/>
          <code>34129</code>
          <country>Republic of Korea</country>
        </postal>
        <phone>+82 42 860 6514</phone>
        <facsimile>+82 42 861 5404</facsimile>
        <email>pjs@etri.re.kr</email>
      </address>
    </author>

    <author fullname="Yunchul Choi" surname="Choi">
      <organization abbrev="ETRI">Electronics and Telecommunications Research Institute</organization>
      <address>
        <postal>
          <street>218 Gajeongno, Yuseung-gu</street>
          <city>Daejeon</city>
          <region/>
          <code>34129</code>
          <country>Republic of Korea</country>
        </postal>
        <phone>+82 42 860 5978</phone>
        <facsimile>+82 42 861 5404</facsimile>
        <email>cyc79@etri.re.kr</email>
      </address>
    </author>

    <author initials="J." surname="Jeong" fullname="Jaehoon Paul Jeong">
        <organization abbrev="Sungkyunkwan University">
        Department of Computer Science and Engineering
        </organization>

        <address>
            <postal>
                <street>Sungkyunkwan University</street>
                <street>2066 Seobu-Ro, Jangan-Gu</street>
                <city>Suwon</city> <region>Gyeonggi-Do</region>
                <code>16419</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 31 299 4957</phone>
            <facsimile>+82 31 290 7996</facsimile>
            <email>pauljeong@skku.edu</email>
            <uri>http://iotlab.skku.edu/people-jaehoon-jeong.php
         </uri>
        </address>
    </author>

    <date month="July" day="10" year="2023" />

    <area>Networking</area>
    
    <workgroup>Network Management Research Group</workgroup>

<!-- [rfced] Please insert any keywords (beyond those that appear in
the title) for use on http://www.rfc-editor.org/rfcsearch.html. -->

<keyword>Internet-Draft</keyword>

  <abstract>
    <t>
      This document describes secure network management 
      in Segment Routing version six (SRv6) network. 
      It proposes a framework empowered with Intent-Based Networking (IBN).
      The Intent-based Network Management (IBNM) in this document deals with 
      a closed-loop network control, network policy translation, and network management audit.  
      To support these three features, it specifies an architectural framework
      with system components and interfaces. Also, this framework can
      support the use cases in SRv6 network.
    </t>
  </abstract>
</front>

<middle>

<section anchor="section:Introduction" title="Introduction">
  <t>
    Interface to Network Security Functions (I2NSF) defines a framework
    and interfaces for interacting with Network Security Functions (NSFs)
    <xref target="RFC8192" /><xref target="RFC8329" />.
    Note that an NSF is defined as software that provides a set of
    security-related services, such as (i) detecting unwanted activity,
    (ii) blocking or mitigating the effect of such unwanted activity
    in order to fulfill service requirements, and (iii) supporting
    communication stream integrity and confidentiality <xref target="RFC8329" />.
    Th e NSF can be implemented as a Virtual Network Function (VNF) in
    a Network Functions Virtualization (NFV) environment <xref target="ETSI-NFV" /><xref target="I-D.ietf-i2nsf-applicability" />.
  </t>
    
  <t>
    The term "intent" is defined as "an abstract, high-level policy used
    to operate the network" in the context of autonomic networks <xref target="RFC7575"/>.  
    According to this definition, an intent is a specific type of policy provided by a user to provide
    guidance to the autonomic network that would otherwise operate
    without human intervention.
  </t>
  
  <t>
    Intent-Based Networking (IBN) Management (IBNM) aims to lead towards networks that are
    fundamentally simpler to manage and operate, requiring only minimal
    outside intervention.  
    The IBNM supports a closed-loop network control architecture
    that can adapt to the current status of a target network by collecting
    and analyzing monitoring data from Network Service Functions (NSFs) of I2NSF framework.
    NSFs can be either Virtual Network Functions (VNFs) or Physical Network
    Functions (PNFs) in cloud and edge computing environments.
  </t>

  <t> 
   Segment Routing (SR) <xref target="RFC8402"/> allows a node to steer a packet flow
   along any path.  The headend (i.e., ingress router) is a node where the instructions for
   source routing (i.e., segments) are written into the packet.  It
   hence becomes the starting node for a specific segment routing path.
   Intermediate per-path states are eliminated thanks to source routing.
   <xref target="RFC8754"/> and <xref target="RFC8986"/> describe the same for Segment Routing over IPv6 (SRv6) with
   the use of the Segment Routing Header (SRH).
   </t>
   
   <t>
   Therefore, the instructions for source routing is made by a Segment Routing Policy (SR Policy) <xref target="RFC8402"/>. 
   The SR policy is an ordered list of segments and come from the Intent, which is given by users (i.e., network operators).
   According to the Intent, IBNM will support several funtionalities.    
  </t>

</section>

<section anchor="section:Terminology" title="Terminology">
    <t>
      This document uses the terminology described in <xref target="RFC8329" />, 
      <xref target="I-D.ietf-i2nsf-applicability" />,  
      <xref target="I-D.jeong-i2nsf-security-management-automation"/>, and
      <xref target="I-D.jeong-nmrg-ibn-network-management-automation"/>.
      In addition, the following terms are defined below:
    </t>

    <t>
    <list style="symbols">
      <t>
        Autonomous Network Management (ANM): It means that an intent 
        from a user (or administrator or network operator) is well-enforced in
        a target SRv6 network. The intent can be aligned with high-level network policy
        and then high-level network policy can be translated into the corresponding low-level network 
        policy (including SRv6 Policy) by a
        network policy translator and dispatched to appropriate NSFs.
        Through the monitoring of the NSFs, the activity and performace of
        the NSFs is monitored and analyzed whether or not NSFs are operating well 
        according to the intent of the users. If needed, the network rules of
        the low-level network and SRv6 policy are augmented or new network rules are
        generated and configured to appropriate NSFs.
      </t>

      <t>
        Network Policy Translation (NPT): It means that a high-level network policy
        is translated to a low-level network policy (including SRv6 policy) that can be
        understood and configured by an NSF for autonomous network services,
        such as self-configuration, self-optimization, self-healing, and 
        self-protection.
      </t>

        <t>
        Feedback-Based Network Management (FNM): It means that a network
        service in SRv6 network is evolved by updating a network policy (i.e., a set of network rules) 
        and adding new network rules for resolving network problems, which were detected by
        monitoring and analzing data from NSFs.
        </t>
    </list>
    </t>

    <figure anchor="figure:IBNM-in-SRv6-Network"
     title="Intent based Network Management in SRv6 Network">
            <artwork><![CDATA[
   +-------------+                   +-----------------------------+
   |  IBN User   |                   | Global Distributed Database |
   +-------------+                   +-----------------------------+
          ^                                                     ^
          | Consumer-Facing                    Software Update  |
          | Interface                            Interface (Up) | 
          v                                                     v
+-------------------+     Registration     +-----------------------+
|   IBN Controller  |<-------------------->|  Vendor's Mgmt System |
+-------------------+      Interface       +-----------------------+
          ^      ^                                            ^
          |      |                  Software Update Interface |
          |      |                                     (Down) |
          |      |   Analytics Interface   +----------------+ |
          |      +------------------------>|  IBN Analyzer  | |
          |                                +----------------+ |
          | NSF-Facing Interface                   ^          |
          |                                        |          |
          |                  +---------------------+          |
          |                  |  Monitoring Interface          |
          |                  |                                |
+---------+------------------+--------------------------------+----+ 
|         v                  v         SRv6 Nodes             v    |
|  +---------------+  +---------------+         +---------------+  |
|  |     NSF-1     |--|     NSF-2     | ....... |     NSF-n     |  |
|  |(Policy Control|  | (Monitoring   |         | (Application  |  |
|  | Function, PCF)|  |  Function, MF)|         | Function, AF) |  |
|  +---------------+  +---------------+         +---------------+  |
+------------------------------------------------------------------+
            ]]></artwork>
    </figure>


</section>

<section anchor="section:Intent-based-Network-Management-in-SRv6-Network" title="Intent based Network Management in SRv6 Network">

    <t>
      This section describes an IBNM framework in SRv6 network.  Note that
      this IBNM Framework is based on the Framework for Interface to Network
      Security Functions (I2NSF) <xref target="RFC8329" /><xref target="I-D.jeong-i2nsf-security-management-automation"/>.
      As shown in <xref target="figure:IBNM-in-SRv6-Network" />,
      an IBN User can use network functions by delivering high-level network intents,
      which specify network requirements that the IBNM User wants to enforce, to
      the IBN Controller via the Consumer-Facing Interface (CFI).      
    </t>

   <section anchor="section:IBNM-Framework-Components-in-SRv6-Network" title="Components with IBNM Framework in SRv6 Network">
   <t>
   The following are the system components for the IBNM framework in SRv6 network.
   </t>

   <t>
       <list style="symbols">
           <t>
           IBN User: An entity (e.g., End User or Network Operator) 
           that delivers a high-level network policy (including SRv6 policy) to
           Security Controller. It is assumed that (i) an intent in a natural
           language (e.g., English) can be translated into a high-level
           network policy through a Natural Language Processing 
           (called NLP) technique (e.g., Lumi <xref target="USENIX-ATC-Lumi" />)
           (ii) an intent as a network service (e.g., self-configuration, optimization,
           and healing) can be also translated into a high-level network policy.
           </t>

           <t>
           IBN Controller: An entity that controls and manages other system
           components in the IBNM framework. It translates a high-level network
           policy into the corresponding low-level network policy and selects
           appropriate NSFs to execute the network rules of the low-level network policy. 
           And then these NSFs are distributed and enabled into SRv6 nodes according to
           SRv6 policy (i.e., list of source routing). 
           </t>

           <t>
           Vendor's Management System (VMS): An entity that provides an image of
           of a virtualized NSF for a network service to the IBNM framework,
           registers the capability and access information of an NSF with IBN
           Controller, and downloads NSFs into appropriate SRv6 nodes.
           These downloaded NSFs will be updated dynamically if needed but is controlled 
           by IBN controller.  These virtualized NSFs are managed through the cloud-based distribed database.   
           </t>

           <t>
           Network Service Function (NSF): An entity that is a Virtual Network
           Function (called VNF), Physical Network Function (called PNF) and
           Container Network Function (CNF), which is also called Cloud-native
           Network Function, for a autonomous network service.
           </t>

           <t>
           IBN Analyzer: An entity that collects monitoring data from NSFs and
           analyzes such data for checking the activity and performance of the NSFs
           using machine learning techniques (e.g., Deep Learning <xref target="Deep-Learning" />).
           If there is a suspicious network problem (e.g., traffic congestion and
           QoS degradation) for the target network or NSF, IBN Analyzer delivers a
           report of the augmentation or generation of network rules to IBN
           Controller.
           </t>
       </list>
   </t>

   <t>
     For IBN-based network services with Feedback-Based Network Management (FNM),
     IBN Analyzer is a key component for the IBNM framework 
     <xref target="RFC9315" /> <!-- <xref target="RFC9316" /> -->
     to collect monitoring data from NSFs and analyzing the monitoring data.
     In here, SRv6 is used to distinguish the monitoring data. 
     Ingress node (i.e., Headend) in SRv6 domain adds monitoring information (e.g., intent and monitoring tag) 
     into SRv6 headers. And then, intermediate nodes monitor and analyze IPv6 packets with monitoring information. 
     The actual implementation of the analysis of monitoring data is out of
     the scope of this document.
   </t>

   </section>

   <section anchor="section:IBNM-Interfaces" title="Interfaces for the IBNM Framework">
   <t>
     The following are the interfaces for the IBNM framework. Note that
     the interfaces can be modeled with YANG <xref target="RFC6020" /> and network
     policies are delivered through either RESTCONF <xref target="RFC8040" /> or
     NETCONF <xref target="RFC6241" />. In addition, REST API <xref target="REST" /> 
     can be supported for those software update interfaces.
   </t>

   <t>
     <list style="symbols">
          <t>
           Consumer-Facing Interface (CFI): An interface between IBN User and IBN
           Controller for the delivery of a high-level network policy or a intent
           <xref target="I-D.ietf-i2nsf-consumer-facing-interface-dm" />.
          </t>

          <t>
           NSF-Facing Interface (NFI): An interface between IBN Controller and an
           NSF for the delivery of a low-level network policy
           <xref target="I-D.ietf-i2nsf-nsf-facing-interface-dm" />.
          </t>

          <t>
           Registration Interface (RI): An interface between a VMS and IBN Controller
           for the registration of an NSF's capability and access information with the
           IBN Controller or the query of an NSF for a required low-level network
           policy <xref target="I-D.ietf-i2nsf-registration-interface-dm" />.
          </t>

          <t>
           Software Update Interface (Up) (SUI-U): An interface between a VMS and global distribed database
           for NSF management.
          </t>

          <t>
           Software Update Interface (Down) (SUI-D): An interface between a VMS and a SRv6 node 
           for delivery of a NSF. The NSF is just downloaded and does not work. After the command of IBN Controller
           through NFI, it works. 
          </t>

          <t>
           Monitoring Interface (MI): An interface between an NSF and IBN Analyzer for
           collecting monitoring data from an NSF to check the activity and performance
           of an NSF for a possible network problem <xref target="I-D.ietf-i2nsf-nsf-monitoring-data-model" />.
           In here, IPv6 packets with monitoring information in SRv6 heeder is only collected.  
          </t>

          <t>
           Analytics Interface (AI): An interface between IBN Analyzer and IBN
           Controller for the delivery of an analytics report of the augmentation
           or generation of network rules to IBN Controller, which lets
           IBN Controller apply the report for network rules to its network
           policy management.
          </t>
     </list>
   </t>

   <t>
     For IBN-based network services with FSM, Analytics Interface is a key
     interface in the IBNM framework to deliver an analytics report of the
     augmentation or generation of network rules to IBN Controller through
     the analysis of the monitoring data from NSFs. For analyzing, 
     user's intent of monitoring information in SRv6 header will compare with 
     just monitoring data from NSFs. 
   </t>

   </section>

</section>

<section anchor="section:Network-Policy-Translation" title="Network Policy Translation">
    <t>
    To facilitate Network Policy Translation (NPT), IBN Controller needs to
    have a network policy translator that performs the translation of a high-level
    network policy into the corresponding low-level network policy.
    For the automatic NPT services, the IBN framework needs to bridge a high-level
    YANG data model and a low-level YANG data model in an automatic manner
    <xref target="I-D.yang-i2nsf-security-policy-translation" />.
    Note that a high-level YANG data model is for the IBN Consumer-Facing Interface,
    and a low-level YANG data model is for the IBN NSF-Facing Interface.
    </t>

  <t>
    <xref target="figure:Automatic-Data-Model-Mapping" /> shows automatic
    mapping of high-level and low-level data models for network policies. 
    Automatic Data Model Mapper takes a high-level YANG data module for the
    Consumer-Facing Inteface and a low-level YANG data module for the
    NSF-Facing Interface. It then constructs a mapping table associating
    the data attributes (or variables) of the high-level YANG data module
    with the corresponding data attributes (or variables) of the low-level
    YANG data module. Also, it generates a set of production rules of the
    grammar for the construction of an XML file of low-level network policy
    rules.
  </t>

    <figure anchor="figure:Automatic-Data-Model-Mapping" title="Automatic Mapping of High-level and Low-level Data Models">
            <artwork><![CDATA[

       High-level YANG Data Module   Low-level YANG Data Model
                   |                              |
                   V                              V
         +---------+------------------------------+---------+
         |             Policy Data Model Mapper             |
         +------------------------+-------------------------+
                                  |                                  
               Mapping Model (Data Model Mapping Table)
                                  |
                                  V
         +--------------------------------------------------+
         |               local NSF Database                 |
         +--------------------------------------------------+
            ]]></artwork>
  </figure>

</section>

<section anchor="section:Network-Audit-System" title="Network Audit System">
  <t>
    The IBN framework is weak to both an insider attack and a supply chain attack
    since it trusts in NSFs provided by VMS and assumes that NSFs work for their
    network services appropriately <xref target="I-D.ietf-i2nsf-applicability" />.
  </t>
  
  <t>
    To detect the malicious activity of either an insider attack by a malicious 
    VMS or a supply chain attack by a compromised VMS, a network audit 
    system is required by the IBN framework.  This network audit system can
    facilitate the non-repudiation of configuration commands and monitoring data
    generated in the IBN framework.
  </t>

  <t>
  A network audit system has the following four main objectives: 
   <list style="symbols">
     <t> To check the existence of a network policy, a management system, and
         its procedures; </t>
     <t> To identify and understand the existing vulnerabilities and risks of
         either an insider attack or a supply chain attack; </t>
     <t> To review existing network controls on operational and administrative
         issues; </t>
     <t> To provide recommendations and corrective actions to IBN Controller
         for further network and security improvement. </t>
   </list>
  </t>

  <figure anchor="figure:Activity-Auditing-with-Network-Audit-System" title="Activity Auditing with Network Audit System">
          <artwork><![CDATA[
+-----------------------------+                   +----------------+
|           IBN User          |                   |  Vendor's Mgmt | 
|                             +------------+      |     System     |
+--------------+--------------+            |      +--------+-------+
               | Consumer-Facing Interface |               |
               |                           |  Remote       |
   High-level Security Policy              |  Attestation  |
               |                           |  Interface    |
               |                           |               |
               V                           |               V
+--------------+--------------+            |     +---------+--------+
|                             |            V     |      Network     |
|        IBN Controller       +------------+---->|       Audit      |
|                             |            ^     |      System      |
+--------------+--------------+            |     +---------+--------+
               |  NSF-Facing Interface     |               ^
               |                           |  Remote       |
   Low-level Security Policy               |  Attestation  |
               |                           |  Interface    |
               V                           |               |
+--------------+--------------+            |      +--------+-------+
|            NSF(s)           +------------+      |  IBN Analyzer  | 
|                             +------------------>|                |
+-----------------------------+    Monitoring     +----------------+ 
                                   Interface
       ]]></artwork>
</figure>

  <t>
    <xref target="figure:Activity-Auditing-with-Network-Audit-System" />
    shows activity auditing with a network audit system in the IBN
    framework. All the components in the IBN framwork report its
    activities (such as configuration commands and monitoring data)
    to Network Audit System as transactions through Remote Attestation 
    Interface <xref target="I-D.yang-i2nsf-remote-attestation-interface-dm"/>.  
    The network audit system can analyze the reported activities from the
    IBN components to detect malicious activities such as an insider attack
    and a supply chain attack.
    Note that such a network audit system can be implemented by remote
    attestation <xref target="RFC9334"/><xref target="I-D.yang-i2nsf-remote-attestation-interface-dm"/>
    or Blockchain <xref target="Bitcoin"/>.  The details of the implementation
    of the network audit system are out of the scope of this document.
  </t>
  
  <t>
    In order to determine a minimum set of controls required to reduce the
    risks from either an insider attack or a supply chain attack, the network
    audit system should analyze the activities of all the components in the
    IBN framework periodically, evaluate possible risks, and take an action
    to such risks since vulnerabilities and threats may change in
    different environments over time.
  </t>
</section>

<section anchor="section:IANA-Considerations" title="IANA Considerations">
  <t>
    This document does not require any IANA actions.
  </t>
</section>

<section anchor="section:Security-Considerations" title="Security Considerations">
  <t>
    The same security considerations for the IBN framework
    <xref target="RFC8329" /> are applicable to this document.
  </t>
</section>

</middle>

<back>

<!-- START: Normative References -->
<references title="Normative References">

    <?rfc include="reference.RFC.6020"?>
    <?rfc include="reference.RFC.6241"?>
    <?rfc include="reference.RFC.8040"?>    
    <?rfc include="reference.RFC.8329"?>
    <?rfc include="reference.RFC.9315"?>
    <?rfc include="reference.RFC.7575"?>
    <?rfc include="reference.RFC.8192"?>
    <?rfc include="reference.RFC.8402"?>
    <?rfc include="reference.RFC.8754"?>
    <?rfc include="reference.RFC.8986"?>
    <!-- <?rfc include="reference.RFC.9316"?> -->
    
</references>
<!-- END: Normative References -->

<!-- START: Informative References -->
<references title="Informative References">

    <?rfc include='reference.I-D.ietf-i2nsf-consumer-facing-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-nsf-facing-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-registration-interface-dm'?>
    <?rfc include='reference.I-D.ietf-i2nsf-nsf-monitoring-data-model'?>    
    <?rfc include='reference.I-D.ietf-i2nsf-applicability'?>
    <?rfc include='reference.I-D.jeong-i2nsf-security-management-automation'?>
    <?rfc include='reference.I-D.yang-i2nsf-security-policy-translation'?>
    <?rfc include='reference.RFC.9334'?>
    <?rfc include='reference.I-D.yang-i2nsf-remote-attestation-interface-dm'?>
    <?rfc include="reference.I-D.jeong-nmrg-ibn-network-management-automation'?>


    <reference anchor="ETSI-NFV">
        <front>
            <title>Network Functions Virtualisation (NFV); Architectural Framework</title>
            <author surname="ETSI GS NFV 002 V1.2.1" />
            <date month="December" year="2014" />
        </front>
        <seriesInfo name="Available:" value="https://www.etsi.org/deliver/etsi_gs/nfv/001_099/002/01.02.01_60/gs_nfv002v010201p.pdf" />
    </reference>

    <reference anchor="Bitcoin">
        <front>
            <title>Bitcoin: A Peer-to-Peer Electronic Cash System</title>
            <author initials="S." surname="Nakamoto" />
            <date month="May" year="2009" />
        </front>
        <seriesInfo name="Available:" value="https://bitcoin.org/bitcoin.pdf" />
    </reference>

   <reference anchor="USENIX-ATC-Lumi">
        <front>
            <title>Hey, Lumi! Using Natural Language for Intent-Based Network Management</title>
            <author initials="A." surname="Jacobs" />
            <author initials="R." surname="Pfitscher" />
            <author initials="R." surname="Ribeiro" />
            <author initials="R." surname="Ferreira" />
            <author initials="L." surname="Granville" />
            <author initials="W." surname="Willinger" />
            <author initials="S." surname="Rao" />
            <date month="July" year="2021" />
        </front>
        <seriesInfo name="USENIX" value="Annual Technical Conference" />
    <seriesInfo name="Available:" value="https://www.usenix.org/conference/atc21/presentation/jacobs" />
    </reference>

   <reference anchor="REST">
        <front>
            <title>Principled Design of the Modern Web Architecture</title>
            <author initials="R." surname="Fielding" />
            <author initials="R." surname="Taylor" />
            <date month="May" year="2002" />
        </front>
        <seriesInfo name="ACM" value="Transactions on Internet Technology, Vol. 2, Issue 2," />
    <seriesInfo name="Available:" value="https://dl.acm.org/doi/10.1145/514183.514185" />
    </reference>

    <reference anchor="Deep-Learning">
        <front>
            <title>Deep Learning</title>
            <author initials="I." surname="Goodfellow" />
            <author initials="Y." surname="Bengio" />
            <author initials="A." surname="Courville" />
            <date month="November" year="2016" />
        </front>
        <seriesInfo name="Publisher:" value="The MIT Press" />
    <seriesInfo name="URL:" value="https://www.deeplearningbook.org/" />
    </reference>

</references>
<!-- END: Informative References -->

<!-- 
<section anchor="section:Acknowledgments" title="Acknowledgments">
    <t>
    This work was supported by Institute of Information &amp; Communications
    Technology Planning &amp; Evaluation (IITP) grant funded by the Korea
    Ministry of Science and ICT (MSIT)(No. 2022-0-01015, Development of
    Candidate Element Technology for Intelligent 6G Mobile Core Network).
    </t>

    <t>
    This work was supported in part by Institute of Information &amp;
    Communications Technology Planning &amp; Evaluation (IITP) grant
    funded by the Korea Ministry of Science and ICT (MSIT) (No. 2022-0-01199,
    Regional strategic industry convergence security core talent training
    business).
    </t>
</section>

<section anchor="section:Contributors" title="Contributors">
    <t>
    This document is made by the group effort of NMRG.
    Many people actively contributed to this document, such as Linda Dunbar,
    Yoav Nir, Susan Hares, and Qin Wu.
    The authors sincerely appreciate their contributions.
    </t>
    <t> The following are co-authors of this document: </t>
        <t>
        Patrick Lingga - 
        Department of Electronic, Electrical and Computer Engineering,
        Sungkyunkwan University,
        2066 Seobu-Ro Jangan-Gu,
        Suwon, Gyeonggi-do 16419,
        Republic of Korea.
        EMail: patricklink@skku.edu
        </t>

        <t>
        Jung-Soo Park - 
        Electronics and Telecommunications Research Institute,
        218 Gajeong-Ro, Yuseong-Gu,
        Daejeon, 34129,
        Republic of Korea. 
        EMail: pjs@etri.re.kr
        </t>

        <t>
        Yunchul Choi - 
        Electronics and Telecommunications Research Institute,
        218 Gajeong-Ro, Yuseong-Gu,
        Daejeon, 34129,
        Republic of Korea. 
        EMail: cyc79@etri.re.kr
        </t>

</section>

<section title="Changes from draft-jeong-nmrg-ibn-network-management-automation-00">
    <t>
    The following changes are made from draft-jeong-nmrg-ibn-network-management-automation-00:
    <list style="symbols">
      <t>
      There is an update of the author list.
      </t>

      <t>
      There are updates in the References.
      </t>
    </list>
    </t>
</section>
-->

</back>

<!-- <vspace blankLines="100"/> -->
<!-- page break to put addresses onto one page-->

</rfc>
