<?xml version="1.0" encoding="US-ASCII"?>
<!-- This is built from a template for a generic Internet Draft. Suggestions for
     improvement welcome - write to Brian Carpenter, brian.e.carpenter @ gmail.com 
     This can be converted using the Web service at http://xml.resource.org/ -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<!-- You want a table of contents -->
<!-- Use symbolic labels for references -->
<!-- This sorts the references -->
<!-- Change to "yes" if someone has disclosed IPR for the draft -->
<!-- This defines the specific filename and version number of your draft (and inserts the appropriate IETF boilerplate -->
<?rfc sortrefs="yes"?>
<?rfc toc="yes"?>
<?rfc symrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc topblock="yes"?>
<?rfc comments="no"?>
<rfc category="info" docName="draft-irtf-nmrg-ibn-usecases-03"
     ipr="trust200902">
  <front>
    <title abbrev="IBN Use Cases">Use Cases and Practices for
    Intent-Based Networking</title>

    <author fullname="Kehan Yao" initials="K." role="editor" surname="Yao">
      <organization>China Mobile</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <code>100053</code>

          <country>China</country>
        </postal>

        <email>yaokehan@chinamobile.com</email>
      </address>
    </author>

    <author fullname="Danyang Chen" initials="D." role="editor" surname="Chen">
      <organization>China Mobile</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <code>100053</code>

          <country>China</country>
        </postal>

        <email>chendanyang@chinamobile.com</email>
      </address>
    </author>

    <author fullname="Jaehoon Paul Jeong" initials="J." role="editor"
            surname="Jeong">
      <organization abbrev="Sungkyunkwan University">Department of Computer
      Science and Engineering</organization>

      <address>
        <postal>
          <street>Sungkyunkwan University</street>

          <street>2066 Seobu-Ro, Jangan-Gu</street>

          <city>Suwon</city>

          <region>Gyeonggi-Do</region>

          <code>16419</code>

          <country>Republic of Korea</country>
        </postal>

        <phone>+82 31 299 4957</phone>

        <facsimile>+82 31 290 7996</facsimile>

        <email>pauljeong@skku.edu</email>

        <uri>http://iotlab.skku.edu/people-jaehoon-jeong.php</uri>
      </address>
    </author>

    <author fullname="Qin Wu" initials="Q." surname="Wu">
      <organization>Huawei</organization>

      <address>
        <email>bill.wu@huawei.com</email>
      </address>
    </author>

    <author fullname="Chungang Yang" initials="C." surname="Yang">
      <organization>Xidian University</organization>

      <address>
        <email>cgyang@xidian.edu.cn</email>
      </address>
    </author>

    <author fullname="Luis M. Contreras" initials="L." surname="Contreras">
      <organization>Telefonica</organization>

      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
       </address>
    </author>
	
    <author fullname="Giuseppe Fioccola" initials="G." surname="Fioccola">
      <organization>Huawei</organization>

      <address>
        <email>giuseppe.fioccola@huawei.com</email>
      </address>
    </author>
	
    <date year="2026" month="March" day="15" />

    <area>Network Management</area>

    <workgroup>Internet Research Task Force</workgroup>

    <keyword>
    Intent-Based Networking, Network Management, Artificial
    Intelligence, Intent Life Cycle, Fulfillment, Assurance, Use Case
    </keyword>

    <abstract>
      <t>This document proposes several use cases of Intent-Based Networking
      (IBN) and a methodology to differ each use case by following the
      lifecycle of a real IBN system. It includes data collection for system
      awareness in the IBN system and the construction of the IBN system.
      This construction consists of intent translation, policy translation, 
      policy verification, policy deployment, policy monitoring, policy
      validation, policy optimization, and intent report. Practice learnings
      are also summarized to instruct the construction of next generation
      network management systems with the integration of IBN techniques.
      Finally, this document discusses three aspects for the deployment of IBN
      systems on the real world. They are Multi-Domain Dichotomy for IBN, 
      the Integration of IBN and Network Digital Twin, and IBN with Artificial
      Intelligence (AI).
      </t>
    </abstract>

    <note title="Requirements Language">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref
      target="RFC2119">RFC 2119</xref>.</t>
    </note>
  </front>

  <middle>
    <section anchor="section:Introduction" title="Introduction">
      <t><xref target="RFC9315"/> gives the concepts and definition of
      Intent-Based Networking (IBN), and <xref target="RFC9316"/> proposes a
      comprehensive taxonomy of the intent classifications. Although the
      intent life cycle has been defined, including all the core functional
      components like intent injestion, intent translation, policy generation,
      and intent assurance, there is still a big gap between defining
      these high-level functionality and building realistic IBN systems. This
      document summarizes the methodologies, proposes several IBN use cases,
      and then practice learning and general learning when building an IBN
      system. Main objectives of this document is to instruct future research
      directions of IBN and other related network management technologies
      in the perspective of network operators and vendors as well as service
      providers.</t>
    </section>

    <section anchor="section:Methodology" title="A Methodology for Building IBN Systems">
      <t>This section summarizes a methodology to build an IBN system.
      This methodology refers to the modeling of an intent life cycle and its
      high-level core functional components, as well as the specific solutions
      to implement those components <xref target="RFC9315"/>. The methodology
      is essential to build a real IBN system, beyond the definition in 
      <xref target="RFC9315"/>.
      The methodology to an IBN system is composed of two important parts:
      (i) data collection for system awareness and (ii) construction of an
      IBN system.</t>

      <section title="Data Collection for System Awareness" toc="default">
        <t>System awareness requires the data collection of various network status
        indicators like network traffic and resources. Building a valuable
        dataset is essential for an IBN system. A comprehensive data collection
        depends on suitable methods and tools, appropriate sampling metrics,
        and reasonable granularity for the data collection.
          <list style="numbers">
            <t>Methods and Tools
              <list style="symbols">
                <t>There are many existing ways to collect network data which
                can be primarily classified into two types, such as active
                measurement and passive measurement. Active measurement like
                In-band Network Telemetry (INT) <xref target="INT"/> can grab
                networking information by inserting timestamps into the
                programmable field of on-path packets. Passive measurement, on
                the other hand, uses some tools like Tcpdump or Wireshark to
                collect data at specific targets, like endpoint servers. IBN
                systems need both of the ways to collect data, depending on
                what scenarios they might be applied to.</t>
              </list>
              </t>

            <t>Metrics
              <list style="symbols">
                <t>Metrics include traffic-related and network-related
                information. Traffic-related metrics include performance
                indicators, such as latency, throughput, and traffic
                congestion signals. Network-related information includes
                network device information, such as the number and health status
                of ports, and network topology information (e.g., link
                connectivity and structures). To meet a specific user
                intention, such as load balancing and congestion elimination
                on the entire network, IBN systems need to collect and process
                traffic and device related information.</t>
              </list>
              </t>

            <t>Granularity
              <list style="symbols">
                <t>Network Traffic: Network traffic is usually collected in
                various forms, such as per-packet <xref target="INT"/> and 
                per-flow (or per-flowlet) <xref target="IntFlow"/>, and these
                are two most typical types of data collection. Per-packet
                tracking lets each packet be tracked, which is very accurate,
                but it requires greater monitoring overhead and state
                maintenance overhead <xref target="INT"/>. In contrast, 
                per-flow tracking does not need to maintain too many states,
                and it generally uses five-tuples (i.e., source IP address,
                destination IP address, source port number, destination port
                number, transport layer protocol) to identify each flow, which
                often brings good observation results <xref target="IntFlow"/>.
                Other collection methods are like per-cell and per-flow
                <xref target="IntFlow"/>. Per-cell tracking tracks each cell
                unit whose length remains unchangeable, which is more friendly
                to system management and control. This method is often applied
                to Artificial Intelligence (AI) data center network monitoring.
                Per-flowlet tracking cuts a flow into several small flows at a
                certain interval, which is more suitable for implementing
                refined load balancing scenarios. Thus, the IBN system should
                select an appropriate traffic collection granularity (e.g.,
                packet, flow, flowlet, and cell).</t>

                <t>Time Granularity: Time granularity means that the data
                acquisition needs to adopt the appropriate time interval for
                data sampling. In the extreme case, data is collected without
                interruption. For example, the status information of each data
                packet is reported to a monitoring module without
                interruption. This collection method often brings too much
                redundant information, which leads to a lot of storage and
                computing overhead to the monitoring module. However, the
                method of sampling without interruption or at a very low
                time interval can better observe micro-bursts of the
                networking system. A micro-burst occurs when a large amount of
                burst data is received in milliseconds. For some black-box
                network systems and some high-concurrency network systems, it
                is necessary to sacrifice a certain amount of storage and
                computing costs to collect data in a finer granularity time
                slot, so as to make better a trade-off between system overhead
                and data acquisition accuracy. By analyzing the historical
                behavior of IBN systems, a reasonable time interval can be
                selected for data acquisition.</t>

                <t>Spatial Granularity: Spatial granularity indicates that it
                is necessary to select an appropriate physical scope of a
                network for data collection. In some cases, the information
                collection method based on the whole network and the whole
                domains may not be suitable for all situations, and sometimes
                the results obtained from the processing and analysis of the
                collected data may not be accurate (e.g., RTT-based congestion
                control in data center networking) or incur too much overhead
                (e.g., hop-by-hop performance monitoring over the Internet).
                The best way is to match the most appropriate spatial
                granularity for user intents. For example, in wide-area data
                transmission, users need to select an optimal path. In this
                case, sampling is not required for all paths from a source to
                a destination. Only partial sampling is required for certain
                path segments which share endpoints, to ensure the correctness
                of decision makings on path setup in a scenario of multi-path
                data transmission.</t>
              </list>
              </t>
          </list>
          </t>
      </section>

      <section anchor="section:IBN-System-Construction" 
               title="The Construction of an IBN System">
        <t>An IBN system consists of intent translation module,
        policy generation and mapping module, intent verification module,
        intent deployment module, monitoring module, intent validation module,
        and policy optimization module. Each module in the IBN system matches
        with each module in the Intent Life Cycle in <xref target="RFC9315"/>. 
        The different construction methods and
        different construction tools used in these modules may affect the
        advantages of realizing a user intent. For different modules, we
        summarize the methods and tools that have been used and may be
        used.
        <list style="numbers">
            <t>Intent Translation
            <list style="symbols">
                <t>Translating and refining intents require the system to
                explore and exploit the semantic relationships of different
                service intents <xref target="I-D.gu-nmrg-intent-translator"/><xref target="I-D.pedro-ite"/>. 
                It is necessary to build a general model to extract the key
                semantic information from the service intents in different
                representation forms. In the intent translation module,
                several possible intent expressions and translation methods
                are as follows:<list style="symbols">
                    <t>A limited range of templates are preset in advance, and
                    users can only express corresponding intentions by filling
                    in or selecting templates. The advantage of this method is
                    that the requirements for users and translation are very
                    low, and all users can use it without learning. The
                    disadvantage is that there are many restrictions, which
                    can only be achieved through a preset template, but the
                    preset template is limited, and cannot really meet the
                    flexible and diverse needs of users.
                    </t>

                    <t>
                    Using Natural Language Processing (NLP), such as Flan-T5
                    <xref target="Flan-T5"/> and GPT-3 <xref target="GPT-3"/>, 
                    for intent translation is another possible approach.
                    NLP is used to convert a user's intent in a human 
                    language (e.g., English) into a text intent in a computer
                    programming language (e.g., XML, JSON, and YAML).
                    This translation from a verbal intent in a natural language to
                    a text intent in a computer programming language is performed
                    by an intent translator <xref target="I-D.gu-nmrg-intent-translator"/>.
                    
                    The advantage of this method is high flexibility, users can
                    directly express their intents in a natural language 
                    according to their own needs, without being limited by
                    templates. The disadvantage is that it is difficult to
                    implement and has high requirements for the intent
                    translation module. This needs to be able to accurately
                    identify the real intent of a user, and different intent
                    expression paradigms will affect the generation of
                    subsequent policies. Thus, it is necessary to formalize
                    normative intent expression grammars.
                    </t>

                    <t>In addition, there are some preset expression
                    languages for IBN networks, such as Nile (Network Intent
                    Language) <xref target="Nile"/> and NEMO (Network Modeling
                    Language) <xref target="I-D.xia-sdnrg-nemo-language"/>. In
                    the designs of these languages' expressions, most of them
                    consider the flexibility of the expressions, which can be
                    extended and adjusted according to the intent scenario
                    of the business under consideration. However, these
                    language designs have some disadvantages (e.g., the
                    capabilities of intent expressions). Most of the users are
                    network practitioners, requiring the users to have certain
                    network knowledge background.
                    </t>
                  </list>
                  </t>
              </list>
              </t>

            <t>Policy Translation<list style="symbols">
                <t>In an Intent-Based Network, the translation from a user
                intent to the corresponding network policy is required. The
                generated network policy needs to be mapped to an appropriate
                network function or network device to execute the policy.
                Thus, both the policy translation and mapping are required for
                intent enforcement in the target intent-based network.
                </t>
                
                <t>A given user intent needs to consider both the intent and
                the network state, that is, the policy needs to satisfy the
                user intent and ensure that a network operation can be
                executed to satisfy the requested intent. The policy
                generation module can be implemented by setting up a
                repository of &ldquo;intent&rdquo; and &ldquo;policy&rdquo;,
                and mapping relationship between the intent and policy
                should be stored and updated as knowledge in a knowledge
                datastore (e.g., knowledge graph <xref target="Knowledge-Graph"/>) 
                according to various intents and dynamic network state
                telemetry.
                </t>

                <t>There is a mapping submodule in the policy translation
                module. This mapping submodule can select an appropriate
                network function or network device to execute the requested
                policy. The selection of such a network function or network
                device can be done by a set-cover algorithm or decision tree 
                algorithm. One of these selection algorithms searches for a
                network function or network device that can accommodate the
                keywords in the policy.
                </t> 

                <t>Similar to different ways of expressing an intent, there
                are different approaches for the policy generation.
                <list style="symbols">
                    <t>As opposed to the default template-based representation
                    in the intent translation module, the simplest approach
                    to policy generation is based on a default template or
                    rule-based provisioning. After the user completes the
                    corresponding intent expression through the graphical
                    interface (e.g., a web-based graphical user interface
                    (GUI)), a user or an AI agent can select the corresponding
                    policy according to the preset template in the policy
                    generation or the rules in a constructed rule-based policy
                    generator. Similar to the above analysis, this approach
                    has the advantage of being very simple to implement, but
                    the disadvantage is that it is too restrictive and only a
                    limited number of preset strategies can be selected.</t>

                    <t>The second common method of policy translation is 
                    inference-based generation, such as reasoning based on
                    keywords in an intent expression, associating keywords
                    with policies, and using Circular Reasoning
                    <xref target="Circular-Reasoning"/> to generate policies.
                    This method is more flexible than the template class
                    description method, but the precision of policy generation
                    is more related to the keyword extraction, and there is
                    some uncertainty. In addition, there are policy generation
                    methods based on network service description, which are
                    widely used in Service Function Chaining (SFC) <xref target="RFC7665"/>,
                    network slicing or Network Functions Virtualization (NFV)
                    <xref target="ETSI-NFV"/><xref target="ETSI-NFV-Release-2"/>.
                    In essence, this approach can also be seen as
                    inference-based strategy generation.</t>

                    <t>In addition to the above methods, AI technology-based
                    policy generation methods have also emerged in recent
                    years, such as machine learning technology, which selects
                    the corresponding policies through model training according
                    to keywords extracted from an intent expression. With
                    the development of AI technology, in addition to selecting
                    preset policies, for example, based on Deep Reinforcement
                    Learning <xref target="DRL"/>, reasonable reward functions
                    are set to generate strategies that consider user intents 
                    and network status.</t>
                  </list>
                  </t>
              </list>
              </t>

            <t>Policy Verification
                <list style="symbols">
                    <t>Policy verification checks whether the policy meets
                    a specific user's requirements or not. Also, it
                    includes policy conflict detection and policy conflict
                    resolution <xref target="AI-Intent-Network"/>.
                    <list style="symbols">
                    <t>The policy conflict detection includes two types: the
                    conflicts between different policies themselves and the
                    conflicts between policies and network states of the
                    target network to perform the requested policy. The
                    conflict of the policies may be due to the conflict between
                    the network states that different users want to obtain.
                    The simplest example is that both users A and B request to
                    increase the bandwidth of 10Gbps, but the network
                    bandwidth of the shared network for users A and B is less
                    than 20Gbps. This conflict caused by different user
                    requirements can be resolved by a policy conflict handler
                    that checks whether the policies can be deployed in practice,
                    that is, you can choose to execute only the policies that
                    can be executed according to the preset rules, and reject
                    other conflicting policies.
                    If the generated policy conflicts with the network state,
                    the intent-based system must detect that the generated
                    policy cannot be executed by the target network. 
                    Also if the generated policy cannot be executed, the policy
                    needs to be re-generated. Otherwise, the failed policy 
                    generation should be reported to the intent user as a 
                    failure.</t>

                    <t>In terms of whether the policy is satisfied or
                    not, the first way is to feedback the result to the user,
                    and the user judges whether it is satisfied or not. 
                    For this purpose, the execution result can be presented
                    through a graphical user interface. 
                    The second way is to use an AI agent such as deep
                    reinforcement learning <xref target="DRL"/> to determine
                    whether the results meet the needs or not.</t>
                  </list>
                  </t>
              </list>
              </t>

            <t>Policy Deployment<list style="symbols">
                <t>Policy deployment is to deploy the policy translated from 
                an intent into a network function or network device in a target
                network and let the configurations or commands of the policy
                operate in the network.
                <list style="symbols">
                    <t>The policy translator delivers a policy with detailed
                    configurations or commands to a policy renderer which
                    deploys the policy into target network functions or 
                    devices (e.g., switch, router, firewall, web filter,
                    and DDoS-attack mitigator), which are called target
                    network entities.</t>

                    <t>The policy renderer delivers the policy to the target
                    network entities with a policy delivery protocol such as
                    NETCONF <xref target="RFC6241"/>, RESTCONF <xref
                    target="RFC8040"/>, or REST API <xref target="REST"/>.</t>

                    <t>The target network entities execute their own
                    configuration for the requested network services which are
                    specified by the policy.
                    </t>
                  </list>
                  </t>
              </list>
              </t>

            <t>Policy Monitoring<list style="symbols">
                <t>Policy monitoring is to collect monitoring data from network 
                entities (e.g., switch, router, firewall, web filter,
                and DDoS-attack mitigator) for policy validation to judge
                whether the requested policy is enforced well or not in
                the target network.
                <list style="symbols">
                    <t>Network entities send their monitoring data to a
                    validation module (e.g., analyzer) via a delivery protocol
                    such as NETCONF <xref target="RFC6241"/>, RESTCONF <xref
                    target="RFC8040"/>, and REST API <xref target="REST"/>.
                    </t>

                    <t>The validation module stores the monitoring data into
                    its local repository for further analysis and
                    investigation.
                    </t>
                  </list>
                  </t>
              </list>
              </t>

            <t>Policy Validation<list style="symbols">
                <t>Policy validation is to judge whether the requested policy is
                satisfied by network entities in a target network or not. 
                The policy may have goals in terms of performance (e.g.,
                throughput, delay, and loss rate) and services (e.g.,
                firewall, web filter, and DDoS-attak mitigator).
                <list style="symbols">
                    <t>A validation module (e.g., analyzer) uses the collected
                    monitoring data for evaluation and check whether the
                    required goals for each policy are met with specific
                    metrics from the monitoring data or not. This checking
                    can be performed by Artificial Intelligence (AI) and
                    Machine Learning (ML) algorithms.</t>

                    <t>Evaluation results need to be delivered to an
                    optimization module (e.g., optimizer) which can augment
                    the existing policy or generate a new policy for further
                    improvement.</t>
                  </list>
                  </t>
              </list>
              </t>

            <t>Policy Optimization<list style="symbols">
                <t>Policy optimization is to augment the existing policy or generate
                a new policy to meet the goals of the requested intent. With
                the evaluation results, an optimization entity (e.g.,
                optimizer) performs optimization for each registered
                intent.
                <list style="symbols">
                    <t>There are two kinds of optimization, such as Quality of
                    Service (QoS) and Service Provisioning. First, the
                    optimizer for QoS deals with the improvement of
                    performance metrics (e.g., throughput, delay, and loss
                    rate).
                    Second, the optimizer for service provisioning handles the
                    service requirements (e.g., firewall filtering, web 
                    filtering, and DDoS-attack mitigation). For each
                    optimization, the optimizer augments the existing policy
                    or generates a new policy for further improvement. It
                    delivers the policy to the policy renderer so that the
                    renderer can enforce the augmented or generated policy
                    into the target network entities.</t>

                    <t>Thus, the steps from Policy Deployment to Policy 
                    Optimization construct a closed-loop policy control to
                    guarantee the goals of the requested intent in a target
                    network. This is network service automation using the
                    IBN technology.</t>
                  </list>
                  </t>
              </list>
              </t>

            <t>Intent Report<list style="symbols">
                <t>Intent report is to abstract and report the operation
                results in a target network for a given intent. Abstration
                submodule abstracts results in the form of text, figures, 
                and tables. Reporting submodule delivers the abstracted results
                to the user to let him (or her) know the activity and 
                performance of the network.
                <list style="symbols">
                    <t>There are two kinds of submodules for intent report,
                    such as abstraction submodule and reporting submodule.
                    </t>

                    <t>The abstraction submodule analyzes the activity and 
                    performance of target network entities in the target network.
                    The analysis is expressed in the form of text, tables, and 
                    figures by various statistics, AI, ML, and graphics tools.
                    </t>

                    <t>The reporting submodule delivers the analysis report to
                    the user (e.g., network administrator and operator) so that
                    (s)he may check the enforcement and quality of the requested
                    network services for the given user intent in the target
                    network with relevant network entities. The user can render 
                    another intent or modified intent to satisfy his (or her)
                    user intent in the target network.
                    </t>
                  </list>
                  </t>
              </list>
              </t>

          </list>
          </t>
      </section>

      <section anchor="section:Mapping-between-an-IBN-System-and-an-Intent-Life-Cycle" 
               title="Mapping between IBN System and Intent Life Cycle">
        <t>There is a mapping between the modules of an IBN System in
        <xref target="section:IBN-System-Construction"/> and the
        modules of the Intent Life Cycle in <xref target="RFC9315"/>.
        </t>

        <t>
        <list style="symbols">
          <t>
          Intent Translation in the IBN System is mapped to (i) Intent
          Ingestion and Interaction with Users and (ii) Intent Translation in
          the Intent Life Cycle. 
          </t>

          <t>
          Policy Translation in the IBN System is mapped to Intent
          Orchestration in the Intent Life Cycle.
          </t>
        
          <t>
          Policy Verification in the IBN System is mapped to Intent
          Orchestration in the Intent Life Cycle.
          </t>

          <t>
          Policy Deployment in the IBN System is mapped to Intent
          Orchestration in the Intent Life Cycle.
          </t>

          <t>
          Policy Monitoring in the IBN System is mapped to Monitoring in the
          Intent Life Cycle.
          </t>

          <t>
          Policy Validation in the IBN System is mapped to Intent Compliance
          Assessment in the Intent Life Cycle.
          </t>

          <t>
          Policy Optimization in the IBN System is mapped to Intent Compliance
          Actions in the Intent Life Cycle.
          </t>

          <t>
          Intent Report in the IBN System is mapped to Abstraction,
          Aggregation, and Reporting in the Intent Life Cycle.
          </t>
        </list>
        </t>
      </section>

    </section>

    <section anchor="section:IBN-Use-Cases" title="IBN Use Cases">
      <t>In this section, we will describe several scenarios where IBN can be
      applied. These use cases can reflect the aforementioned methodologies of
      IBN systems from different perspectives.</t>

      <section title="IBN for Routing and Path Selection">
        <t>IBN can be applied in building network path and generating routing
        policies according to network administrators' requests.</t>

        <section anchor="section:IBN-Service-Function-Chaining" title="IBN for Service Function Chaining">
          <t>An intent-based dynamic SFC is an example to solve the
          network management challenges (e.g., cross-domain orchestration and
          service functions are tightly coupled with the underlying
          equipment). An Intent-Based Network Management (IBNM) platform can 
          be developed on top of the OpenStack <xref target="OpenStack"/>. 
          The system architecture is shown as <xref target="figure:The-Architecture-of-IBNM"/>,
          which includes the application layer, the intent-enabled layer and
          the infrastructure layer. The application layer collects intents
          from various users and applications, and provides a number of
          programmable network management services to the users. The
          intent-enabled layer consists of the intent translation module, 
          intelligent policy mapping module, and intent guarantee module,
          whose functions are to build a bridge between the application layer
          and the infrastructure layer. Heterogeneous physical devices are
          deployed in the infrastructure layer. This layer can execute
          management instructions from the intent-enabled layer and upload
          underlying network situation information to the intent-enabled
          layer. Information interaction between different layers is done
          through different interfaces, such as the northbound and southbound
          interfaces.
          <figure anchor="figure:The-Architecture-of-IBNM" 
            title="The Architecture of an IBNM System">
              <artwork>  
  +----------------------------------------+
  |            Application Layer           |
  +-------------+---------^----------------+
   Intent Input |         | Northbound Interface
  +-------------+---------v----------------+
  |             |      Intent-Enabled Layer|
  | +-----------+-------+  +-------------+ |
  | |           |       |  |             | |
  | |  +--------v----+  |  |             | |
  | |  | Translation |  |  |             | |
  | |  +-------------+  |  |             | |
  | |                   |  |    Intent   | |
  | |  +-------------+  |  |             | |
  | |  | Verification|  |  |  Guarantee  | |
  | |  +-------------+  |  |             | |
  | |Intent Translation |  |    Module   | |
  | |      Module       |  |             | |
  | +-------------------+  |             | |
  |                        |             | |
  | +-------------------+  |             | |
  | |  Intent Policy    |  |             | |
  | |  Mapping Module   |  |             | |
  | +-------------------+  +-------------+ |
  |                                        |
  +--------------------^-------------------+
                       |  Southbound Interface
  +--------------------v-------------------+
  |         Infrastructure Layer           |
  +----------------------------------------+
  </artwork>
            </figure></t>

          <t>The system demonstration implements the whole process from intent
          input to intent translation to intent policy generation for intent
          deployment, and the details are as follows.</t>

          <t>The user inputs an intention that is cross-domain link-building
          requests in a natural language at a web page. An exemplary intent is 
          "Transfer a common-level video service from user A in Beijing to
          user B in Nanjing while constraining the execution time of the
          intent."</t>

          <t>With the intention in the natural language, the intent translation
          module outputs a conflict-free translation result (e.g., intent),
          which indicates that the external intent input (called intention) and
          the intent translation module have communicated with each other. The
          translation result is intent tuples, which are displayed on the
          front-end interface (e.g., web interface) in the form of name-value
          pairs. After the intent translation module, the translation result
          will be converted to a JavaScript Object Notation (JSON) request
          (e.g., intent) and transmitted to the intent policy mapping module.
          </t>
          
          <t>The intent policy mapping module translates the JSON request as
          an intent into policies as an SFC: 
          service function 1 (e.g., network address translation) and service
          function 2 (e.g., firewall). It then constructs the SFC request
          (having name, tenant_id, description, service requirements, etc.).
          Then it queries whether there is an atomic policy combination that
          satisfies the current intent requirements in the policy repository
          or not.
          </t>

          <t>Following that, an SFC is constructed based on the SFC interface,
          which is extended by Neutron. OpenStack schedules network resources,
          constructs subnets and ports, and generates a two-dimensional space
          topology. Meanwhile, during the SFC construction process, the intent
          guarantee module monitors and manages network resource utilization
          as well as network failures in real time.
          </t> 
          
          <t>Overall, IBNM achieves the decoupling of service application and
          network, and cross-domain network orchestration, while reducing the
          complexity of network management.
          </t>
        </section>

        <section anchor="section:IBN-SRv6-Networks" title="IBN for SRv6 Networks">
          <t>For the automation of configuration and monitoring of Segment
          Routing version six (SRv6) routers, an IBN-based SRv6 network
          management is proposed by <xref target="I-D.park-nmrg-ibn-network-management-srv6"/>.
          The proposed IBNM framework for SRv6 consists of system components and
          interfaces, as shown in <xref target="figure:IBNM-in-SRv6-Networks"/>.
          This figure shows an IBNM framework for 5G core networks using SRv6.
          This framework is built on the framework for Interface to Network
          Security Functions (I2NSF) <xref target="RFC8329"/>.
          </t>

          <figure anchor="figure:IBNM-in-SRv6-Networks"
                  title="Intent-Based Network Management in SRv6 Networks">
            <artwork>
   +-------------+                   +-----------------------------+
   |  IBN User   |                   | Global Distributed Database |
   +-------------+                   +-----------------------------+
          ^                                                     ^
          | Consumer-Facing                    Software Update  |
          | Interface                            Interface (Up) |
          v                                                     v
+-------------------+     Registration     +-----------------------+
|   IBN Controller  |&lt;--------------------&gt;|Developer's Mgmt System|
+-------------------+      Interface       +-----------------------+
          ^      ^                                            ^
          |      |                  Software Update Interface |
          |      |                                     (Down) |
          |      |   Analytics Interface   +----------------+ |
          |      +------------------------&gt;|  IBN Analyzer  | |
          |                                +----------------+ |
          | NSF-Facing Interface                   ^          |
          |                                        |          |
          |                  +---------------------+          |
          |                  |  Monitoring Interface          |
          |                  |                                |
+---------+------------------+--------------------------------+----+
|         v                  v         SRv6 Nodes             v    |
| +-----------------+  +---------------+         +---------------+ |
| |     NSF-1       |--|     NSF-2     | ....... |     NSF-n     | |
| |(Network Exposure|  |(Policy Control|         | (Application  | |
| | Function, NEF)  |  | Function, PCF)|         |  Function, AF)| |
| +-----------------+  +---------------+         +---------------+ |
+------------------------------------------------------------------+
            </artwork>
          </figure>

          <t>A high-level network policy for SRv6 nodes (e.g., NSFs) is
          constructed by a Consumer-Facing Interface YANG data model.
          On the other hand, a low-level network policy is constructed by
          an NSF-Facing Interface YANG data model.
          A high-level network policy is delivered to IBN Controller by IBN User
          via the Consumer-Facing Interface. On the other hand, a low-level
          network policy is delivered to a Network Service Function (NSF) by
          IBN Controller via the NSF-Facing Interface.</t>

          <t>To automate Network Policy Translation (NPT), IBN Controller
          needs a network policy translator performing the translation of a
          high-level network policy into the corresponding low-level network
          policy (i.e., SRv6 policy <xref target="RFC9256"/>). As a prerequisite
          step for this automatic NPT service, the IBN framework needs to
          associate a high-level YANG data model and a low-level YANG data
          model in an automatic manner, like a data model mapper 
          <xref target="I-D.ietf-spring-sr-policy-yang"/>, <xref target="SPT"/>.
          </t>

          <t>For the policy assurance, NSFs send their monitoring data to IBN
          Analyzer on the basis of either periods or events via Monitoring
          Interface. IBN Analyzer analyzes the NSF monitoring data by AI and ML
          algorithms to check whether NSFs are working appropriately according
          to a network policy (called an intent). 
          IBN Analyzer sends a report with either policy reconfiguration or
          feedback to IBN Controller for further actions for the policy 
          assurance. Optionally, IBN Controller sends a report to IBN User to
          report the network status and events for the IBN User's high-level
          policy (called intent).   
          </t>
        </section>
      </section>

      <section anchor="section:IBN-Service-Level-Agreement-Guarantee" title="IBN for Service-Level Agreement Guarantee">
        <t>The performance metrics for Service-Level Agreement (SLA) 
		in a target network are packet loss, delay, jitter, throughput, etc.
		An IBN-based approach can ensure that these performance parameters
		comply with well-defined SLAs.</t>
		
		<t>If we consider the delay, the simple schematic diagram is shown 
		in <xref target="figure:Network-SLA-Performance-Metrics"/>.
        Different thresholds (e.g., warning values and alert values) should be set for
        network delay measurement in advance. When the delay value is below warning, the
        network is normal and the business is normal. When the delay is
        between a warning value and an alert value, the network fluctuation is
        abnormal, but the business is normal. When the delay exceeds the alert
        value, both the network and business are abnormal. For the delay in
        different thresholds, different measurement strategies should be
        adopted:
        <list style="symbols">
            <t>When the network delay exceeds an alert value, or when the
            historical data predicts that the delay will exceed the alert
            value, passive measurement requires 100% sampling of business
            data, and the transmission frequency of active measurement is
            adjusted to the maximum value. At the same time, the log and
            alarm data of the whole network equipment is collected to
            realize the most fine-grained measurement of the network,
            locate the root cause of the problem, and repair the network in
            time.</t>

            <t>When the network delay exceeds a warning value but is lower than
            an alert value, passive measurement samples 60% of business data, and
            the transmission message frequency of the active measurement is
            adjusted to the median value, and the running state data of some
            key devices in the network is collected synchronously.</t>

            <t>When the network delay is less than a warning value, passive
            measurement data is sampled at 20%, and active measurement message
            frequency is adjusted to the lowest value, and the network
            equipment running state of key nodes can be collected as needed.</t>
          </list></t>

        <figure anchor="figure:Network-SLA-Performance-Metrics"
                title="Network SLA Performance Metrics">
          <artwork>        
        ^
  Delay |
   [ms] |
        |                         XX
        |                        X X            Sampling Rate 100%
        |                       XX X
  alert +--------------------------------------------------------+
        |                      X   X             Sampling Rate 60%
        |                     X    XX
        |                    X      X                XX
        |          XX        X      X                XXX
        |          XXX       X       X              X  X
        |         XX X      X        X             X   XX  
        |         X   XX    X        X  XX   XX    X    XX
warning +-------------------------------------------------------+
        |         X    XX  X          XX X  XX X  XX      XX
        |     XX  X     X  X          X   XX   XX X        X
        |    XX X X     X  X          X   XX    XXX         X
        |   X   XX       XXX          X         XX          X
        |   X   XX       XX           X
        |        X       XX                      Sampling Rate 20%
        |
        +-----------------------------------------------------------&gt;
        0                                                 Time [sec]
</artwork>
        </figure>

        <t>The desired approach is to accurately measure the network state,
        especially when there are some issues affecting the service, but at
        the same time, reduce the resources to be employed to achieve the
        desired accuracy.</t>
		
		    <t>The example of network delay has been provided, but the same approach
		    can be applied to other performance indicators (e.g., packet loss, 
        jitter, throughput, and goodput) as well.</t>

		<t>On-path Telemetry Methods refers to performance measurement
		techniques that can provide flow information on the entire forwarding path
		on a per-packet basis in real time. Differently from the traditional
    active tools for Operations, Administration, and Maintenance (OAM), which 
		inject test packets for measurements, the On-path Telemetry Methods
		(e.g., AltMark <xref target="RFC9341"/> and IOAM <xref target="RFC9197"/>) 
    allow to monitor real service packets and thereby allow to directly
    measure network performance indicators from the live networks.		
		Note that Alternate-Marking Method <xref target="RFC9341"/> (AltMark)
		and In-situ Operations, Administration, and Maintenance (IOAM)
		<xref target="RFC9197"/> are the standard On-path Telemetry Methods.</t>

    <t>
		First, AltMark is a method used to perform packet loss, delay, and jitter
    measurements by marking in-flight packets according to the methodology
    described in <xref target="RFC9341"/> and <xref target="RFC9342"/>.
		Second, IOAM is a method that allows to produce operational and telemetry
    information	that may be exported using either an in-band or out-of-band method. 
		The data types and data formats for IOAM data records have been defined
		in <xref target="RFC9197"/> and <xref target="RFC9326"/>.</t>
		
		<t>With AltMark and IOAM, the real-time traffic monitoring of the network
    can be used	to optimize the network performance.
		<xref target="figure:ibn-on-path-telemetry-traffic-monitoring-system"/> shows an exemplary
    traffic monitoring system with a high-level IBN workflow for dynamic
    network control based on traffic monitoring with On-path Telemetry Methods.</t>

      <figure anchor="figure:ibn-on-path-telemetry-traffic-monitoring-system"
              title="A Traffic Monitoring System with IBN-Based On-Path Telemetry">
        <artwork>
     +-------------------------------------------+
     |                 Controller                |
     |         for IBN On-Path Telemetry         |
     +-------------------------------------------+
                |                    ^
                |                    |
                v                    |
       +-----------------+     +---------------+
       | Intent          |     | Compliance    |
       | Acquisition     |     | Assessment    |
       +--------+--------+     +---------------+
                |                    ^
                |                    |
                v                    |
      +-------------------+   +-----------------+
      | Configuration and |   | Data Collection |
      | Optimization      |   | and Analytics   |
      +-------------------+   +-----------------+
                |                    ^
                |                    |
                v                    |
     +---------------------------------------------+
     |                  Network                    |
     +---------------------------------------------+
</artwork>
      </figure>

      <t>In <xref target="figure:ibn-on-path-telemetry-traffic-monitoring-system"/>,
      the Controller for IBN On-Path Telemetry configures the monitoring of the
      network according to a specific performance measurement intent. For this
      monitoring, either AltMark or IOAM can be used. Then it collects data and
      analytics from the selected methodology (e.g., AltMArk and IOAM) in order
      to verify the compliance with the intent.</t>
   
      <t> An Intent Acquisition Module acquires an intent as an SLA request from
      a network administrator. The intent is a specific SLA request for a target
      network in terms of performance parameter values. The Intent Acquisition
      Module gives the intent to a Configuration-and-Optimization Module.</t>

      <t>
      The Configuration-and-Optimization Module translates the intent into a
      network configuration and a measurement policy, such as network partition
      and a spatial accuracy needed for network monitoring. Both the network
      configuration and the measurement policy are deployed into network 
      clusters (i.e., subnetworks) in the target network, having forwarding
      elements (e.g., routers and switches). For the configuration, the YANG
      Data Model for the Alternate Marking Method 
      <xref target="I-D.ydt-ippm-alt-mark-yang"/> can be used.</t>

      <t>
      A Data-Collection-and-Analytics Module collects measurement data from
      the different network clusters in the target network, and then validates
      the actual performance for each cluster against the required performance
      according to the intent. For the collection of the measurement data, the
      On-path Telemetry YANG Data Model 
      <xref target="I-D.fz-ippm-on-path-telemetry-yang"/>
      or the IPFIX Alternate-Marking Information 
      <xref target="I-D.ietf-opsawg-ipfix-alt-mark"/> can be used.</t>

      <t>
      A Compliance Assessment Module checks whether the initial intent is met or
      not. When there is an outage in the network, the module notifies the
      Controller of a report about such an outage. The Controller forwards the
      report to the Configuration-and-Optimization Module so that the module can 
      modify the network configuration by further investigation.</t>

      <t>
      The Configuration-and-Optimization Module takes optimization actions that may
      be related to either network path modification or performance measurement
      variation for better performance. The module delivers the modified configuration
      and measurement policy to the network clusters.
      </t>

      <t>
      The whole process in the On-path Telemetry Method is called as Intent-Based
      Closed-Loop Performance Management for Service-Level Agreement (SLA) in 
      a customer network. Through the closed-loop measurement and control, a network
      problem can be localized with successive approximations using flow detailed
      analysis. </t>
      </section>

      <section anchor="section:IBN-Cloud-Based-Security-System" title="IBN for Cloud-Based Security System">
        <t>A Cloud-Based Security System (CBSS) is proposed in 
        <xref target="CBSS"/><xref target="I-D.jeong-i2nsf-security-management-automation"/>.
        CBSS supports the Security Management Automation (SMA) of Cloud-Based Security
        Services with the framework of Interface to Network Security Functions
        (I2NSF) <xref target="RFC8329"/>. The security management automation
        deals with closed-loop security control, security policy translation,
        and security audit. To support these three features in SMA, an
        augmented architecture of the I2NSF framework is proposed by
        introducing new system components and new interfaces.
        A Network Security Function (NSF) is a system component in the I2NSF 
        framework that provides a security service such as firewall, web filter,
        and Distributed-Denial-of-Service (DDoS) attack mitigator.</t>

        <figure anchor="figure:Cloud-Based-Security-System-with-I2NSF-Framework"
                title="Cloud-Based Security System with I2NSF Framework">
          <artwork>
   +------------+
   | I2NSF User |
   +------------+
          ^
          | Consumer-Facing Interface
          v
+-------------------+     Registration     +-----------------------+
|Security Controller|&lt;--------------------&gt;|Developer's Mgmt System|
+-------------------+      Interface       +-----------------------+
          ^      ^
          |      |
          |      |   Analytics Interface   +-----------------------+
          |      +------------------------&gt;|    I2NSF Analyzer     |
          |                                +-----------------------+
          | NSF-Facing Interface              ^       ^       ^
          |                                   |       |       |
          |                                   |       |       |
          |    +------------------------------+       |       |
          |    |              +-----------------------+       |
          |    |              |   Monitoring Interface        |
          v    v              v                               v
   +----------------+ +---------------+   +-----------------------+
   |      NSF-1     |-|     NSF-2     |...|         NSF-n         |
   |   (Firewall)   | | (Web Filter)  |   |(DDoS-Attack Mitigator)|
   +----------------+ +---------------+   +-----------------------+
            </artwork>
        </figure>

        <t><xref target="figure:Cloud-Based-Security-System-with-I2NSF-Framework"/>
        shows an IBN-driven I2NSF framework for Security Management Automation
        (called SMA) of cloud-based security service management. I2NSF User
        composes a high-level security policy (as an intent) according to 
        the I2NSF Consumer-Facing Interface YANG Data Model in 
        <xref target="I-D.ietf-i2nsf-consumer-facing-interface-dm"/>.
        It delivers the high-level security policy to Security Controller. 
        Security Controller translates the high-level security policy into
        the corresponding low-level security policy according to 
        the I2NSF NSF-Facing Interface YANG Data Model in 
        <xref target="I-D.ietf-i2nsf-nsf-facing-interface-dm"/>.
        The low-level security policy is understandable to Network Security
        Functions (called NSFs) for actual security services. Security
        Controller has a Security Policy Translator (SPT) for this security
        policy translation <xref target="SPT"/>.</t>

        <t>As shown in <xref
        target="figure:Cloud-Based-Security-System-with-I2NSF-Framework"/>,
        for closed-loop security control, this I2NSF framework has Monitoring
        Interface and Analytics Interface along with I2NSF Analyzer. I2NSF
        Analyzer collects monitoring data from NSFs via Monitoring Interface.
        It analyzes the monitoring data using Artificial Intelligence (AI) and
        Machine Learning (ML). I2NSF Analyzers delivers a policy
        reconfiguration message (e.g., defense against a new security attack)
        or feedback information message (e.g., action for handling overloaded
        computing and communication resources) to Security Controller. Security
        Controller receives the message and takes an appropriate action for
        the message, such as translating the message into a security policy
        reconfiguration for target NSFs and taking a remedy action for the
        feedback information.</t>

        <t>Therefore, with a security policy translator and a closed-loop
        security control, we can provide service customers with IBN-based
        security services according to the intent life cycle in
        <xref target="RFC9315"/>.</t>
      </section>

      <section title="IBN for IoT Device Management in 5G Networks">
        <t>A Network Management Automation (NMA) can be provided for cellular
        network services in 5G networks <xref
        target="I-D.jeong-nmrg-ibn-network-management-automation"/>. This NMA
        is feasible on top of an IBN-empowered framework. It deals with a
        closed-loop network control, network intent translator, and network
        management audit. To support these three features in NMA, it specifies
        an architectural framework with system components and interfaces.
        Also, this framework can support the use cases of NMA in 5G networks
        such as the data aggregation of Internet of Things (IoT) devices,
        network slicing, and the Quality of Service (QoS) in
        Vehicle-to-Everything (V2X).</t>

        <figure anchor="figure:Network-Management-Automation-in-IBN-Framework"
                title="Network Management Automation in IBN Framework for 5G Networks">
          <artwork>
   +------------+
   |  IBN User  |
   +------------+
          ^
          | Consumer-Facing Interface (Intent)
          v
+-------------------+     Registration     +-----------------------+
|   IBN Controller  |&lt;--------------------&gt;|  Vendor's Mgmt System |
+-------------------+      Interface       +-----------------------+
          ^      ^
          |      |
          |      |   Analytics Interface   +-----------------------+
          |      +------------------------&gt;|  IBN Analyzer (NWDAF) |
          |                                +-----------------------+
          | NSF-Facing Interface (Policy)     ^       ^       ^
          |                                   |       |       |
          |                                   |       |       |
          |    +------------------------------+       |       |
          |    |              +-----------------------+       |
          |    |              |   Monitoring Interface        |
          v    v              v                               v
   +---------------+  +---------------+        +---------------+
   |     NSF-1     |--|     NSF-2     |........|     NSF-n     |
   |(Net Exposure  |  |(Policy Control|        |  (IoT Device) |
   | Function, NEF)|  | Function, PCF)|        |               |
   +---------------+  +---------------+        +---------------+
            </artwork>
        </figure>

        <t><xref target="figure:Network-Management-Automation-in-IBN-Framework"/>
        shows an IBN framework for Network Management Automation in 5G networks.
        This framework is based on the I2NSF framework for cloud-based security
        services <xref target="RFC8329"/><xref target="I-D.jeong-i2nsf-security-management-automation"/>. 
        Like the framework for Security Management Automation (called SMA) of
        cloud-based security services, this framework supports an intent
        translation with a Network Intent Translator (NIT) and a closed-loop
        control mechanism, it realizes an IBN-based IoT device management in
        5G networks.</t>

        <t>
        An intent is expressed with YAML <xref target="YAML"/>
        according to an intent specification in <xref target="TS-28-312"/>.
        The delivery protocol of an intent and a tranlsated policy can be
        REST API <xref target="REST"/>.
        </t>
      </section>

      <section title="IBN for Sofware-Defined Vehicle Management">
        <t>Software-Defined Vehicle (SDV) is an electrical vehicle with a
        software platform (e.g., AUTOSAR <xref target="AUTOSAR"/>, Eclipse
        SDV <xref target="Eclipse-SDV"/>, and COVESA <xref target="COVESA"/>) 
        towards autonomous vehicles in Intelligent Transportation Systems (ITS).
        An SDV is constructed by a software platform having a cloud-native
        system (e.g., Kubernetes <xref target="Kubernetes"/>) and
        has its internal network (e.g., a giga-bit Ethernet).
        For facilitating the easy and efficient configuration of networks,
        security, and applications in the SDV'S in-vehicle networks, an
        intent-based management is required. An intent-based management
        framework for SDVs is proposed by <xref
        target="I-D.jeong-opsawg-intent-based-sdv-framework"/>. This framework
        lets SDVs be configured and monitored by a vehicular cloud in terms of
        networks, security, and applications in SDVs. In this framework, SDVs
        can communicate with other SDVs and infrastructure nodes for safe
        driving and infotainment services in ITS.</t>

	<figure anchor="figure:Intent-Life-Cycle-of-IBS-for-SDV-Management" align="center"
     title="The Intent Life Cycle of IBS for SDV Management">
          <artwork align="left">
       SDV User      :            Translation/          : Network Ops/
        Space        :             IBS Space            :  App Space
Fulfill              :                                  :
       +----------+  :  +------------+   +------------+ : +-----------+
       |Recognize/|----&gt;| Translate/ |--&gt;|   Learn/   |--&gt;| Configure/|
       | Generate |  :  |   Refine   |   |   Plan/    | : | Provision |
       | Intent   |&lt;----|            |   |   Render   | : |           |
       +----------+  :  +------------+   +------------+ : +-----------+
            ^        :                         ^        :       |
............|..................................|................|.....
            |        :                    +----------+  :       v
            |        :                    | Validate |  :  +----------+
            |        :                    +----^-----+&lt;----| Monitor/ |
Assure      |        :                         |        :  | Observe  |
        +--------+   :  +----------+      +----------+&lt;----|          |
        | Report |&lt;-----| Abstract |&lt;-----| Analyze/ |  :  +----------+
        +--------+   :  +----------+      | Aggregate|  :
                     :                    +----------+  :
        </artwork>
        </figure>

        <t>According to the intent life cycle of an Intent-Based System (IBS) in
        <xref target="RFC9315"/>, as shown in <xref target="figure:Intent-Life-Cycle-of-IBS-for-SDV-Management"/>,
        the intent life cycle of the IBS for SDVs can be enforced for SDV
        management. The life cycle consists of three spaces, namely SDV User
        Space, Translation &amp; IBS Space, and Network Operations (Ops) &amp;
        Application (App) Space. These spaces are divided into two phases in
        the life cycle space, such as fulfillment and assurance. The
        fulfillment phase (denoted as &ldquo;Fulfill&rdquo;) pipelines the steps for an
        intent enforcement, such as intent input, translation/refinement,
        learning/planning/rendering, and configuration/provisioning toward the
        target Service Functions (SFs), such as Network Functions (NFs) and
        Application Functions (AFs) in SDVs. On the other hand, the assurance
        phase (denoted as &ldquo;Assure&rdquo;) performs the steps for an intent validation
        and optimization by collecting final results of the intent fulfillment
        from the NFs and AFs for SDVs. If an action for the found problem is
        needed, the life cycle inserts a reconfigured policy or feedback
        information into the fulfillment phase or report a required action to
        an SDV User.</t>

        <figure anchor="figure:Intent-Based-SDV-Management-Framework"
                title="Intent-Based Management Framework for Software-Defined Vehicles">
          <artwork>   
                        &lt;Vehicular Cloud (VC)&gt;            
+---------------------------------------------------------------------+
| +------------------+                      +--------------------+    |
| |     SDV User     |          +----------&gt;|    SDV Database    |    |
| +------------------+          |           +--------------------+    |
|          ^                    |                     ^               |
|          |                    | Database            | Database      |
|          |                    | Interface           | Interface     |
|          | Consumer-Facing    |                     V               |
|          | Interface (Intent) |           +--------------------+    |
|          |                    | +--------&gt;|    Cloud Analyzer  |&lt;-+ |
|          |                    | |         +--------------------+  | |
|          V                    | |Analytics                        | |
| +------------------+&lt;---------+ |Interface                        | |
| | Cloud Controller |&lt;-----------+         +--------------------+  | |
| +------------------+&lt;--------------------&gt;|Vendor's Mgmt System|  | |
|          ^         Registration Interface +--------------------+  | |
|          |                                          ^             | |
+----------|------------------------------------------|-------------|-+
           | Controller-Facing Interface   VMS-Facing |   Analyzer- |  
           |     (High-level Policy)        Interface |   Facing    |
           |                                          |   Interface |            
+----------|------------------------------------------|-------------|-+
|          |                                          |             | |
|          v                                          v             | |
| +------------------+     Registration     +--------------------+  | |
| |  SDV Controller  |&lt;--------------------&gt;|    SDV Vendor's    |  | |
| +------------------+      Interface       |    Mgmt System     |  | |
|          ^      ^                         +--------------------+  | |
|          |      |                                                 | |
|          |      |                                                 | |
|          |      |   Analytics Interface   +--------------------+  | |
|          |      +------------------------&gt;|    SDV Analyzer    |&lt;-+ |
|          |                                +--------------------+    |
|          | SF-Facing Interface                      ^               |
|          |  (Low-level Policy)                      |               |
|          |                                          |               |
|          |    +--------------+----------------------+---+           |
|          |    |              |   Monitoring Interface   |           |
|          v    v              v                          v           |
|   +---------------+  +---------------+        +---------------+     |
|   |     SF-1      |  |     SF-2      |........|     SF-n      |     |
|   |   (Router)    |  |  (Firewall)   |        |  (Navigator)  |     |
|   +---------------+  +---------------+        +---------------+     |
+---------------------------------------------------------------------+
                  &lt;Software-Defined Vehicle (SDV)&gt;
            </artwork>
        </figure>

        <t><xref target="figure:Intent-Based-SDV-Management-Framework"/> shows
        a framework of intent-based management for SDVs. The framework
        consists of a vehicular cloud and SDVs. The two parts of Vehicular
        Cloud and SDV borrow the components and interfaces of the I2NSF
        framework in <xref target="RFC8329"/><xref target="I-D.jeong-i2nsf-security-management-automation"/>
        and customize their components and interfaces for IBN-based SDV
        management.</t>

        <t>
        For simplicy, Vehicular Cloud can be treated as SDV User (i.e., 
        network administrator) like I2NSF User in <xref target="RFC8329"/>.
        In this case, the SDV framework in <xref target="figure:Intent-Based-SDV-Management-Framework"/>
        is similar to the I2NSF framework in <xref target="RFC8329"/>.
        </t>
      </section>

      <section title="IBN for Interconnection">
        <t>New network capabilities based on programmability and
        virtualization are producing service situations where a
        connectivity-only approach is not sufficient. The increasing
        availability of computing capabilities, which are either internal to
        the networks or attached to them, enables new scenarios where those
        capabilities can be consumed through the advertisement or exposure
        of these execution environments (i.e., compute, storage, and
        associated networking resources). In addition to that, even services
        or network functions could be advertised in order to make them
        available for interconnection.
        </t>

        <t><xref target="figure:Fulfillment-Phase-of-Interconnection-Intent"/>
        captures the intent procedure for the fulfillment phase of the
        Interconnection Intent.
        Note that SLO, SLE, and SDP stand for &ldquo;Service Level Objective&rdquo;,
        &ldquo;Service Level Expectation&rdquo;, and &ldquo;Service Demarcation Point&rdquo;,
        respectively.
        </t>

        <figure anchor="figure:Fulfillment-Phase-of-Interconnection-Intent"
                align="center"
                title="Fulfillment Phase of Interconnection Intent">
          <artwork align="left">
         User Space   :       Translation / IBS       :  Network Ops
                      :            Space              :     Space
                      :                               :
        +----------+  :  +----------+   +-----------+ : +-----------+
Fulfill |recognize/|---&gt; |translate/|--&gt;|  learn/   |--&gt;| configure/|
        |generate  |     |          |   |  plan/    |   | provision |
        |intent    |&lt;--- |  refine  |   |  render   | : |           |
        +----------+  :  +----------+   +-----------+ : +-----------+
                      :                               :
.........................................................................

      Provider A      :                   Provider B
      ----------      :                   ----------
                      :
 - Select             : - Mapping of intent types to  : - Establishment of
   interconnection    :   protocols / APIs for        :   protocol sessions
   intent type        :   coveying targeted resources :   or API requests
 - Specify targeted   : - Parametrization of the      :   to configure or     
   resources (e.g.,   :   protocols / APIs, e.g.,     :   provision
   routes, compute    :   leveraging data models      :   targeted resources
   quotes, and service:                               :    
   functions)         :                               :
          </artwork>
        </figure>

        <t>Similarly, <xref target="figure:Assurance-Phase-of-Interconnection-Intent"/>
        sketches the intent procedure for the assurance phase of the
        Interconnection Intent.</t>

        <figure anchor="figure:Assurance-Phase-of-Interconnection-Intent"
                align="center"
                title="Assurance Phase of Interconnection Intent">
          <artwork align="left">
                      :                  +--------+   :         
                      :                  |validate|   :  +----------+
                      :                  +----^---+ &lt;----| monitor/ |
Assure   +-------+    :  +---------+    +-----+---+   :  | observe/ |
         |report | &lt;---- |abstract |&lt;---| analyze | &lt;----|          |
         +-------+    :  +---------+    |aggregate|   :  +----------+
                      :                 +---------+   :
.....................................................................

      Provider A      :                   Provider B
      ----------      :                   ----------
                      :
 - Analysis of the    : - Checking of monitored data  : - Collection of
   reported metrics   :   for inner closed-loop to    :   telemetry 
   against the intent :   ensure committed SLOs       :   information 
   request            :                               :   related to
 - Trigger of actions : - Aggregation of data to      :   allocated
   if needed, e.g.,   :   produce an abstracted view  :   resources (e.g.,
   new intent (outer  :   fitted to the intent request:   routes, compute,
   closed-loop)       :                               :   quotes, and 
                      :                               :   service functions)
          </artwork>
        </figure>

        <t>
        In <xref target="figure:Fulfillment-Phase-of-Interconnection-Intent"/>
        and <xref target="figure:Assurance-Phase-of-Interconnection-Intent"/>,
        both Fulfillment and Assurance phases are integral parts of the
        Interconnection Intent, respectively, according to the intent life
        cycle in <xref target="RFC9315"/>.
        For the more detailed discussion on an intent-based interconnection
        framework, refer to 
        <xref target="I-D.contreras-nmrg-interconnection-intents"/>.        
       </t>
      </section>

      <section title="IBN for IETF Network Slices">
        <t>Network slicing is emerging as a future model for service
        offering in telecom operator networks. Conceptually, network slicing
        provides a customer with an apparent dedicated network which is built
        on top of logical (i.e., virtual) and/or physical functions and
        resources supported by a shared infrastructure.
        This infrastructure is provided by one or more telecom operators. 
        As part of an End-to-End (E2E) network slice, it is expected to
        have a number of network slices at a transport level (referred as
        IETF network slices) providing the necessary connectivity to the rest
        of components of the E2E slice, e.g., mobile packet core slice.</t>

        <t>With this respect, the GSMA <xref target="GSMA"/> has been
        developing a universal blueprint that can be used by any vertical
        customer to request the deployment of a Network Slice Instance (NSI)
        based on a specific set of service requirements. Such a blueprint is
        a network slice descriptor called Generic Slice Template (GST). The
        GST contains multiple attributes that can be used to characterize a
        network slice. A particular template filled with values generates a
        specific Network Slice Type (NEST).</t>

        <t>The previous slice templates provide a number of parameters that
        functionally characterizes the behavior of the network slice as
        expected by the slice customer. However, apart from the slice
        characteristics, further information is needed in order to request the
        realization of a slice towards the IETF Network Slice Controller (NSC),
        such as the identification of the slice endpoints and information about
        the virtual network topology expected to form the requested IETF
        Network Slice.</t>

        <t><xref target="figure:Fulfillment-Phase-of-IETF-Network-Slice-Service-Intent"/>
        captures the intent procedure for the fulfillment phase of
        the IETF Network Slice Service Intent.
        Note that NBI and SBI stand for &ldquo;Northbound Interface&rdquo;
        and &ldquo;Southbound Interface&rdquo;, respectively.</t>

        <figure anchor="figure:Fulfillment-Phase-of-IETF-Network-Slice-Service-Intent"
                align="center"
                title="Fulfillment Phase of IETF Network Slice Service Intent">
          <artwork align="left">          
         User Space   :       Translation / IBS       :  Network Ops
                      :            Space              :     Space
                      :                               :
        +----------+  :  +----------+   +-----------+ : +-----------+
Fulfill |recognize/|---&gt; |translate/|--&gt;|  learn/   |--&gt;| configure/|
        |generate  |     |          |   |  plan/    |   | provision |
        |intent    |&lt;--- |  refine  |   |  render   | : |           |
        +----------+  :  +----------+   +-----------+ : +-----------+
                      :                               :
.......................................................................

    Slice Customer    :                   Slice Provider
    --------------    :                   --------------
                      :
   - Customized Slice :  - Identification of IETF     : - Slice request
     Templates        :    network slice endpoints    :   to IETF NSC
   - Service SLOs as  :    and connectivity patterns  :   by using slice
     understood by    :  - Derivation of network SLOs :   NBI YANG model 
     Slice Customer   :    and SLEs from high-level   :
                      :    Customer Service SLOs      :
          </artwork>
        </figure>

        <t>Similarly, <xref target="figure:Assurance-Phase-of-IETF-Network-Slice-Service-Intent"/>
        sketches the intent procedure for the assurance phase
        of the IETF Network Slice Service Intent.</t>

        <figure anchor="figure:Assurance-Phase-of-IETF-Network-Slice-Service-Intent"
                align="center"
                title="Assurance Phase of IETF Network Slice Service Intent">
          <artwork align="left">
                       :                  +--------+   :         
                       :                  |validate|   :  +----------+
                       :                  +----^---+ &lt;----| monitor/ |
 Assure   +-------+    :  +---------+    +-----+---+   :  | observe/ |
          |report | &lt;---- |abstract |&lt;---| analyze | &lt;----|          |
          +-------+    :  +---------+    |aggregate|   :  +----------+
                       :                 +---------+   :
   .....................................................................

     Slice Customer    :                   Slice Provider
     --------------    :                   --------------
                       :
  - Analysis of the    : - Checking of monitored data  : - Collection of
    reported metrics   :   for inner closed-loop       :   monitoring 
    against the slice  :   to ensure committed SLOs and:   information
    request            :   SLEs                        :   related to the 
  - Trigger of actions : - Aggregation of data         :   slice (e.g.,
    if needed, e.g.,   :   producing an abstracted view:   SLOs and SLEs 
    slice modification :   fitted to the slice request :   of connectivity
    (outer closed-loop):                               :   constructs and 
                       :                               :   SDP)
          </artwork>
        </figure>

        <t>
        In <xref target="figure:Fulfillment-Phase-of-IETF-Network-Slice-Service-Intent"/>
        and <xref target="figure:Assurance-Phase-of-IETF-Network-Slice-Service-Intent"/>,
        both Fulfillment and Assurance phases are integral parts of the
        IETF Network Slice Service Intent, respectively, according to the
        intent life cycle in <xref target="RFC9315"/>.
        For the more detailed discussion on an intent-based network
        slice service framework along with those terms, refer to 
        <xref target="I-D.contreras-nmrg-transport-slice-intent"/>.
        </t>
      </section>


      <section title="IBN for Green Service Management">
        <t>With the increasing need for sustainability in network services, Intent-Based Networking 
        can be applied to enable customers to express green service objectives as network intents <xref target="I-D.contreras-nmrg-green-intent"/>. 
        These intents allow customers to specify constraints and preferences related to energy consumption, 
        carbon emissions, and the use of renewable energy in the provisioning and management of network 
        services.</t>

        <t>The green service intent includes attributes such as:</t>

        <t>
          <list style="symbols">
            <t>Energy Consumption: Specifies maximum thresholds for total energy used by the network service.</t>
            <t>Energy Efficiency: Specifies minimum thresholds for energy efficiency metrics (e.g., bits per Joule).</t>
            <t>Carbon Emissions: Specifies limits on carbon intensity (grams CO2 per kWh) associated with the service.</t>
            <t>Use of Renewable Energy: Specifies minimum ratios of renewable energy sources powering the network functions.</t>
          </list>
        </t>

        <t>These attributes can be specified individually or combined in a green intent, allowing flexible 
        expression of sustainability goals.</t>

        <t><xref target="figure:Fulfillment-Phase-of-Green-Intent"/>
        captures the intent procedure for the fulfillment phase of
        the Green Intents.</t>

        <figure anchor="figure:Fulfillment-Phase-of-Green-Intent"
                align="center"
                title="Fulfillment Phase of the Green Service Intent">
          <artwork align="left">          
         User Space   :       Translation / IBS       :  Network Ops
                      :            Space              :     Space
                      :                               :
        +----------+  :  +----------+   +-----------+ : +-----------+
Fulfill |recognize/|---&gt; |translate/|--&gt;|  learn/   |--&gt;| configure/|
        |generate  |     |          |   |  plan/    |   | provision |
        |intent    |&lt;--- |  refine  |   |  render   | : |           |
        +----------+  :  +----------+   +-----------+ : +-----------+
                      :                               :
.......................................................................

        Customer      :                      Provider
       ----------     :                     ----------
                      :
   - Generate a green : - Translation of attributes as: - Configuration
     intent using one :   constraints to check against:   of the network
     or more of the   :   pre-defined policies        :   according to
     attributes in the:                               :   policies 
     document         :                               :
          </artwork>
        </figure>

        <t>The process begins when the customer generates a green intent that specifies the desired 
        sustainability and energy-efficiency objectives for the network service. This intent is then interpreted 
        by the intent translation module, which converts the high-level green objectives into concrete network 
        policies and constraints. Next, the policy mapping module enforces these constraints by selecting 
        appropriate network resources and configurations that align with the green goals, for instance, routing 
        traffic through energy-efficient paths, leveraging equipment with lower carbon footprints, or prioritizing 
        data centers powered by renewable energy. Finally, the configuration and provisioning modules deploy these 
        configurations across the network infrastructure to realize the intended green service objectives.</t>

        <t>Similarly, <xref target="figure:Assurance-Phase-of-Green-Intent"/>
        sketches the intent procedure for the assurance phase
        of the Green Service Intent.</t>

        <figure anchor="figure:Assurance-Phase-of-Green-Intent"
                align="center"
                title="Assurance Phase of the Green Service Intent">
          <artwork align="left">
                       :                  +--------+   :         
                       :                  |validate|   :  +----------+
                       :                  +----^---+ &lt;----| monitor/ |
 Assure   +-------+    :  +---------+    +-----+---+   :  | observe/ |
          |report | &lt;---- |abstract |&lt;---| analyze | &lt;----|          |
          +-------+    :  +---------+    |aggregate|   :  +----------+
                       :                 +---------+   :
   .....................................................................

        Customer      :                      Provider
       ----------     :                     ----------
                      :
  - Analysis of the   : - Checking of monitored data : - Collection of
    reported metrics  :   for internal closed loops  :   green metrics
    against the intent:   to ensure commited SLOs    :   [I-D.cx-green
    request           :   (inner closed loop)        : - green-metrics]
  - Trigger of actions: - Exposure of green data by  :   suitable for
    if needed (outer  :   APIs, e.g.                 :   the intent
    closed loop)      :   [I-D.petra-green-api]      :   attributes
          </artwork>
        </figure>

        <t>In the case of assurance, monitoring modules continuously collect green metrics
         from various network elements. The gathered information is then analyzed by an analytics 
         or validation module, which evaluates the network's performance and checks compliance with 
         the established green intent objectives based on standardized green networking metrics. 
         If any discrepancies or deviations from the intended goals are detected, the optimization module 
         intervenes by adjusting network policies or reallocating resources to better align with the green 
         objectives. In some cases, this process may also trigger a renegotiation or feedback loop with 
         the customer to refine the intent or update the service parameters accordingly.</t>

        <t>The green intents build upon existing green networking metrics and standardized APIs for energy 
        and carbon reporting, such as those defined in <xref target="I-D.cx-green-green-metrics"/> and 
        <xref target="I-D.petra-green-api"/>. Within this framework, the system must effectively manage trade-offs 
        between traditional Quality of Service (QoS) objectives and green goals, maintaining service reliability 
        and performance while optimizing energy efficiency and reduced emissions. Furthermore, the intent 
        framework should incorporate negotiation and validation mechanisms, recognizing that network providers 
        may only be able to partially fulfill green intents depending on their current infrastructure capabilities and 
        operational policies.</t>
      </section>
      
      <section anchor="section:IBN-Methodology-Usage" title="IBN Methodology Usage on IBN Use Cases">
      <t>
      This section analyzes how the IBN methodology is applied to each IBN
      use case in <xref target="section:IBN-Use-Cases"/>.
      <xref target="figure:IBN-Methodology-Analysis"/> shows a table for the
      IBN methodology analysis for IBN use cases in <xref target="section:IBN-Use-Cases"/>.
      In the table, C1 through C8 represent the construction numbers of IBN 
      the construction of an IBN system in <xref target="section:IBN-System-Construction"/>.
      The "X" in the table refers to a construction number supported by each 
      IBN use case, such as C1: Intent Translation, C2: Policy Translation, C3:
      Policy Verification, C4: Policy Deployment, C5: Policy Monitoring, C6:
      Policy Validation, C7: Policy Optimization, and C8: Intent Report.
      </t>
      <figure anchor="figure:IBN-Methodology-Analysis" align="left"
      title="IBN Methodology Analysis for IBN Use Cases">
          <artwork align="left">
+=======+=============+================================================+
|Section|Use Case                              |Construction Number    |
|Number |                                      |C1|C2|C3|C4|C5|C6|C7|C8|
+=======+======================================+==+==+==+==+==+==+==+==+
|3.1.1  |IBN for Service Function Chaining     |X |X |X |X |X |X |  |  |
+=======+======================================+==+==+==+==+==+==+==+==+
|3.1.2  |IBN for SRv6 Networks                 |  |X |X |X |X |X |X |X |
+=======+======================================+==+==+==+==+==+==+==+==+
|3.2    |IBN for Guaranteeing SLA              |  |X |X |X |X |X |X |  |
+=======+======================================+==+==+==+==+==+==+==+==+
|3.3    |IBN for Cloud-Based Security System   |  |X |X |X |X |X |X |X |
+=======+======================================+==+==+==+==+==+==+==+==+
|3.4    |IBN for IoT Device Management in 5G   |  |X |X |X |X |X |X |X |
+=======+======================================+==+==+==+==+==+==+==+==+
|3.5    |IBN for Sofware-Defined Vehicle       |X |X |X |X |X |X |X |X |
+=======+======================================+==+==+==+==+==+==+==+==+
|3.6    |IBN for Interconnection               |X |X |X |X |X |X |X |X |
+=======+======================================+==+==+==+==+==+==+==+==+
|3.7    |IBN for IETF Network Slices           |X |X |X |X |X |X |X |X |
+=======+======================================+==+==+==+==+==+==+==+==+
|3.8    |IBN for Green Service Management      |X |X |X |X |X |X |X |X |
+=======+======================================+==+==+==+==+==+==+==+==+
          </artwork>
      </figure>
      </section>

      <section anchor="section:Intent-Taxonomy-Usage" title="Intent Taxonomy Usage on IBN Use Cases">
      <t>
      This section analyzes how the intent taxonomy in <xref target="RFC9316"/>
      can be applied to each use case in <xref target="section:IBN-Use-Cases"/>.
      <xref target="figure:Intent-Taxonomy"/> shows a diagram of Intent Taxonomy for the
      IBN Methodology Analysis for IBN use cases in <xref target="section:IBN-Use-Cases"/>.
      In this diagram, an Intent has seven intent components as follows:
        <list style="symbols">
          <t>A: Intent Solution</t>
          <t>B: Intent User Type</t>
          <t>C: Intent Type</t>
          <t>D: Intent Scope</t>
          <t>E: Network Scope</t>
          <t>F: Abstraction</t>
          <t>G: Life Cycle</t>
        </list>
      </t>

      <figure anchor="figure:Intent-Taxonomy" align="left"
      title="Intent Taxonomy">
          <artwork align="left">
                             +---------------------------------------+
                         +--&gt;|1: Carrier 2: Enterprise 3: Data Center|
                         |   +---------------------------------------+
                         |   +---------------------------------+
           +----------+  |   |1: Customer/Subscriber/End User  |
         +&gt;+A: Intent +--+   |2: Network or Service Operator   |
         | |Solution  |      |3: Application Developer         |
         | +----------+   +-&gt;|4: Enterprise Administrator      |
         |                |  |5: Cloud Administrator           |
         | +----------+   |  |6: Underlay Network Administrator|
         +&gt;+B: Intent +---+  +---------------------------------+
         | |User      |      +-----------------------------------+
         | |Type      |      |1: Customer Service Intent         |
         | +----------+      |2: Strategy Intent                 |
         | +----------+      |3: Network Service Intent          |
         +&gt;+C: Intent +-----&gt;|4: Underlay Network Service Intent |
+------+ | |Type      |      |5: Network Intent                  |
|Intent+-+ +----------+      |6: Underlay Network Intent         |
+------+ |                   |7: Operational Task Intent         |
         | +----------+      |8: Cloud Management Intent         |
         +&gt;+D: Intent +---+  |9: Cloud Resource Management Intent|
         | |Scope     |   |  +-----------------------------------+
         | +----------+   |  +-----------------------------------------+
         |                +-&gt;|1: Connectivity 2: Application  3: QoS   |
         | +----------+      |4: Security/Privacy 5: Storage 6: Compute|
         +&gt;+E: Network+---+  +-----------------------------------------+
         | |Scope     |   |  +-----------------------------------+
         | +----------+   |  |1: Radio Access      2: Branch     |
         |                +-&gt;|3: Transport Access  4: SD-WAN     |
         | +----------+      |5: Transport Aggr.   6: VNF  7: PNF|
         +&gt;+F: Abstra-+----+ |8: Transport Core    9: Physical|
         | |ction     |    | |10: Cloud Edge       11: Logical   |
         | +----------+    | |12: Cloud Core       13: Campus    |
         | +----------+    | +-----------------------------------+
         +&gt;+G: Life   |    | +-------------------------------------+
           |Cycle     +--+ +&gt;|1: Technical         2: Non-Technical|
           +----------+  |   +-------------------------------------+
                         |   +-------------------------------------+
                         +--&gt;|1: Persistent        2: Transient    |
                             +-------------------------------------+
          </artwork>
      </figure>      

      <t>
      For the use cases in <xref target="section:IBN-Use-Cases"/>, 
      <xref target="figure:Intent-Taxonomy-Analysis"/> shows a table for the
      Intent Taxonomy Analysis by <xref target="RFC9316"/>.
      The "Xi" in the table refers to a value "i" (defined in <xref target="figure:Intent-Taxonomy"/>)
      for an intent component "X" in <xref target="RFC9316"/>. 
      For example, in <xref target="figure:Intent-Taxonomy-Analysis"/>,
      "IBN for Service Function Chaining" in <xref target="section:IBN-Service-Function-Chaining"/>
      has the following intent taxonomy:
        <list style="symbols">
          <t>A: Intent Solution =&gt; A1: Carrier</t>
          <t>B: Intent User Type =&gt; B2: Network or Service Operator</t>
          <t>C: Intent Type =&gt; C3: Network Service Intent</t>
          <t>D: Intent Scope =&gt; D2: Application</t>
          <t>E: Network Scope =&gt; E4: SD-WAN</t>
          <t>F: Abstraction =&gt; F1: Technical</t>
          <t>G: Life Cycle =&gt; G1: Persistent</t>
        </list>
       </t>

       <t>
       For the other use cases in <xref target="figure:Intent-Taxonomy-Analysis"/>,
       the intent taxonomy per use case can be interpreted in the same way with
       the above use case of "IBN for Service Function Chaining". 
      </t>
      <figure anchor="figure:Intent-Taxonomy-Analysis" align="left"
      title="Intent Taxonomy Analysis for IBN Use Cases">
          <artwork align="left">
+=======+=============+=============================================+
|Section|Use Case                              |Intent Taxonomy     |
|Number |                                      |A |B |C |D |E |F |G |
+=======+======================================+==+==+==+==+==+==+==+
|3.1.1  |IBN for Service Function Chaining     |1 |2 |3 |2 |4 |1 |1 |
+=======+======================================+==+==+==+==+==+==+==+
|3.1.2  |IBN for SRv6 Networks                 |1 |6 |6 |1 |8 |1 |1 |
+=======+======================================+==+==+==+==+==+==+==+
|3.2    |IBN for Guaranteeing SLA              |2 |4 |5 |3 |4 |1 |1 |
+=======+======================================+==+==+==+==+==+==+==+
|3.3    |IBN for Cloud-Based Security System   |2 |4 |3 |4 |10|2 |1 |
+=======+======================================+==+==+==+==+==+==+==+
|3.4    |IBN for IoT Device Management in 5G   |2 |1 |1 |2 |6 |2 |2 |
+=======+======================================+==+==+==+==+==+==+==+
|3.5    |IBN for Sofware-Defined Vehicle       |2 |3 |1 |2 |6 |2 |1 |
+=======+======================================+==+==+==+==+==+==+==+
|3.6    |IBN for Interconnection               |1 |2 |3 |2 |3 |1 |1 |
+=======+======================================+==+==+==+==+==+==+==+
|3.7    |IBN for IETF Network Slices           |1 |6 |6 |3 |4 |1 |1 |
+=======+======================================+==+==+==+==+==+==+==+
|3.8    |IBN for Green Service Management      |2 |1 |1 |2 |9 |2 |1 |
+=======+======================================+==+==+==+==+==+==+==+
          </artwork>
      </figure>      
    
      </section>
    </section>

    <section  anchor="section:Practice-Learnings" title="Practice Learnings">
      <section anchor="section:Difficulties-and-Challenges" title="Difficulties and Challenges" toc="default">
        <t>
        Some key learnings and takeaways can be extracted from the
        practices and implementation of IBN systems in different use cases.
        Commonly, there involve the following technical challenges in building
        IBN systems, incluing handling the dynamic and time variant nature of
        the network, the efficient management of cross-domain resources, and
        the reliability of automatic configuration, etc.
        </t>

        <t>
        First, Service Function Chaining (called SFC) in 
        <xref target="section:IBN-Service-Function-Chaining"/> showed the
        following three challenges:
        <list style="numbers">
          <t>Stability in Dynamic Network Environments:
          For instance, in the space-terrestrial networks where the network
          topology is with frequent changes, it is essential to design efficient
          service function chain reconstruction and service recovery mechanisms.
          But how to guarantee the effectiveness of the chaining rule in these
          scenarios is still a challenge.
          </t>

          <t>Collaborative Management of Cross-Domain SFC:
          To ensure the network intents across multi-domain networks,
          intent-based networks should be designed with a cross-domain
          orchestration and management framework to ensure an E2E
          optimization of Quality of Service (called QoS).
          </t>

          <t>Deployment under Resource-Constrained Conditions:
          It is important to consider how to effectively deploy and manage
          these service function chains within limited resources. Methods such
          as intent negotiation can be introduced to optimize resource
          allocation in the SFC.
          </t>
        </list>
        </t>

        <t>
        Second, Cloud-Based Security System (called CBSS) in 
        <xref target="section:IBN-Cloud-Based-Security-System"/> showed the
        following three challenges:
        <list style="numbers">
          <t>Security Intent Translation:
          A natural-language security intent needs to be translated into a
          high-level security policy according to the I2NSF Consumer-Facing YANG
          Data Model <xref target="I-D.ietf-i2nsf-consumer-facing-interface-dm"/>.
          This intent translation should use the syntax of the YANG data model
          even where a train dataset with security policies is small.
          To detect a hallucinated high-level security policy, the generated
          policy is double checked againt the syntax this YANG data model
          <xref target="Hallucination-Mitigation"/>.
          </t>

          <t>Security Policy Conflict Handling:
          A new security policy can conflict with an existing security policy, so
          the new security policy can be overlapped with the existing security policy
          or contradict with the existing security policy, which may invalidate the
          effect of the existing security policy.
          There are four kinds of security policy conflicts in 
          <xref target="Security-Misconfiguration"/> such as Shadowing Conflict, 
          Correlation Conflict, Redundancy Conflict, and Generalization Conflict.
          These conflicts should be resolved after an intent is translated into a
          high-level security policy.
          </t>

          <t>Dynamic Security Policy Enforcement: 
          It takes time to detect whether a traffic flow is related to a security
          attack or not. For a certain time period, a malicious traffic flow needs
          to be observed to see whether it has a negative impact on a target network.
          According to the severity of the impact of a traffic flow, the treatment 
          of the traffic flow at network forwarding elements (e.g., router and
          switch) should be adapted dynamically and proactively by an adaptive 
          decision-making (e.g., partial packet dropping and rerouting) in 
          Security Controller in the I2NSF framework <xref target="ICSC"/>.
          </t>
        </list>
        </t>
      </section>

      <section title="Future Research Directions">
        <t>Although there have been extensive research achievements from
        academic, industrial, and standardization fields, there are the
        following three future research considerations.

        <list style="numbers">
          <t>Generic Intent model for Full Life-Cycle Assurance:
          It is necessary to construct an intent model for the full
          life-cycle from both top-to-down and down-to-top perspectives,
          including the intent input state, the intent execution state, and the
          intent completion state, etc, merged in a generic logic model. It
          makes sense of ensuring the E2E guaranteed implementation of
          any network intent and verifying the intent state through consistent
          mathematical logic.
          </t>

          <t>Autonomous End-to-End Network Policy Generation:
          Intent-based networks should provide the network configuration
          policies to always well understand the requested network services
          in time, in particular towards various dynamic on-demand service
          requirements.
          Therefore, intent-based networks should make the network QoS
          satisfy the users&rsquo; Quality of Experience (QoE) from a vertical
          perspective of a network protocol or different intent holders.
          Meanwhile, the current network is based on domain-specific local
          policy optimization, and it is hard to ensure an E2E QoS guarantee,
          in particular a cross-domain global optimization.
          Therefore, intent-based networks should provide an E2E optimization
          policies across multi-domain networking applications.
          </t>

          <t>Intent Implementation with Large language Models (LLMs):
          Large language models (LLMs) such as Flan-T5 <xref target="Flan-T5"/>
          and GPT-3 <xref target="GPT-3"/>
          will play an important role in enhancing the accuracy of intent
          refinement, resulting from the powerful understanding capabilities
          of LLMs and the entity relationships in knowledge graphs
          <xref target="Knowledge-Graph"/>. It is also beneficial to network
          policy generation according to the network status. Although we have
          involved different kinds of AI models at each intent-based networks&rsquo;
          stages, there still lack of generality and accuracy. Meanwhile, 
          human interference is still in the full life-cycle of intent-based
          networks, and in the future the knowledge graph-assisted LLMs can
          further reduce the human intervention, and even make the human
          completely be out of the full life-cycle of the intent-based
          networks.
          </t>
        </list>
        </t>
      </section>
    </section>

    <section anchor="section:Discussion" title="Discussion">
      <t>
      This section discusses three aspects for the deployment of IBN systems
      on the real world. They are Multi-Domain Deployment, Network Digital
      Twin, and IBN with AI. 
      </t>

      <section title="Multi-Domain Dichotomy for IBN">
        <t>
        IBN shows two different aspects and relations with multi-domain concepts
        such as multi-domain intents and multi-domain intent resolution.
        </t>

        <section anchor="section:Multi-Domain-Intents" 
                 title="Multi-Domain Intents">
          <t>
          Some network intents involve multiple domains. They can be explicit,
          especially when being expressed in a natural language, or implicit.
          The resolution of the former is generally straightforward. Probably
          a mapping is required to let the intent resolution system, e.g.,
          one following the specification in <xref target="I-D.pedro-ite"/>, 
          to know the real identity of the domain mentioned in the intent.
          </t>

          <t>
          On the other hand, the resolution of the implicit domains in network
          intents requires a much larger and consistent structure and mapping
          functions. They must be able to determine the involvement of
          multiple domains, and the reason must be clearly stated in the
          structures. For instance, if the network intent is resolved into a
          network service that involves a security function and the security
          function is only available at a different domain to the domain that
          is resolving the intent, the involvement of multiple domains is
          justified. Similarly, other scenarios must provide justifications
          for involving multiple domains implicitly.
          </t>
        </section>

        <section anchor="section:Multi-Domain-Intent-Resolution"
                 title="Multi-Domain Intent Resolution">
          <t>
          Regardless of a network intent being single-domain or multi-domain
          in <xref target="section:Multi-Domain-Intents"/>, a network intent
          can be resolved by a standalone system, i.e., doing single-domain
          intent resolution, or by multiple interconnected systems, i.e.,
          doing multi-domain intent resolution.
          </t>

          <t>
          Involving multiple domains in the resolution of an intent has many
          benefits, such as using bigger knowledge bases and bigger network
          function structures. This is particularly beneficial for multi-domain
          intents. However, it also means that network management systems must
          consider additional security concerns and general domain information
          borders and policies for its transmission. This is being actively
          researched, but results are still early to say that a consistent
          multi-domain system can be built for network intent resolution.
          </t>            
        </section>
      </section>

      <section title="The Integration of IBN and Network Digital Twin">
        <t>
        As described in <xref target="I-D.irtf-nmrg-network-digital-twin-arch"/>, 
        the Network Digital Twin (NDT) can be an important enabler platform for
        implementing IBN systems and fostering their deployment.
        A user gives his (or her) intent to the network system with NDT. 
        Through the closed-loop control with monitoring, validation, and
        adjustment in NDT, the IBN-based network management will be effectively
        performed with a minimum trial and error in the real networks.
        For more details on IBN interaction with Network Digital Twin, refer to 
        Section 10 of <xref target="I-D.irtf-nmrg-network-digital-twin-arch"/>.        
        </t>        
      </section>  

      <section title="IBN with AI">
        <t>This section proposes some discussions on IBN with AI. AI techniques
        have been integrated by IBN, but there is still much space in
        researching on topics related to IBN with AI, such as different
        learning patterns, AI agents, and agentic AI.
        </t>
        
        <section title="Transfer Learning">
          <t><xref target="I-D.cgfabk-nmrg-ibn-generative-ai"/> describes how
          transfer learning techniques can be	adopted to design generative AI
          specialized models for IBN.
          </t>
		
		      <t>IBN represents a paradigm shift in network management, aiming to
          bridge the gap between business objectives and network
          configurations. IBN allows operators to specify high-level intents,
          which the system then automatically translates, enforces, and
          continuously validates. Generative AI, particularly Large Language
          Models (LLMs), can enhance IBN by automating intent parsing, policy
          generation, and network troubleshooting. LLMs can understand 
          natural language intents, generate high-level policies, and adapt
          the policies in real time. Transfer learning enables pretrained
          models to adapt to specific tasks with significantly less data and
          computational resources. In the context of IBN, this approach offers
          a dual advantage: (i) enhancing the efficiency of model training and 
          (ii) improving the reliability of intent recognition and execution.
          </t>
	      </section>

        <section anchor="section:IBN-AI-agent"
                 title="AI Agent-Enabled IBN">          
          <t>In the future, IBN will be closely intertwined with AI Agents and
          Multi-Agent systems. Multi-Agent systems, equipped with capabilities
          of distributed perception, collaborative decision-making, and
          autonomous execution, will serve as the core technical engine for IBN
          to achieve full-process automation. For example, the Confucius
          framework in <xref target="Confucius "/> has proven that multi-agent
          collaboration can improve the accuracy of network management tasks
          by over 34%.
          </t>

          <t>The core research issues in the integration of the IBN with AI
          focus on three dimensions as follows:
          <list style="numbers">      
            <t>Accurate translation and decomposition of intents: This 
            dimension considers the accuracy of intent translation. It needs to
            resolve the ambiguity of intents expressed in a natural language.
            </t> 

            <t>Collaboration and management of multi-agents: This dimension
            considers network scalability. As the network scale expands, the
            increase in the number of agents leads to issues such as decision
            consistency and resource competition. Additionally, it is necessary
            to handle the reasonable decomposition and dependency management of
            complex tasks among multiple agents.
            </t>
          
            <t>System reliability and security: This dimension considers the 
            stability and cybersecurity. This not only includes the logical
            verification of instructions generated by AI Agents (e.g., 
            Domain-Specific Language (DSL) syntax compliance) but also involves
            issues such as data privacy protection, malicious behavior
            identification, and Byzantine fault tolerance in agent interactions.
            Note that the Byzantine fault tolerance allows the IBN systems to
            keep operating correctly or reach right consensus even if some
            components of the IBN systmes are malicious or faulty.
            </t>
          </list>
          </t>
          
          <t>Potential research directions and technologies can be as follows:
          <list style="symbols">
            <t>Enhanced intent understanding: It optimizes intent parsing by
            combining domain knowledge graphs <xref target="Knowledge-Graph"/>
            and Retrieval-Augmented Generation (RAG) <xref target="RAG"/>. 
            It can realize simulation verification and preview of intents 
            (e.g., What-If analysis) through digital twins.
            </t>

            <t>Efficient multi-agent collaborative architectures: It adopts a
            hierarchical agent design to reduce cross-layer communication
            overhead. Federated learning may enable dynamic task scheduling
            and parallel execution while protecting local data in each agent.
            </t>

            <t>Trusted agent technologies: It includes a multi-layer 
            verification mechanism of &ldquo;agent pre-verification&rdquo; and
            &ldquo;manual approval&rdquo; and also abnormal behavior detection
            algorithms based on traffic fingerprints.
            </t>

            <t>Performance acceleration and resource optimization technologies:
            It matches the computing power needs of agents with network loads
            through dynamic resource scheduling algorithms to improve the
            operational efficiency of the IBN systems.
            </t>
          </list>
          </t>
        </section>
      </section>  
    </section>

    <section anchor="Security" title="Security Considerations">
      <t>There are many considerations on security. First, the IBN systems
       should be strong and resilient against variable security attacks from
       outsider attacks (e.g., Distributed-Denial-of-Service (DDoS) attacks and virus)
       and to insider attacks (e.g., supply chain attacks).
       </t>

       <t>
       A malicious intent can break down the whole IBN system if the analysis
       of each intent for the impact on the IBN system is not performed 
       appropriately on time. Thus, the IBN defense system should execute both
       the security check for an intent during the Fulfillment Phase and the
       attack monitoring during the Assurance Phase. Such security check and
       attack monitoring need to be performed by the collaboration between AI
       agents and network administrators.       
       </t>
    </section>

    <section anchor="IANA" title="IANA Considerations">
      <t>This document has no requests to IANA.</t>
    </section>

  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.2119"?>

      <?rfc include="reference.RFC.6241"?>

      <?rfc include="reference.RFC.7665"?>      

      <?rfc include="reference.RFC.8040"?>

      <?rfc include="reference.RFC.8329"?>

      <?rfc include="reference.RFC.9256"?>

      <?rfc include="reference.RFC.9315"?>

      <?rfc include="reference.RFC.9316"?>

      <?rfc include="reference.RFC.9341"?>
	  
      <?rfc include="reference.RFC.9342"?>
	  
      <?rfc include="reference.RFC.9197"?>
	  
      <?rfc include="reference.RFC.9326"?>
    </references>

    <references title="Informative References">
      <?rfc include='reference.I-D.gu-nmrg-intent-translator'?>

      <?rfc include='reference.I-D.pedro-ite'?>

      <?rfc include='reference.I-D.jeong-i2nsf-security-management-automation'?>

      <?rfc include='reference.I-D.ietf-i2nsf-consumer-facing-interface-dm'?>

      <?rfc include='reference.I-D.ietf-i2nsf-nsf-facing-interface-dm'?>

      <?rfc include='reference.I-D.ietf-spring-sr-policy-yang'?>

      <?rfc include='reference.I-D.jeong-nmrg-ibn-network-management-automation'?>

      <?rfc include='reference.I-D.jeong-opsawg-intent-based-sdv-framework'?>

      <?rfc include='reference.I-D.park-nmrg-ibn-network-management-srv6'?>

      <?rfc include='reference.I-D.contreras-nmrg-interconnection-intents'?>

      <?rfc include='reference.I-D.contreras-nmrg-transport-slice-intent'?>

      <?rfc include='reference.I-D.ydt-ippm-alt-mark-yang'?>

      <?rfc include='reference.I-D.fz-ippm-on-path-telemetry-yang'?>

      <?rfc include='reference.I-D.ietf-opsawg-ipfix-alt-mark'?>

      <?rfc include='reference.I-D.contreras-nmrg-green-intent'?>

      <?rfc include='reference.I-D.cx-green-green-metrics'?>

      <?rfc include='reference.I-D.petra-green-api'?>

      <?rfc include='reference.I-D.cgfabk-nmrg-ibn-generative-ai'?>

      <?rfc include='reference.I-D.xia-sdnrg-nemo-language'?>

      <?rfc include='reference.I-D.irtf-nmrg-network-digital-twin-arch'?>
	  
      <reference anchor="INT" target="https://doi.org/10.1016/j.comnet.2020.107763">
        <front>
          <title>In-band Network Telemetry: A Survey</title>
          <author initials="L." surname="Tan" />
          <author initials="W." surname="Su" />
          <author initials="W." surname="Zhang" />
          <author initials="J." surname="Lv" />
          <author initials="Z." surname="Zhang" />
          <author initials="J." surname="Miao" />
          <author initials="X." surname="Liu" />
          <author initials="N." surname="Li" />
          <date month="February" year="2021" />
        </front>
        <seriesInfo name="Elsevier" value="Computer Networks, Volume 186" />
      </reference>    

      <reference anchor="IntFlow" target="https://ieeexplore.ieee.org/document/9079931">
        <front>
          <title>IntFlow: Integrating Per-Packet and Per-Flowlet Switching Strategy for Load Balancing in Datacenter Networks</title>
          <author initials="Q." surname="Shi" />
          <author initials="F." surname="Wang" />
          <author initials="D." surname="Feng" />
          <date month="September" year="2020" />
        </front>
        <seriesInfo name="IEEE" value="Transactions on Network and Service Management, Volume 17, Issue 3" />
      </reference>

      <reference anchor="AI-Intent-Network" target="https://doi.org/10.1109/MCOM.001.2400143">
        <front>
          <title>An AI-Driven Intent-Based Network Architecture</title>
          <author initials="Y." surname="Njah" />
          <author initials="A." surname="Leivadeas" />
          <author initials="M." surname="Falkner" />
          <date month="April" year="2025" />
        </front>
        <seriesInfo name="IEEE" value="Communications Magazine, Volume 63, Issue 4" />        
      </reference>

      <reference anchor="OpenStack" target="https://www.openstack.org">
        <front>
          <title>OpenStack: Open Source Cloud Computing Infrastructure</title>
          <author initials="" surname="OpenStack" />
        </front>
      </reference>

      <reference anchor="Flan-T5" target="https://arxiv.org/abs/2210.11416">
        <front>
          <title>Scaling Instruction-Finetuned Language Models</title>
          <author initials="H." surname="Chung" />
          <date month="October" year="2022" />
        </front>
        <seriesInfo name="arXiv" value="arXiv:2210.11416" />
      </reference>            

      <reference anchor="GPT-3" target="https://arxiv.org/abs/2005.14165">
        <front>
          <title>Language Models are Few-Shot Learners</title>
          <author initials="T." surname="Brown" />
          <date month="May" year="2020" />
        </front>
        <seriesInfo name="arXiv" value="arXiv:2005.14165" />
      </reference>            

      <reference anchor="Nile" target="https://doi.org/10.1145/3229584.3229590">
        <front>
          <title>Refining Network Intents for Self-Driving Networks</title>
          <author initials="A." surname="Jacobs" />
		      <author initials="R." surname="Pfitcher" />
		      <author initials="R." surname="Ferreira" />
		      <author initials="L." surname="Granville" />
          <date month="August" year="2018" />
        </front>
		<seriesInfo name="ACM" value="SIGCOMM 2018 Workshop on Self-Driving Networks (SelfDN)" />
      </reference>

      <reference anchor="Knowledge-Graph" target="https://ieeexplore.ieee.org/document/9416312">
        <front>
          <title>A Survey on Knowledge Graphs: Representation, Acquisition, and Applications</title>
          <author initials="S." surname="Ji" />
          <author initials="S." surname="Pan" />
          <author initials="E." surname="Cambria" />
          <author initials="P." surname="Marttinen" />
          <author initials="P." surname="Yu" />                   
          <date month="February" year="2022" />
        </front>
        <seriesInfo name="IEEE" value="Transactions on Neural Networks and Learning Systems, Volume 33, Issue 2" />
      </reference>

      <reference anchor="Circular-Reasoning" target="https://doi.org/10.1016/S0364-0213(02)00085-X">
        <front>
          <title>Circular Reasoning</title>
          <author initials="L." surname="Rips"/>
          <date month="November" year="2002"/>
        </front>
        <seriesInfo name="Wiley" value="Cognitive Science, Volume 26, Issue 6"/>
      </reference>

      <reference anchor="ETSI-NFV" target="https://www.etsi.org/deliver/etsi_gs/nfv/001_099/002/01.02.01_60/gs_nfv002v010201p.pdf">
        <front>
            <title>Network Functions Virtualisation (NFV); Architectural Framework</title>
            <author initials="" surname="ETSI" /> 
            <date month="December" year="2014" />
        </front>
        <seriesInfo name="ETSI" value="GS NFV 002 V1.2.1" />
      </reference>

      <reference anchor="ETSI-NFV-Release-2" target="https://www.etsi.org/deliver/etsi_gs/nfv/001_099/006/02.01.01_60/gs_nfv006v020101p.pdf">
        <front>
            <title>Network Functions Virtualisation (NFV) Release 2; 
            Management and Orchestration; Architectural Framework Specification</title>
            <author initials="" surname="ETSI" /> 
            <date month="January" year="2021" />
        </front>
        <seriesInfo name="ETSI" value="GS NFV 006 V2.1.1" />
      </reference>

      <reference anchor="DRL" target="https://ieeexplore.ieee.org/document/8714026">
        <front>
          <title>Applications of Deep Reinforcement Learning in Communications and Networking: A Survey</title>
          <author initials="N." surname="Luong"/>
          <author initials="D." surname="Hoang"/>
          <author initials="S." surname="Gong"/>
          <author initials="D." surname="Niyato"/>
          <author initials="P." surname="Wang"/>
          <author initials="Y." surname="Liang"/>                                        
          <date month="October" year="2019"/>
        </front>
        <seriesInfo name="IEEE" value="Communications Surveys &amp; Tutorials, Volume 21, Issue 4"/>
      </reference>

      <reference anchor="REST" target="https://dl.acm.org/doi/10.1145/514183.514185">
        <front>
          <title>Principled Design of the Modern Web Architecture</title>
          <author initials="R." surname="Fielding"/>
          <author initials="R." surname="Taylor"/>
          <date month="May" year="2002"/>
        </front>
        <seriesInfo name="ACM" value="Transactions on Internet Technology, Volume 2, Issue 2"/>
      </reference>

      <reference anchor="Confucius" target="https://doi.org/10.1145/3718958.3750537">
        <front>
          <title>Intent-Driven Network Management with Multi-Agent LLMs: The Confucius Framework</title>
          <author fullname="Zhaodong Wang" surname="Wang">
          <organization>Meta</organization>
          </author>
          <date year="2025"/>
        </front>
      </reference> 

      <reference anchor="SPT" target="https://ieeexplore.ieee.org/document/9416312">
        <front>
          <title>SPT: Security Policy Translator for Network Security Functions in Cloud-Based Security Services</title>
          <author initials="P." surname="Lingga" />
          <author initials="J." surname="Jeong" />
          <author initials="J." surname="Yang" />
          <author initials="J." surname="Kim" />                
          <date month="November" year="2024" />
        </front>
        <seriesInfo name="IEEE" value="Transactions on Dependable and Secure Computing, Volume 21, Issue 6" />
      </reference>

      <reference anchor="YAML" target="https://yaml.org/spec/1.2.2/">
        <front>
          <title>Yet Another Markup Language (YAML) version 1.2</title>
          <author initials="" surname="YAML Language Development Team" />
          <date month="October" year="2021" />
        </front>
      </reference>            

      <reference anchor="TS-28-312" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3554">
        <front>
          <title>Intent Driven Management Services for Mobile Networks</title>
          <author initials="" surname="ETSI" />
          <date month="September" year="2024" />
        </front>
        <seriesInfo name="ETSI" value="TS 28.312 V18.5.0" />
      </reference>

      <reference anchor="GSMA" target="https://www.gsma.com">
        <front>
          <title>Global System for Mobile Communications Association</title>
          <author initials="" surname="GSMA" />
        </front>
      </reference>

      <reference anchor="AUTOSAR" target="https://www.autosar.org/standards/adaptive-platform">
        <front>
          <title>Adaptive Platform</title>
          <author initials="" surname="AUTOSAR" />
        </front>
      </reference>

      <reference anchor="Eclipse-SDV" target="https://www.eclipse.org/org/workinggroups/sdv-charter.php">
        <front>
          <title>Eclipse Software Defined Vehicle Working Group Charter</title>
          <author initials="" surname="Eclipse" />
        </front>        
      </reference>

      <reference anchor="COVESA" target="https://covesa.global/">
        <front>
          <title>Connected Vehicle Systems Alliance </title>
          <author initials="" surname="COVESA" />
        </front>
      </reference>

      <reference anchor="Kubernetes" target="https://kubernetes.io/">
        <front>
          <title>K8s: Cloud Native Computing Platform</title>
          <author initials="" surname="Kubernetes" />
        </front>
      </reference>

      <reference anchor="RAG" target="https://dl.acm.org/doi/abs/10.5555/3495724.3496517">
        <front>
          <title>Retrieval-Augmented Generation for Knowledge-Intensive NLP Tasks</title>
          <author initials="P." surname="Lewis" role="editor"/>
          <date month="December" year="2020" />
        </front>
        <seriesInfo name="" value="The 34th International Conference on Neural Information Processing Systems (NIPS 2020)" />
      </reference>

      <reference anchor="CBSS" target="https://doi.org/10.23919/ICMU58504.2023.10412229">
        <front>
          <title>CBSS: Cloud-Based Security System with Interface to Network Security Functions</title>
          <author initials="J." surname="Jeong"/>
          <author initials="P." surname="Lingga"/>
          <date month="November" year="2023" />
        </front>
        <seriesInfo name="" value="The 14th International Conference on Mobile Computing and Ubiquitous Networking (ICMU 2023)" />
      </reference>
     
      <reference anchor="Hallucination-Mitigation"
       target="http://iotlab.skku.edu/publications/domestic-conference/KICS-2026-Winter-LLM-AntiHallucination.pdf">
        <front>
          <title>A Hallucination Mitigation Scheme in Security Policy Generation with Large Language Models</title>
          <author initials="J." surname="Goh"/>
          <author initials="K." surname="Rahim"/>
          <author initials="N." surname="Moyses"/>
          <author initials="V." surname="Maheswaran"/>
          <author initials="J." surname="Jeong"/>
          <author initials="T." surname="Oh"/>
          <date month="February" year="2026" />
        </front>
        <seriesInfo name="" value="KICS Winter Conference 2026" />
      </reference>

      <reference anchor="Security-Misconfiguration" target="https://doi.org/10.3390/fi13110283">
        <front>
          <title>Misconfiguration in Firewalls and Network Access Controls: Literature Review</title>
          <author initials="M." surname="Alicea"/>
          <author initials="I." surname="Alsmadi"/>
          <date month="November" year="2021" />
        </front>
        <seriesInfo name="MDPI" value="Future Internet, Volume 13, Issue 11" />
      </reference>

      <reference anchor="ICSC" target="https://doi.org/10.1109/MCOM.001.2400022">
        <front>
          <title>ICSC: Intent-Based Closed-Loop Security Control System for Cloud-Based Security Services</title>
          <author initials="P." surname="Lingga"/>
          <author initials="J." surname="Jeong"/>
          <author initials="L." surname="Dunbar"/>
          <date month="April" year="2025" />
        </front>
        <seriesInfo name="IEEE" value="Communications Magazine, Volume: 63, Issue: 4" />
      </reference>

    </references>
    <!-- Acknowledgments -->
    
    <section anchor="ACK" numbered="false" title="Acknowledgments">   
      <t>The work of Jaehoon Paul Jeong is supported by Institute of
      Information &amp; Communications Technology Planning &amp; Evaluation
      (IITP) grant funded by the Korea government, Ministry of Science and ICT
      (MSIT) (No. RS-2024-00398199 and No. RS-2022-II221015).</t>

      <t>The work of Luis M. Contreras has been partially funded by the
      European Union under Horizon Europe projects NEMO (NExt generation Meta
      Operating system) grant number 101070118, and SNS 6Green (Green Technologies 
      For 5/6G Service-Based Architectures) grant agreement 101096925.</t>
    </section>

    <!-- end Acknowledgments -->

    <!-- Contributors -->

    <section anchor="section:Contributors" numbered="false" title="Contributors">
      <t>The following people have substantially contributed to this document
      as co-authors:</t>

      <t><figure>
          <artwork>
  Hongwei Yang
  China Mobile
  Email: yanghongwei@chinamobile.com

  Yiwen Shen 
  Ajou University
  Email: chrisshen@ajou.ac.kr

  Pedro Martinez-Julia
  NICT
  Email: pedro@nict.go.jp

  Yoseop Ahn 
  Sungkyunkwan University
  Email: ahnjs124@skku.edu

  Mose Gu 
  Sungkyunkwan University
  Email: rna0415@skku.edu

  Younghan Kim 
  Soongsil University
  Email: younghak@ssu.ac.kr

  Jung-Soo Park
  Electronics and Telecommunications Research Institute
  Email: pjs@etri.re.kr

  Yun-Chul Choi
  Electronics and Telecommunications Research Institute
  Email: cyc79@etri.re.kr

  Guillermo Sanchez Illan
  Telefonica
  Email: guillermo.sanchezillan@telefonica.com
</artwork>
        </figure></t>
    </section>

    <!-- end Contributors -->

<!-- START: Changes -->
<section numbered="false" title="Changes from draft-irtf-nmrg-ibn-usecases-02">
    <t>
    The following changes are made from draft-irtf-nmrg-ibn-usecases-02:
    <list style="symbols">
      <t>
      This version have addressed the main comments from Jerome Francois.
      </t>

      <t>
      <xref target="section:IBN-Service-Level-Agreement-Guarantee"/> reduces
      the text for "IBN for Service-Level Agreement Guarantee" for the
      balanced ans consistent explanation with the other use cases
      in <xref target="section:IBN-Use-Cases"/>.
      </t>

      <t>
      <xref target="section:IBN-Methodology-Usage"/> shows "IBN
      Methodology Usage" on IBN use cases with 
      <xref target="figure:IBN-Methodology-Analysis"/>.
      </t>

      <t>
      <xref target="section:Intent-Taxonomy-Usage"/> shows "Intent
      Taxonomy Usage" on IBN use cases with 
      <xref target="figure:Intent-Taxonomy-Analysis"/>.
      </t>

      <t>
      <xref target="section:Difficulties-and-Challenges"/> includes 
      "Cloud-Based Security System" as another use case for Practical Learnings.
      </t>

    </list>
    </t>
</section>
<!-- END: Changes -->

  </back>
</rfc>
