<?xml version='1.0' encoding='UTF-8'?>
<!-- <?xml version="1.0" encoding="US-ASCII"?> -->
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private)
-->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">


<?rfc toc="yes"?>
<?rfc rfcedstyle="yes"?>
<?rfc subcompact="no"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" category="info" docName="draft-gu-nmrg-intent-translator-00">

<front>
    <title abbrev="Intent Translation for 6G IoT">
    An Intent Translation Framework for IoT Networks
    </title>

    <author role="editor" initials="M." surname="Gu" fullname="Mose Gu">
    <organization abbrev="Sungkyunkwan University">
      Department of Computer Science and Engineering
    </organization>
    <address>
      <postal>
        <street>2066 Seobu-Ro, Jangan-Gu</street>
        <city>Suwon</city>
        <region>Gyeonggi-Do</region>
        <code>16419</code>
        <country>Republic of Korea</country>
      </postal>
      <email>rna0415@skku.edu</email>
    </address>
    </author>

    <author role="editor" initials="J." surname="Jeong" fullname="Jaehoon Paul Jeong">
    <organization abbrev="Sungkyunkwan University">
      Department of Computer Science and Engineering
    </organization>
    <address>
      <postal>
        <street>2066 Seobu-Ro, Jangan-Gu</street>
        <city>Suwon</city>
        <region>Gyeonggi-Do</region>
        <code>16419</code>
        <country>Republic of Korea</country>
      </postal>
      <phone>+82 31 299 4957</phone>
      <email>pauljeong@skku.edu</email>
    </address>
    </author>

    <date month="July" day="7" year="2025" />

    <area>Network Management Research Group </area>
    
    <workgroup>Network Management Research Group</workgroup>

<!-- [rfced] Please insert any keywords (beyond those that appear in
the title) for use on http://www.rfc-editor.org/rfcsearch.html. -->

<keyword>Internet-Draft</keyword>
    <abstract>
    <t>
    The evolution of 6G networks and the expansion of Internet of Things (IoT) environments introduce new challenges in managing diverse networked resources. Intent-based management frameworks enable operators to express desired network outcomes using high-level intents, often articulated in natural language. However, converting these expressions into machine-executable policy configurations remains an open challenge.
    </t>
    <t>
    This document defines an intent translation framework designed to bridge the gap between user-issued intents and structured policy representations for 6G enabled IoT systems. The framework accepts natural language intent as input and produces a policy document in a structured format, such as YAML, that aligns with the intent model defined in 3GPP in <xref target="TS-28.312" />.
    </t>
    <t>
    The framework consists of modular components responsible for processing input, aligning user intent with domain knowledge, evaluating semantic confidence, and generating standardized output. This modularity supports transparency, interoperability, and automated policy enforcement in next-generation network infrastructures.
    </t>
    </abstract>
</front>

<middle>

<section anchor="section:introduction" title="Introduction">
  <t>
    The rapid growth of Internet of Things (IoT) deployments and the evolution toward 6G networks have introduced increasing complexity in the management of heterogeneous devices, services, and application policies. As operational environments scale, the traditional model of manually configuring service-level policies becomes unsustainable.
  </t>
  <t>
    Intent-based management is a paradigm that allows administrators to specify desired outcomes through high-level intents, often expressed in natural language. These intents must then be interpreted, validated, and translated into structured policy representations that can be executed by network functions and orchestrators. While standards such as 3GPP TS 28.312 define lifecycle procedures for managing intents in mobile networks, they do not specify mechanisms for interpreting natural language or translating it into compliant policy structures.
  </t>
  <t>
    This document defines a modular intent translation framework that addresses this gap. The framework enables automated conversion of user-issued intents into structured policy outputs in formats such as YAML, aligned with the expectations and procedures defined in 3GPP TS 28.312. It supports a range of use cases across IoT and 6G domains, including resource optimization, security management, and service quality assurance.
  </t>
  <t>
    The framework is composed of functional components that operate sequentially or in coordination:
    <list style="symbols">
      <t><spanx style="strong">Intent Processing Component:</spanx>Accepts and interprets user-provided intents into structured representations.</t>
      <t><spanx style="strong">Semantic Alignment Component:</spanx>Matches the processed intent to relevant domain knowledge for policy resolution.</t>
      <t><spanx style="strong">Confidence Evaluation Component:</spanx>Assesses interpretation reliability and identifies degraded or low-confidence mappings.</t>
      <t><spanx style="strong">Policy Generation Component:</spanx>Produces a machine-readable policy in a structured format suitable for deployment.</t>
    </list>
  </t>
  <t>
    The design promotes modularity, transparency, and alignment with existing network automation architectures. It enables consistent translation of operator goals into policies that are interoperable with standard orchestration and management systems in 6G-enabled IoT networks.
  </t>
</section>

<section anchor="section:terminology" title="Terminology">
  <t>
    This document uses the terminology defined in <xref target="RFC9315" />, <xref target="RFC8329" />,
    <xref target="I-D.ietf-i2nsf-applicability" />, <xref target="I-D.jeong-i2nsf-security-management-automation" />,
    and <xref target="I-D.yang-i2nsf-security-policy-translation" />.
  </t>
  <t>
    In addition, the following terms are defined for the purpose of this document:
  </t>
  <t>
    <list style="symbols">

      <t>
        <spanx style="strong">Intent:</spanx>
        A set of operational goals (that a network should meet) and outcomes (that a network is supposed to deliver),
        defined in a declarative manner without specifying how to achieve or implement them <xref target="RFC9315" />.
      </t>

      <t>
        <spanx style="strong">Intent-Based Management (IBM):</spanx>
        It enforces an intent from a user (or administrator) into a target system. An intent can be
        expressed as a natural language sentence and translated into a high-level policy using
        natural language interpretation and structured policy mapping <xref target="I-D.jeong-i2nsf-security-management-automation" />,
        <xref target="I-D.yang-i2nsf-security-policy-translation" />. This high-level policy is then transformed into low-level policies
        that are dispatched to appropriate Service Functions (SFs). Based on monitoring feedback,
        new rules may be generated or existing policies refined.
      </t>

      <t>
        <spanx style="strong">Intent Processing Component:</spanx>
        A logical function that receives a natural language input from the user or operator and produces a structured internal representation of the intent.
        This component facilitates the initial abstraction required for intent lifecycle operations <xref target="RFC9315" />, <xref target="I-D.jeong-i2nsf-security-management-automation" />.
      </t>

      <t>
        <spanx style="strong">Semantic Alignment Component:</spanx>
        A logical function that interprets the structured intent and determines its best alignment with existing domain knowledge or policy databases.
        The purpose of this component is to ensure the intent maps to a resolvable and enforceable policy outcome.
      </t>

      <t>
        <spanx style="strong">Confidence Evaluation Component:</spanx>
        A logical function that estimates the reliability or confidence of semantic intent translation.
        Low-confidence outputs may be flagged as degraded and subjected to fallback, verification, or reprocessing.
      </t>

      <t>
        <spanx style="strong">Degraded Intent:</spanx>
        An intent translation result that has been marked as low-confidence due to weak alignment, missing information, or uncertainty in the reasoning process.
        A degraded intent may still result in policy generation, but with warnings or limited scope. 
      </t>

      <t>
        <spanx style="strong">Policy Generation Component:</spanx>
        A logical function that produces a machine-readable policy, typically in a format such as YAML or JSON, based on the resolved intent and domain mappings.
        This component ensures compliance with policy schema requirements, such as those defined in 3GPP <xref target="TS-28.312" />.
      </t>

    </list>
  </t>
</section>

<section anchor="section:framework" title="Intent Translator Framework Architecture">
  <t>
    This section defines the architecture of the Intent Translator Framework, which is designed to convert high-level, natural language intents into machine-readable policy representations in structured formats such as YAML. The framework enables intent-based management automation for 6G-enabled IoT environments and aligns with policy modeling and lifecycle procedures defined in <xref target="TS-28.312" />.
  </t>

<section anchor="section:translator" title="Intent Translator">

  <t>
   The Intent Translator is a modular subsystem responsible for converting natural language intent into a structured, machine-readable policy document suitable for enforcement in intent-based management systems. It forms the core of the intent translation framework, providing semantic interpretation, policy grounding, and output generation. The final output is expressed in a structured format such as YAML and adheres to policy modeling defined in <xref target="TS-28.312" />.
  </t>

  <t>
    Architecturally, the Intent Translator operates as a sequential pipeline composed of six logically distinct components. Each component handles a specific transformation step, beginning with user input and ending with policy document generation. The pipeline enables soft semantic matching, confidence scoring, and graceful handling of degraded translations. It is designed to support transparent, extensible, and standards-aligned translation of human goals into actionable configurations.
  </t>

  <figure anchor="fig-intent-translator-arch" title="Intent Translator Component Architecture">
    <artwork><![CDATA[
  
        +----------+
        | IBN User |
        +----------+
              |
              |   
 +------------+------------------------------------------------------------+
 |            v                                          Intent Translator |
 |  +--------------------+   +------------------+                          |
<+--| Intent Coordinator |-->| Intent Extractor |                          |
 |  +--------------------+   +------------------+                          |
 |            ^                       |                                    |
 |            |                       v                                    |
 |            |              +-----------------+                           |
 |            |              | Semantic Mapper |                           |
 |            |              +-----------------+                           |
 |            |                       |                                    |
 |            |                       v                                    |
 |  +-----------------+      +-----------------+       +----------------+  |
 |  | Policy Composer |<-----| Intent Resolver |<----->| Policy         |  |
 |  +-----------------+      +-----------------+       | Knowledge Base |  |
 |                                                     +----------------+  |
 +-------------------------------------------------------------------------+                                         
                                          

                                                       
    ]]></artwork>
  </figure>
  <t>
    The six main components of the Intent Translator are illustrated in <xref target="fig-intent-translator-arch" />.
  </t>
  <t>
    <spanx style="strong">Intent Coordinator: </spanx> An initial component of Intent Translator that receives user intent; dispatches and deploys. This component receives a natural language intent submitted by an IBN user or administrative interface. It forwards the natural language intent to the Intent Extractor. 
    On the other hand, once the Policy Composer generates the final structured policy, the Intent Coordinator is also responsible for delivering it to downstream systems for enforcement, such as network controllers or orchestration engines.
  </t>

  <t>
    <spanx style="strong">Intent Extractor: </spanx> A Few shot based large language model informed component that extracts structured elements from natural language. This component parses the incoming natural language statement to extract key semantic elements such as action, expactation object, and expactation target. 
    These elements form the core of the structured intent representation and are passed to the Semantic mapper for KG embedding and semantic alignment.
  </t>

  <t>
    <spanx style="strong">Semantic Mapper: </spanx> A component that projects structured intent into a semantic space aligned with domain knowledge. This component maps the structured intent fields into dense vector representations using a pre-trained embedding space. The embedding model is aligned with a domain-specific knowledge graph and allows the intent representation to be projected into the same semantic space used for stored policy facts. The aggregated intent vector is delivered to the reasoning module, Intent Resolver.
  </t>

  <t>
    <spanx style="strong">Intent Resolver: </spanx> A Reasoning module that atches intent to policy triples; flags degraded matches. This component receives the embedded intent vector and compares it against the embeddings of knowledge graph triples stored in the Policy Knowledge Base. 
    If a direct match is not available, soft matching is performed using semantic similarity scoring (e.g., cosine distance). When the similarity score for the best match falls below a defined threshold, the match is flagged as degraded. 
    This degraded status is propagated downstream, enabling conditional processing and transparency in policy output.
  </t>

  <t>
    <spanx style="strong">Policy Knowledge Base: </spanx> A knowledge base component that stores domain knowledge to provides embeddings and semantic structure. The Knowledge Base maintains the structured knowledge graph used throughout the translation process. 
    It contains entity-relation triples that define valid intent mappings and service configurations. During reasoning, the Intent Resolver retrieves and compares Knowledge Base entries based on their semantic proximity to the intent vector. 
    The Policy Knowledge Base supports approximate matching during inference.
  </t>

  <t>
    <spanx style="strong">Policy Composer: </spanx> Generates YAML-formatted policy documents for deployment. The final component of the translation pipeline is responsible for synthesizing a policy document that aligns with <xref target="TS-28.312" />. 
    It uses both the extracted intent structure and the selected knowledge graph entry to construct a template based YAML-formatted policy. 
  </t>

  <t>
    Together, these components enable the reliable and transparent transformation of user-defined goals into system-aligned, deployable policies. 
    The architecture is modular and extensible, allowing domain-specific enhancements without modification to the full translation pipeline.
  </t>
</section>

<section anchor="section:semantic-mapper" title="Semantic Mapper">
  <t>
    The Semantic Mapper translates structured intent fields into a unified semantic representation within an embedding space aligned with the Policy Knowledge Base. It serves as a semantic abstraction layer that enables approximate intent matching through latent space projection.
  </t>
<figure anchor="fig-semantic-mapper" title="Semantic Mapper Internal Workflow">
  <artwork><![CDATA[
           
            +------------------+
            | Intent Extractor |
            +------------------+
                      | 
  +-------------------+-------------------+
  |                   |          Semantic |
  |                   v            Mapper |
  |    +-----------------------------+    |
  |    |       Embedding Module      |    |
  |    |  (Per-slot Vector Encoding) |    |
  |    +-----------------------------+    |
  |                   |                   |
  |                   v                   |
  |    +-----------------------------+    |
  |    |         Aggregator          |    |
  |    | (Intent Embedding Builder)  |    |
  |    +-----------------------------+    |
  |                   |                   |
  |                   v                   |
  |     [ Aggregated Intent Vector ]      |
  +-------------------+-------------------+
                      v
             +-----------------+          +----------------+ 
             | Intent Resolver |<-------->| Knowledge Base |
             +-----------------+          +----------------+

  ]]></artwork>
</figure>
<t>
  <xref target="fig-semantic-mapper" /> illustrates the internal flow of the Semantic Mapper. It begins with a structured intent delivered from the Intent Parser. The input undergoes semantic enrichment using a few-shot language model, followed by vector encoding of each semantic slot. The final stage aggregates the slot-wise vectors into a single intent embedding vector, which is then forwarded to the Intent Resolver.
</t>

  <t>
    The internal components of the Semantic Mapper are illustrated in <xref target="fig-semantic-mapper" />.
  </t>

    <t>
    <spanx style="strong">Embedding Module: </spanx> A component that supports Per-slot Vector Encoding. Each enriched intent slots (e.g., action, expaction object, expectation target) is independently encoded as a dense vector in a shared semantic space. This allows for flexible alignment across synonymous or paraphrased expressions.
    </t>

  <t>
    <spanx style="strong">Aggregator: </spanx> A component which builds intent embedding. This component aggregates the individual slot vectors into a single composite intent embedding. This intent embedding vector serves as a holistic semantic representation of the user's goal and facilitates efficient semantic comparison during the reasoning phase.
  </t>

  <t>
    The final output of the Semantic Mapper is the aggregated intent vector, which is passed to the Intent Resolver for policy resolution. This design supports soft matching and generalization over variations in language, domain vocabulary, and abstraction level.
  </t>

</section>

<section anchor="section:intent-resolver" title="Intent Resolver">

  <t>
    The Intent Resolver is responsible for mapping the semantic representation of a user's intent to a corresponding policy concept within the Policy Knowledge Base. It performs soft matching, evaluates confidence, and applies a thresholding mechanism to determine whether to generate a policy or flag the result for operator intervention.
  </t>
<figure anchor="fig-intent-resolver" title="Intent Resolver Internal Architecture">
  <artwork><![CDATA[
           +-----------------+
           | Semantic Mapper |
           +-----------------+
 +------------------+-----------------------+
 |                  |                Intent |         
 |                  v              Resolver |
 |      +----------------------+            |     +-----------+
 |      | Soft Matching Engine |<-----------+---->| knowledge |
 |      +----------------------+            |     | Base      |
 |                  |                       |     +-----------+
 |                  v                       |           ^
 |       +----------------------+           |           |
 |       | Confidence Evaluator |           |           |
 |       +----------------------+           |           |
 |                  |                       |           |
 |                  v                       |           |
 |     +--------------------------+         |           |
 |     |      Threshold Gate      |         |           |
 |     +--------------------------+         |           | 
 +--------+--------------------+------------+           |
      <Forward>            <Degrade> +---------------+  |          
          v                    +-----|Feedback Logger|--+            
    +----------+                     +---------------+
    | Policy   |      
    | Composer |        
    +----------+      
 
  ]]></artwork>
</figure>

  <t>
    The internal architecture of the Intent Resolver is shown in <xref target="fig-intent-resolver" />.
  </t>
  <t>
    <spanx style="strong">Soft Matching Engine: </spanx> This component receives the aggregated intent vector from the Semantic Mapper and computes its semantic similarity against all relevant policy entries stored in the Policy Knowledge Base. The comparison uses a vector-space similarity metric (e.g., cosine similarity) to identify the best-matching policy triple.
  </t>
  <t>
    <spanx style="strong">Confidence Evaluator: </spanx> Once the most relevant policy candidate is selected, this component evaluates the semantic confidence score associated with the match. This score quantifies the degree of alignment between the user's intent and the closest available domain policy.
  </t>
  <t>
    <spanx style="strong">Threshold Gate: </spanx> The confidence score is evaluated against a configurable semantic threshold. If the score exceeds the threshold, the candidate policy is considered a valid match and is forwarded to the Policy Composer. If the score falls below the threshold, the intent is flagged as degraded.
  </t>
  <t>
    <spanx style="strong">Feedback Logger: </spanx> For degraded matches, this component logs the failure for later analysis and may optionally initiate human-in-the-loop review. If confirmed or corrected, the outcome can be used to update the Policy Knowledge Base, thus improving future resolution accuracy.
  </t>
  <t>
    The Intent Resolver enables explainable, flexible, and confidence-aware translation of semantic user goals into domain-aligned policy artifacts. It ensures that all generated outputs are grounded in interpretable knowledge while also supporting fallback and learning-based feedback.
  </t>



  <t>
    The intent and high-level policy artifacts produced by the Intent Translator Framework can be expressed in standardized data models such as XML <xref target="RFC6020" /><xref target="RFC7950" /> or YAML <xref target="YAML" />. These documents can be delivered to the appropriate management or orchestration systems via NETCONF <xref target="RFC6241" />, RESTCONF <xref target="RFC8040" />, or REST API <xref target="REST" /> interfaces for deployment and enforcement.
  </t>
  <t>
    As described in the modular architecture of the framework, user-defined natural language intent is processed through a structured pipeline that includes the Intent Coordinator, Intent Parser, Semantic Mapper, Intent Resolver, and Policy Composer. The semantic reasoning within this pipeline is grounded in a domain-specific Policy Knowledge Base, enabling soft matching and degraded intent handling. This design ensures that operational goals - even when imprecisely expressed - can be semantically aligned to existing policy capabilities, enhancing automation readiness and interoperability across 6G-based IoT environments.
  </t>
  <t>
    Therefore, this document proposes a practical and extensible architecture for intent translation in next-generation management systems. Through this architecture, high-level user goals can be reliably mapped to structured policy outputs, and network services can be automatically configured, validated, and adapted. The framework enables intent-based management to support scalable, knowledge-grounded automation in complex service domains such as IoT, vertical-specific networks, and intelligent edge infrastructures.
  </t>


</section>
</section>
<section anchor="section:IANA-Considerations" title="IANA Considerations">
  <t>
    This document does not require any IANA actions.
  </t>
</section>

<section anchor="section:deployment-considerations" title="Deployment Considerations">
  <t>
    The deployment of the Intent Translator Framework requires alignment between the domain-specific Policy Knowledge Base and the operational policies supported by the underlying infrastructure. Domain-specific vocabularies, service models, and operational goals must be encoded within the knowledge base to ensure accurate semantic reasoning.
  </t>

  <t>
    Operators should pre-train or validate the semantic embedding space against realistic intents and policy sets before enabling full automation. This is particularly important for service domains where intent ambiguity or synonymy could lead to unintended configurations.
  </t>
</section>
<section anchor="section:extensibility-considerations" title="Extensibility Considerations">
  <t>
    The modular architecture of the framework allows for individual components - such as the Semantic Mapper or Policy Composer - to be adapted to different domains, languages, or knowledge graph models. As such, implementers can substitute the language model used for prompting, modify the embedding strategy, or replace the output schema (e.g., YAML, XML) without altering the end-to-end translation flow.
  </t>

  <t>
    Additionally, the Policy Knowledge Base may be extended over time with new policy triples and relations to support evolving service capabilities. Such extensions should preserve backward compatibility by maintaining stable identifiers for core operational concepts.
  </t>
</section>
<section anchor="section:degradation-considerations" title="Degradation and Human Oversight Considerations">
  <t>
    The framework supports degraded intent resolution via soft matching and confidence scoring. While this enables flexible operation in the presence of vocabulary incompleteness or paraphrasing, operators should evaluate how degraded matches are handled within their intent lifecycle.
  </t>

  <t>
    For high-assurance environments, degraded outputs should be reviewed by a human operator or routed to a validation pipeline before policy deployment. Logging mechanisms should be used to record degraded cases and their resolution outcomes to improve future model performance and policy reliability.
  </t>
</section>
<section anchor="section:security-considerations" title="Security Considerations">
  <t>
    The Intent Translation Framework must operate over authenticated and confidential channels (e.g., TLS/HTTPS) to prevent eavesdropping, message tampering, or replay attacks by malicious actors.
    Implementations should enforce strict certificate validation and regularly rotate cryptographic keys to maintain transport-layer security.
  </t>
  <t>
    Because the system processes free-form natural language intents, it is vulnerable to adversarially crafted inputs designed to produce unintended or harmful policies.
    Deployments should incorporate input validation and semantic sanity checks such as confirmation interfaces for high-impact operations and rate limit or quarantine suspicious requests for manual review.
  </t>
  <t>
    Intent collisions where contradictory or overlapping intents are submitted concurrently can lead to policy conflicts or enforcement gaps.
    The framework must include conflict-detection logic in its Policy Composer component and either automatically resolve detected collisions using a documented precedence model or escalate them to human operators for arbitration.
  </t>
</section>

</middle>

<back>

<!-- START: Normative References -->
<references title="Normative References">

    <?rfc include="reference.RFC.6020"?>
    <?rfc include="reference.RFC.6241"?>
    <?rfc include="reference.RFC.7950"?>
    <?rfc include="reference.RFC.8040"?>    
    <?rfc include="reference.RFC.8329"?>
    <?rfc include="reference.RFC.9315"?>
    <?rfc include="reference.RFC.9365"?>
    
</references>
<!-- END: Normative References -->

<!-- START: Informative References -->
<references title="Informative References">

    <?rfc include='reference.I-D.ietf-i2nsf-applicability'?>
    <?rfc include='reference.I-D.jeong-i2nsf-security-management-automation'?>
    <?rfc include='reference.I-D.jeong-nmrg-ibn-network-management-automation'?>
    <?rfc include='reference.I-D.yang-i2nsf-security-policy-translation'?>

    <reference anchor="YAML">
        <front>
            <title>Yet Another Markup Language (YAML) 1.0</title>
            <author initials="B." surname="Ingerson" />
            <author initials="C." surname="Evans" />
            <author initials="O." surname="Ben-Kiki" />
            <date month="October" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://yaml.org/spec/history/2001-05-26.html" />
    </reference>

    <reference anchor="TS-23.501">
        <front>
            <title>System Architecture for the 5G System (5GS)</title>
            <author surname="3GPP TS 23.501 V18.3.0" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144" />
    </reference>

    <reference anchor="TS-28.312">
        <front>
            <title>Intent Driven Management Services for Mobile Networks</title>
            <author surname="3GPP TS 28.312 V18.1.1" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3554" />
    </reference>

    <reference anchor="TR-28.812">
        <front>
            <title>Study on Scenarios for Intent Driven Management Services for Mobile Networks</title>
            <author surname="3GPP TR 28.812 V17.1.0" />
            <date month="December" year="2020" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3553" />
    </reference>

    <reference anchor="TS-23.288">
        <front>
            <title>Architecture Enhancements for 5G System (5GS) to Support Network Data Analytics Services</title>
            <author surname="3GPP TS 23.288 V18.3.0" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3579" />
    </reference>

    <reference anchor="TS-29.520">
        <front>
            <title>Network Data Analytics Services</title>
            <author surname="3GPP TS 29.520 V18.3.0" />
            <date month="September" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3355" />
    </reference>

    <reference anchor="RFC7149">
        <front>
            <title>Software-Defined Networking: A Perspective from within a Service Provider Environment</title>
            <author initials="M." surname="Boucadair" />
            <author initials="C." surname="Jacquenet" />
            <date month="March" year="2014" />
        </front>
        <seriesInfo name="RFC" value="7149" />
    </reference>


    <reference anchor="USENIX-ATC-Lumi">
        <front>
            <title>Hey, Lumi! Using Natural Language for Intent-Based Network Management</title>
            <author initials="A." surname="Jacobs" />
            <author initials="R." surname="Pfitscher" />
            <author initials="R." surname="Ribeiro" />
            <author initials="R." surname="Ferreira" />
            <author initials="L." surname="Granville" />
            <author initials="W." surname="Willinger" />
            <author initials="S." surname="Rao" />
            <date month="July" year="2021" />
        </front>
        <seriesInfo name="USENIX" value="Annual Technical Conference" />
    <seriesInfo name="Available:" value="https://www.usenix.org/conference/atc21/presentation/jacobs" />
    </reference>

    <reference anchor="BERT">
        <front>
            <title>BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding</title>
            <author initials="J." surname="Devlin" />
            <author initials="M." surname="Chang" />
            <author initials="K." surname="Lee" />
            <author initials="K." surname="Toutanova" />
            <date month="June" year="2019" />
        </front>
        <seriesInfo name="NAACL-HLT" value="Conference" />
    <seriesInfo name="Available:" value="https://aclanthology.org/N19-1423.pdf" />
    </reference>

    <reference anchor="REST">
        <front>
            <title>REST API for Network Management</title>
            <author initials="A." surname="Author"/>
            <date month="July" year="2025"/>
        </front>
        <seriesInfo name="Available:" value="https://example.com/rest-spec"/>
    </reference>
    <reference anchor="Deep-Learning">
        <front>
            <title>Deep Learning</title>
            <author initials="I." surname="Goodfellow" />
            <author initials="Y." surname="Bengio" />
            <author initials="A." surname="Courville" />
            <date month="November" year="2016" />
        </front>
        <seriesInfo name="Publisher:" value="The MIT Press" />
    <seriesInfo name="Available:" value="https://www.deeplearningbook.org/" />
    </reference>

    <reference anchor="Survey-IBN-CST-2023">
        <front>
            <title>A Survey on Intent-Based Networking</title>
            <author initials="A." surname="Leivadeas" />
            <author initials="M." surname="Falkner" />
            <date month="March" year="2023" />
        </front>
        <seriesInfo name="Available:" value="https://ieeexplore.ieee.org/document/9925251" />    
    </reference>

</references>
<!-- END: Informative References -->

<section title="Acknowledgments">
    <t indent="0" pn="section-appendix.a-1">
    This work was supported by Institute of Information &amp; Communications
    Technology Planning &amp; Evaluation (IITP) grant funded by the Korea
    Ministry of Science and ICT (MSIT) (No. RS-2024-00398199 and
    RS-2022-II221015).
    </t>

    <t indent="0" pn="section-appendix.a-2">    
    This work was supported in part by Institute of Information &amp;
    Communications Technology Planning &amp; Evaluation (IITP) grant
    funded by the Korea Ministry of Science and ICT (MSIT) (No. 2022-0-01199,
    Regional strategic industry convergence security core talent training
    business).
    </t>

</section>
<!-- END: Acknowledgments -->

<section anchor="section:Contributors" title="Contributors">
    <t indent="0" pn="section-appendix.b-1">
    This document is made by the group effort of OPWAWG, greatly benefiting 
    from inputs and texts by <contact fullname="Linda Dunbar"/> (Futurewei)
    <contact fullname="Yong-Geun Hong"/> (Daejeon University), and
    <contact fullname="Joo-Sang Youn"/> (Dong-Eui University).
    The authors sincerely appreciate their contributions.
    </t>

    <t indent="0" pn="section-appendix.b-2">  
    The following are coauthors of this document:
    </t>   

      <contact fullname="Yoseop Ahn">
        <organization showOnFrontPage="true">Department of Computer Science &amp; Engineering</organization>
        <address>
          <postal>
            <extaddr>Sungkyunkwan University</extaddr>
            <street>2066 Seobu-Ro, Jangan-Gu</street>
            <city>Suwon</city>
            <region>Gyeonggi-Do</region>
            <code>16419</code>
            <country>Republic of Korea</country>
          </postal>
          <phone>+82 31 299 4106</phone>
          <email>ahnjs124@skku.edu</email>
          <uri>http://iotlab.skku.edu/people-Ahn-Yoseop.php</uri>
        </address>
      </contact>
</section>

</back>

<!-- <vspace blankLines="100"/> -->
<!-- page break to put addresses onto one page-->

</rfc>
