Internet DRAFT - draft-eckert-bier-cgm2-rbs
draft-eckert-bier-cgm2-rbs
BIER T. Eckert
Internet-Draft Futurewei Technologies USA
Intended status: Experimental B. Xu
Expires: 13 August 2022 Huawei Technologies (2012Lab)
9 February 2022
Carrier Grade Minimalist Multicast (CGM2) using Bit Index Explicit
Replication (BIER) with Recursive BitString Structure (RBS) Addresses
draft-eckert-bier-cgm2-rbs-01
Abstract
This memo introduces the architecture of a multicast architecture
derived from BIER-TE, which this memo calls Carrier Grade Minimalist
Multicast (CGM2). It reduces limitations and complexities of BIER-TE
by replacing the representation of the in-packet-header delivery tree
of packets through a "flat" BitString of adjacencies with a
hierarchical structure of BFR-local BitStrings called the Recursive
BitString Structure (RBS) Address.
Benefits of CGM2 with RBS addresses include smaller/fewer BIFT in
BFR, less complexity for the network architect and in the CGM2
controller (compared to a BIER-TE controller) and fewer packet copies
to reach a larger set of BFER.
The additional cost of forwarding with RBS addresses is a slightly
more complex processing of the RBS address in BFR compared to a flat
BitString and the novel per-hop rewrite of the RBS address as opposed
to bit-reset rewrite in BIER/BIER-TE.
CGM2 can support the traditional deployment model of BIER/BIER-TE
with the BIER/BIER-TE domain terminating at service provider PE
routers as BFIR/BFER, but it is also the intention of this document
to expand CGM2 domains all the way into hosts, and therefore
eliminating the need for an IP Multicast flow overlay, further
reducing the complexity of Multicast services using CGM2. Note that
this is not fully detailed in this version of the document.
This document does not specify an encapsulation for CGM2/RBS
addresses. It could use existing encapsulations such as [RFC8296],
but also other encapsulations such as IPv6 extension headers.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Eckert & Xu Expires 13 August 2022 [Page 1]
Internet-Draft bier-cgm2-rbs February 2022
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 13 August 2022.
Copyright Notice
Copyright (c) 2022 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Introduction . . . . . . . . . . . . . . . . . . . . . . 3
1.2. Encapsulation Considerations . . . . . . . . . . . . . . 4
2. CGM2/RBS Architecture . . . . . . . . . . . . . . . . . . . . 5
3. CGM2/RBS forwarding plane . . . . . . . . . . . . . . . . . . 6
3.1. RBS BIFT . . . . . . . . . . . . . . . . . . . . . . . . 7
3.2. Reference encoding of RBS addresses . . . . . . . . . . . 8
3.3. RBS Address . . . . . . . . . . . . . . . . . . . . . . . 8
3.3.1. RecursiveUnit . . . . . . . . . . . . . . . . . . . . 8
3.3.2. AddressingField . . . . . . . . . . . . . . . . . . . 9
4. BIER-RBS Example . . . . . . . . . . . . . . . . . . . . . . 9
4.1. BFR B . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.2. BFR R . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.3. BFR S . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4.4. BFR C . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.5. BFR D . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.6. BFR E . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5. RBS forwarding Pseudocode . . . . . . . . . . . . . . . . . . 16
6. Operational and design considerations (informational) . . . . 18
6.1. Comparison with BIER-TE / BIER . . . . . . . . . . . . . 18
Eckert & Xu Expires 13 August 2022 [Page 2]
Internet-Draft bier-cgm2-rbs February 2022
6.1.1. Eliminating the need for large BIFT . . . . . . . . . 18
6.1.2. Reducing number of duplicate packet copies across
BFR . . . . . . . . . . . . . . . . . . . . . . . . . 19
6.1.3. BIER-TE forwarding plane complexities . . . . . . . . 20
6.1.4. BIER-TE controller complexities . . . . . . . . . . . 20
6.1.5. BIER-TE specification complexities . . . . . . . . . 20
6.1.6. Forwarding plane complexity . . . . . . . . . . . . . 21
6.2. CGM2 / RBS controller considerations . . . . . . . . . . 21
6.3. Analysis of performance gain with CGM2 . . . . . . . . . 21
6.3.1. Reference topology . . . . . . . . . . . . . . . . . 21
6.3.2. Comparison BIER and CGM2/RBS . . . . . . . . . . . . 23
6.4. Example use case scenarios . . . . . . . . . . . . . . . 24
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 24
8. Security considerations . . . . . . . . . . . . . . . . . . . 24
9. Changelog . . . . . . . . . . . . . . . . . . . . . . . . . . 24
10. References . . . . . . . . . . . . . . . . . . . . . . . . . 24
10.1. Normative References . . . . . . . . . . . . . . . . . . 24
10.2. Informative References . . . . . . . . . . . . . . . . . 25
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 25
1. Overview
1.1. Introduction
Carrier Grade Minimalist Multicast (CGM2) is an architecture derived
from the BIER-TE architecture [I-D.ietf-bier-te-arch] with the
following changes/improvements.
CGM2 forwarding is based on the principles of BIER-TE forwarding: It
is based on an explicit, in-packet, "source routed" tree indicated
through bits for each adjacency that the packet has to traverse.
Like in BIER-TE, adjacencies can be L2 to a subnet local neighbor in
support of "native" deployment of CGM2 and/or L3, so-called "routed"
adjacencies to support incremental or partial deployment of CGM2 as
needed.
The address used to replicate packets in the network is not a flat
network wide BitString as in BIER-TE, but a hierarchical structure of
BitStrings called a Recursive BitString Structure (RBS) Address. The
significance of the BitPositions (BP) in each BitString is only local
to the BIFT of the router/BFR that is processing this specific
BitString.
RBS addressing allows for a more compact representation of a large
set of adjacencies especially in the common case of sparse set of
receivers in large Service Provider Networks (SP).
Eckert & Xu Expires 13 August 2022 [Page 3]
Internet-Draft bier-cgm2-rbs February 2022
CGM2 thereby eliminates the challenges in BIER [RFC8279] and BIER-TE
having to send multiple copies of the same packet in large SP
networks and the complexities especially for BIER-TE (but also BIER)
to engineer multiple set identifier (SI) and/or sub-domains (SD)
BIER-TE topologies for limited size BitStrings (e.g.: 265) to cover
large network topologies.
Like BIER-TE, CGM2 is intended to leverage a Controller to minimize
the control plane complexity in the network to only a simple unicast
routing underlay required only for routed adjacencies.
The controller centric architecture provides most easily any type of
required traffic optimization for its multicast traffic due to their
need to perform often NP-complete calculations across the whole
topology: reservation of bandwidth to support CIR/PIR traffic buffer/
latency to support Deterministic Network (DetNet) traffic, cost
optimized Steiner trees, failure point disjoint trees for higher
resilience including DetNet deterministic services.
CGM2 can be deployed as BIER/BIER-TE are specified today, by
encapsulating IP Multicast traffic at Provider Edge (PE) routers, but
it is also considered to be highly desirable to extend CGM2 all the
way into Multicast Sender/Receivers to eliminate the overhead of an
Overlay Control plane for that (legacy) IP Multicast layer and the
need to deal with yet another IP multicast group addressing space.
In this deployment option Controller signaling extends directly (or
indirectly via BFIR) into senders.
1.2. Encapsulation Considerations
This document does not define a specific BIER-RBS encapsulation nor
does it preclude that multiple different encapsulations may be
beneficial to better support different use-cases or operator/user
technology preferences. Instead, it discusses considerations for
specific choices.
BIER-RBS can easily re-use [RFC8296] encapsulation. The RBS address
is inserted into the [RFC8296] BitString field. The BFR forwarding
plane needs to be configured (from Controller or control plane) that
the BIFT-id(s) used with RBS addresses are mapped to BIFT and
forwarding rules with RBS semantic.
SI/SD fields of [RFC8296] may be used as in BIER-TE, but given that
CGM2 is designed (as described in the Overview section) to simplify
multicast services, a likely and desirable configuration would be to
only use a single BIFT in each BFR for RBS addresses, and mapping
these to a single SD and SI 0.
Eckert & Xu Expires 13 August 2022 [Page 4]
Internet-Draft bier-cgm2-rbs February 2022
IP Multicast [RFC1112] was defined as an extension of IP [RFC791],
reusing the same network header, and IPv6 multicast inherits the same
approach. In comparison, [RFC8296] defines BIER encapsulation as a
completely separate (from IP) layer 3 protocol, and duplicates both
IP and MPLS header elements into the [RFC8296] header. This not only
results in always unused, duplicate header parameters (such as TC vs.
DSCP), but it also foregoes the option to use any non-considered IPv6
extension headers with BIER and would require the introduction of a
whole new BIER specific socket API into host operating systems if it
was to be supported natively in hosts.
Therefore an encapsulation of RBS addresses using an IP and/or IPv6
extension header may be more desirable in otherwise IP and/or IPv6
only deployments, for example when CGM2 is extended into hosts,
because it would allow to support CGM2 via existing IP/IPv6 socket
APIs as long as they support extension headers, which the most
important host stacks do today.
2. CGM2/RBS Architecture
This section describes the basic CGM2 architecture via Figure 1
through its key differences over the BIER-TE architecture.
Optional
|<-IGMP/PIM-> multicast flow <-PIM/IGMP->|
overlay
CGM2 [CGM2 Controller]
control plane . ^ ^ ^
. / | \ BIFT configuration
.......... | | | per-flow RBS setup
. | | |
. v v v
Src (-> ... ) -> BFIR-----BFR-----BFER -> (... ->) Rcvr
|<----------------->|
CGM2 with RBS-address forwarding plane
|<.............. <- CGM domain ---> ...............|
|<--------------------->|
Routing underlay (optional)
Figure 1: CGM2/RBS Architecture
Eckert & Xu Expires 13 August 2022 [Page 5]
Internet-Draft bier-cgm2-rbs February 2022
In the "traditional" option, when deployed with a domain spanning
from BFIR to BFER, the CGM2 architecture is very much like the BIER-
TE architecture, in which the BIER-TE forwarding rules for
(BitString,SI,SD) addresses are replaced by the RBS address
forwarding rules.
The CGM2 Controller replaces the BIER-TE controller, populating
during network configuration the BIFT, which are very much like BIER-
TE BIFT, except that they do not cover a network-wide BP address
space, but instead each BFR BIFT only needs as many BP in its BIFT as
it has link-local adjacencies, and in partial deployments also
additional L3 adjacencies to tunnel across non-CGM capable routers.
Per-flow operations in this "traditional" option is very much as in
BIER/BIER-TE, with the CGM2 controller determining the RBS address
(instead of the BIER-TE (BitString,SI,SD)) to be imposed as part of
the RBS address header (compared to the BIER encapsulation [RFC8296])
on the BFIR.
To eliminate the need for an IP Multicast flow overlays, a CGM2
domain may extend all the way into Sender/Receiver hosts. This is
called "end-to-end" deployment model. In that case, the sender host
and CGM2 controller collaborate to determine the desired receivers
for a packet as well as desired path policy/requirements, the
controller indicates to the sender of the packet the necessary RBS
address and address of the BFIR, and the Sender imposes an
appropriate RBS address header together with a unicast encapsulation
towards the BFIR.
CGM2 is also intended so especially simplify controller operations
that also instantiate QoS policies for multicast traffic flows, such
as bandwidth and latency reservations (e.g.: DetNet). As in BIER-TE,
this is orthogonal to the operations of the CGM2/RBS address
forwarding operations and will be covered in separate documents.
3. CGM2/RBS forwarding plane
Instead of a (flat) BitString as in BIER-TE that use a network wide
shared BP address space for adjacencies across multiple BFR, CGM2
uses a structured address built from so-called RecursiveUnits (RU)
that contain BitStrings, each of which is to be parsed by exactly one
BFR along the delivery tree of the packet.
The equivalent to a BIER/BIER-TE BitString is therefore called the
RecursiveUnit BitString Structure (RBS) Address. Forwarding for
CGMP2 is therefore also called RBS forwarding.
Eckert & Xu Expires 13 August 2022 [Page 6]
Internet-Draft bier-cgm2-rbs February 2022
3.1. RBS BIFT
RBS BIFT as shown in Figure 2 are, like BIER-TE BIFT, tables that are
indexed by BP, containing for each BP an adjacency. The core
difference over BIER-TE BIFT is that the BP of the BIFT are all local
to the BFR, whereas in BIER-TE, the BP are shared across a BIER-TE
domain, each BFR can only use a subset the BP for its own
adjacencies, and only in some cases can BP be shared for adjacencies
across two (or more) BFR. Because of this difference, most of the
complexities of BIER-TE BIFT are not required with BIER-RBS BIFT, see
Section 6.1.3.
+--+---------+-------------+
|BP|Recursive| Adjacency|
+--+---------+-------------+
| 1| 1|adjacenct BFR|
+--+---------+-------------+
| 2| 0| punt/host|
+--+---------+-------------+
| ..... ... |
+--+---------+-------------+
| N| ...| ... |
+--+---------+-------------+
Figure 2: RBS BIFT
An RBS BIFT has a configured number of N addressable BP entries.
When a BFR receives a packet with an RBS address, it expects that the
BitString inside the RBS address that needs to be parsed by the BFR
(see Section 3.3 has a length that matches N according to the
encapsulation used for the RBS address. Therefore, N MUST support
configuration in increments of the supported size of the BitString in
the encapsulation of the RBS Address. In the reference encoding (see
Section 3.3), the increment for N is 1 (bit). If an encapsulation
would call for a byte accurate encoding of the BitString, N would
have to be configurable in increments of 8.
BFR MUST support a value of N larger than the maximum number of
adjacencies through which RBS forwarding/replication of a single
packet is required, such as the number of physical interfaces on BFR
that are intended to be deployed as a Provider Core (P) routers.
RBS BIFT introduce a new "Recursive" flag for each BP. These are
used for adjacencies to other BFR to indicate that the BFR processing
the packet RBS address BitString also has to expect for every BP with
the recursive flag set another RU inside the RBS address.
Eckert & Xu Expires 13 August 2022 [Page 7]
Internet-Draft bier-cgm2-rbs February 2022
3.2. Reference encoding of RBS addresses
Structure elements of the RBS Address and its components are
parameterized according to a specific encapsulation for RBS
addresses, such as the total size of the TotalLen field and the unit
in which it is counted (see Section 3.3). These parameters are
outside the scope of this document. Instead, this document defines
example parameters that together form the so called "Reference
encoding of RBS addresses". This encoding may or may not be adopted
for any particular encapsulation of RBS addresses.
3.3. RBS Address
An RBS address is structured as shown in Figure 3.
+----------+-----+---------------+---------+
| TotalLen | Rsv | RecursiveUnit | Padding |
+----------+-----+---------------+---------+
. .
.... TotalLen .......
Figure 3: RBS Address
TotalLen counts in some unit, such as bits, nibbles or bytes the
length of the RBS Address excluding itself and Padding. For the
reference encoding, TotalLen is an 8-bit field that counts the size
of the RBS address in bits, permitting for up to 256 bit long RBS
addresses.
In case additional, non-recursive flags/fields are determined to be
required in the RBS Address, they should be encoded in a field
between TotalLen and RecursiveUnit, which is called Rsv. In the
reference encoding, this field has a length of 0.
Padding is used to align the RBS address as required by the
encapsulation. In the reference encoding, this alignment is to 8
bits (byte boundaries). Therefore, Padding (bits) = (8 - TotalLen %
8).
3.3.1. RecursiveUnit
The RecursiveUnit field is structured as shown in Figure 4.
+-+-+-+-+-+ -+-+-+-+-+-+-+-+-+ -+-+-+-+-+-+-+-+ -+
| BitString...| AddressingField...| RecursiveUnit 1...M|
+-+-+-+-+-+ -+-+-+-+-+-+-+-+-+ -+-+-+-+-+-+-+-+- -+
Figure 4: RBS RecursiveUnit
Eckert & Xu Expires 13 August 2022 [Page 8]
Internet-Draft bier-cgm2-rbs February 2022
The BitString field indicates the bit positions (BPs) to which the
packet is to be replicated using the BIFT of the BFR that is
processing the Recursive unit.
For each of M BP set in the BitString of the RecursiveUnit for which
the Recursive flag is set in the BIFT of the BFR, the RecursiveUnit
contains a RecursiveUnit i, i=1...M, in order of increasing BP index.
If adjacencies between BFR are not configured as recursive in the
BIFT, this recursive extraction does not happen for an adjacency, no
RecursiveUnit i has to be encoded for the BP, and BFRs across such
adjacencies would have to share the BP of a common BIFT as in BIER-
TE. This option is not further discussed in this version of the
document.
3.3.2. AddressingField
The AddressingField of an RBS address is structured as shown in
Figure 5.
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+
| L1 | L2 |...| L(M-1) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+
Figure 5: RBS AddressingField
The AddressingField consists of one or more fields Li, i=1...(M-1).
Li is the length of RecursiveUnit i for the i'th recursive bit set in
the BitString preceding it.
In the reference encoding, the lengths are 8-bit fields indicating
the length of RecursiveUnits in bits.
The length of the M'th RecursiveUnit is not explicitly encoded but
has to be calculated from TotalLen.
4. BIER-RBS Example
Figure 6 shows an example for RBS forwarding.
Eckert & Xu Expires 13 August 2022 [Page 9]
Internet-Draft bier-cgm2-rbs February 2022
+-+ +-+ +-+
| |-----| |------|C|-=> Client2
+-+ +-+ +-+
/ \ \ /=>/ \
/ \ \ / |
+-+ +-+ +-+ +-+
Client1 =>-|B|-=>-|R|-=>-|S|-=>-|D|-=> Client3
+-+ +-+ +-+ +-+
\ /
\ +-+
\-=>-|E|-=> Client4
+-+
Figure 6: Example Network Topology
A packet from Client1 connected to BFIR B is intended to be
replicated to Client2,3,4. The example initially assumes the
traditional option of the architecture, in which the imposition of
the header for the RBS address happens on BFIR B, for example based
on functions of an IP multicast flow overlay.
A controller determines that the packet should be forwarded hop-by-
hop across the network as shown in Figure 7.
Client 1 ->B(impose BIER-RBS)
=>R(
=> E (dispose BIER-RBS)
=> Client4
=> S(
=>C (dispose BIER-RBS)
=> Client2
=>D (dispose BIER-RBS)
=> Client3
)
)
Figure 7: Desired example forwarding tree
4.1. BFR B
The 34 bit long (without padding) RBS address shown in Figure 8 is
constructed to represent the desired tree from Figure 7 and is
imposed at B onto the packet through an appropriate header supporting
the reference encoding of RBS addresses.
Eckert & Xu Expires 13 August 2022 [Page 10]
Internet-Draft bier-cgm2-rbs February 2022
.............. RecursiveUnit .................
. .
+-------+----+-----+-----+-----+----+-----+------+-----+-----+
|Tlen:34|B:01|R:011|L1:10|S:011|L1:3|C:001|D:0001|E:001|Pad:6|
+-------+----+-----+-----+-----+----+-----+------+-----+-----+
8bit 2bit 3bit 8bit 3bit 8bit 3bit 4bit 3bit 6bit
Figure 8: RBS Address imposed at BFIR-B
In Figure 8 and further the illustrations of RBS addresses,
BitStrings are preceded by the name of the BFR for whom they are
destined and their values are shown as binary with the lowest BP 1
starting on the left. TotalLength (Tlen:), AddressingField (L1:) and
Padding (Pad:) fields are shown with decimal values.
RBS forwarding on B examines this address based on its RBS BIFT with
N=2 BP entries, which is shown in Figure 9.
+--+---------+---------+
|BP|Recursive|Adjacency|
+--+---------+---------+
| 1| 0| client1 |
+--+---------+---------+
| 2| 1| R |
+--+---------+---------+
Figure 9: BIER-RBS BIFT on B
This results in the parsing of the RBS address as shown in Figure 10,
which shows that B does not need (nor can) parse all structural
elements, but only those relevant to its own RBS forwarding
procedure.
......... RecursiveUnit ...............
. .
. ......,.. RecursiveUnit 1 .........
. . .
+-------+----+----------------------------------+-----+
|Tlen:34|B:01|R:01100001010011000000110010001001|Pad:6|
+-------+----+----------------------------------+-----+
8bit 2bit 32bit 6bit
Figure 10: RBS Address as processed by BFIR-B
There is only one BP towards BFR R set in the BitString B:01, so the
RecursiveUnit 1 follows directly after the end of the BitString B:01
and it covers the whole Tlen - length of BitString (34 - 2 = 32 bit).
Eckert & Xu Expires 13 August 2022 [Page 11]
Internet-Draft bier-cgm2-rbs February 2022
B rewrites the RBS address by replacing the RecursiveUnit with
RecursiveUnit 1 and adjusts the Padding to zero bits. The resulting
RBS address is shown in Figure 11. It then sends the packet copy
with that rewritten RBS address to BFR R.
4.2. BFR R
BFR R receives from BFR B the packet with that RBS address shown in
Figure 11.
.............. RecursiveUnit ............
. .
+-------+-----+-----+-----+----+-----+------+-----+
|Tlen:32|R:011|L1:18|S:011|L1:3|C:001|D:0001|E:001|
+-------+-----+-----+-----+----+-----+------+-----+
8bit 3bit 8bit 3bit 8bit 3bit 4bit 3bit
. . .
. RecursiveUnit 1...... .....
.
RecursiveUnit 2 ...
Figure 11: RBS Address processed by BFR-R
BFR R parses the RBS Address as shown in Figure 12 using its RBS BIFT
of N=3 BP entries shown in Figure 13.
.............. RecursiveUnit ............
. .
+-------+-----+-----+--------------------+-----+
|Tlen:32|R:011|L1:18|S:011000000110010001|E:001|
+-------+-----+-----+--------------------+-----+
8bit 3bit 8bit 18bit 3bit
. . .
. RecursiveUnit 1... .....
.
RecursiveUnit 2 ...
Figure 12: RBS Address processed by BFR-R
Because there are two recursive BP set in the BitString for R, one
for BFR S and one for BFR E, one Length field L1 is required in the
AddressingField, indicating the length of the RecursiveUnit 1 for BFR
S, followed by the remainder of the RBS address being the
RecursiveUnit 2 for BFR E.
Eckert & Xu Expires 13 August 2022 [Page 12]
Internet-Draft bier-cgm2-rbs February 2022
+--+---------+---------+
|BP|Recursive|Adjacency|
+--+---------+---------+
| 1| 1| B |
+--+---------+---------+
| 2| 1| S |
+--+---------+---------+
| 3| 1| E |
+--+---------+---------+
Figure 13: RBS BIFT on BFR R
BFR R accordingly creates one copy for BFR S using RecursiveUnit 1,
and only copy for BFR E using RecursiveUnit 2, updating Padding
accordingly for each copy.
4.3. BFR S
BFR S receives from BFR B the packet and parses the RBS address as
shown in Figure 14 using its RBS BIFT of N=3 BP shown in Figure 15.
.... RecursiveUnit ....
. .
+-------+-----+----+-----+------+-----+
|Tlen:18|S:011|L1:3|C:001|D:0001|Pad:6|
+-------+-----+----+-----+------+-----+
8bit 3bit 8bit 3bit 4bit 3bit
. . . .
.... ......
RecursiveUnit 1 . .
.
RecursiveUnit 2 .......
Figure 14: RBS Address processed by BFR-S
+--+---------+---------+
|BP|Recursive|Adjacency|
+--+---------+---------+
| 1| 1| R |
+--+---------+---------+
| 2| 1| C |
+--+---------+---------+
| 3| 1| D |
+--+---------+---------+
Figure 15: RBS BIFT on BFR-S
Eckert & Xu Expires 13 August 2022 [Page 13]
Internet-Draft bier-cgm2-rbs February 2022
BFR S accordingly sends one packet copy with RecursiveUnit 1 in the
RBS address to BFR C and a second packet copy with RecursiveUnit 2 to
BFR D.
4.4. BFR C
BFR C receives from BFR S the packet and parses the RBS address
according to its N=3 BP entries BIFT (shown in Figure 17) as shown in
Figure 16.
+-------+-----+-----+
|Tlen:3 |C:001|Pad:5|
+-------+-----+-----+
8bit 3bit 5bi
Figure 16: RBS Address processed by BFR-C
+--+---------+-------------+
|BP|Recursive| Adjacency|
+--+---------+-------------+
| 1| 1| S |
+--+---------+-------------+
| 2| 1| D |
+--+---------+-------------+
| 3| 0| local_decap|
+--+---------+-------------+
Figure 17: RBS BIFT on BFR-C
BFR S accordingly creates one packet copy for BP 3 where the RBS
address encapsulation is disposed of, and the packet is ultimately
forwarded to Client 2, for example because of an IP multicast payload
for which the multicast flow overlay identifies Client 2 as an
interested receiver, as in BIER/BIER-TE.
To avoid having to use an IP flow overlay, the BIFT could instead
have one BP allocated for every non-RBS destination, in this example
BP 3 would then explicitly be allocated for Client 2, and instead of
disposing of the RBS address encapsulation, BFR C would impose or
rewrite a unicast encapsulation to make the packet become a unicast
packet directed to Client 2. This option is not further detailed in
this version of the document.
4.5. BFR D
The procedures for processing of the packet on BFR D are very much
the same as on BFR C. Figure 18 shows the RBS address at BFR D,
Figure 19 shows the N=4 bit RBS BIFT of BFR D.
Eckert & Xu Expires 13 August 2022 [Page 14]
Internet-Draft bier-cgm2-rbs February 2022
+-------+------+-----+
|Tlen:4 |D:0001|Pad:4|
+-------+------+-----+
8bit 4bit 4bit
Figure 18: RBS Address processed by BFR-D
+--+---------+-------------+
|BP|Recursive| Adjacency|
+--+---------+-------------+
| 1| 1| S |
+--+---------+-------------+
| 2| 1| C |
+--+---------+-------------+
| 3| 1| E |
+--+---------+-------------+
| 4| 0| local_decap|
+--+---------+-------------+
Figure 19: RBS BIFT on BFR-D
4.6. BFR E
The procedures for processing of the packet on BFR E are very much
the same as on BFR C and D. Figure 20 shows the RBS address at BFR
D, Figure 21 shows the N=E bit RBS BIFT of BFR E.
+-------+-----+-----+
|Tlen:3 |E:001|Pad:5|
+-------+-----+-----+
8bit 3bit 5bit
Figure 20: RBS Address processed by BFR-E
+--+---------+-------------+
|BP|Recursive| Adjacency|
+--+---------+-------------+
| 1| 1| R |
+--+---------+-------------+
| 2| 1| D |
+--+---------+-------------+
| 3| 0| local_decap|
+--+---------+-------------+
Figure 21: RBS BIFT on BFR-E
Eckert & Xu Expires 13 August 2022 [Page 15]
Internet-Draft bier-cgm2-rbs February 2022
5. RBS forwarding Pseudocode
The following example RBS forwarding Pseudocode assumes the reference
encoding of bit-accurate length of BitStrings and RecursiveUnits as
well as 8-bit long TotalLen and AddressingField Lengths. All packet
field addressing and address/offset calculations is therefore bit-
accurate instead of byte accurate (which is what most CPU memory
access today is).
Eckert & Xu Expires 13 August 2022 [Page 16]
Internet-Draft bier-cgm2-rbs February 2022
void ForwardRBSPacket (Packet)
{
RBS = GetPacketMulticastAddr(Packet);
Total_len = RBS;
Rsv = Total_len + length(Total_Len);
BitStringA = Rsv + length(Rsv);
AddressingField = BitStringA + BIFT.entries;
// [1] calculate number of recursive bits set in BitString
CopyBitString(*BitStringA, *RecursiveBits, BIFT.entries);
And(*RecursiveBits,*BIFTRecursiveBits, BIFT.entries);
N = CountBits(*RecursiveBits, BIFT.entries);
// Start of first RecursiveUnit in RBS address
// After AddressingField array with 8-bit length fields
RecursiveUnit = AddressingField + (N - 1) * 8;
RemainLength = *Total_len - length(Rsv)
- BIFT.entries;
Index = GetFirstBitPosition(*BitStringA);
while (Index) {
PacketCopy = Copy(Packet);
if (BIFT.BP[Index].recursive) {
if(N == 1) {
RecursiveUnitLength = RemainLength;
} else {
RecursiveUnitLength = *AddressingField;
N--;
AddressingField += 8;
RemainLength -= RecursiveUnitLength;
RemainLength -= 8; // 8 bit of AddressingField
}
RewriteRBS(PacketCopy, RecursiveUnit, RecursiveUnitLength);
SendTo(PacketCopy, BIFT.BP[Index].adjacency);
RecursiveUnit += RecursiveUnitLength;
} else {
DisposeRBSheader(PacketCopy);
SendTo(PacketCopy, BIFT.BP[Index].adjacency);
}
Index = GetNextBitPosition(*BitStringA, Index);
}
Figure 22: RBS address forwarding Pseudocode
Explanations for Figure 22.
Eckert & Xu Expires 13 August 2022 [Page 17]
Internet-Draft bier-cgm2-rbs February 2022
RBS is the (bit accurate) address of the RBS address in packet header
memory. BitStringA is the address of the RBS address BitString in
memory. length(Total_Len) and length(Rsv) are the bit length of the
two RBS address fields, e.g.: 8 bit and 0 bit for the reference
encoding.
The BFR local BIFT has a total number of BIFT.entries addressable BP
1...BIFTentries. The BitString therefore has BIFT.entries bits.
BIFT.RecursiveBits is a BitString pre-filled by the control plane
with all the BP with the recursive flag set. This is constructed
from the Recursive flag setting of the BP of the BIFT. The code
starting at [1] therefore counts the number of recursive BP in the
packets BitString.
Because the AddressingField does not have an entry for the last (or
only) RecursiveUnit, its length has to be calculated by taking
TotalLen into account.
RewriteRBS needs to replace RBS address with the RecursiveUnit
address, keeping only Rsv, recalculating TotalLen and adding
appropriate Padding.
For non-recursive BP, the Pseudocode assumes disposition of the
RBSheader. This is not strictly necessary but non-disposing cases
are outside of scope of this version of the document.
6. Operational and design considerations (informational)
6.1. Comparison with BIER-TE / BIER
This section discusses informationally, how and where CGM2 can avoid
different complexities of BIER/BIER-TE, and where it introduces new
complexities.
6.1.1. Eliminating the need for large BIFT
In a BIER domain with M BFER, every BFR requires M BIFT entries. If
the supported BSL is N and M > 2 ^ N, then S = (M / 2 ^ N) set
indices (SI) are required, and S copies of the packet have to be sent
by the BFIR to reach all targeted BFER.
In CGM2, the number of BIFT entries does not need to scale with the
number of BFER or paths through the network, but can be limited to
only the number of L2 adjacencies of the BFR. Therefore CGM2
requires minimum state maintenance on each BFR, and multiple SI are
not required.
Eckert & Xu Expires 13 August 2022 [Page 18]
Internet-Draft bier-cgm2-rbs February 2022
6.1.2. Reducing number of duplicate packet copies across BFR
If the total size of an RBS encoded delivery tree is larger than a
supported maximum RBS header size, then the CGM2 controller simply
needs to divide the tree into multiple subtrees, each only addressing
a part of the BFER (leaves) of the target tree and pruning any
unnecessary branches.
B1
/ \
B2 B3
/ \ / \
/ \/ \
B4 B5 B6
/..| / \ |..\
B7..B99 B100..B200 B201...B300
Figure 23: Simple Topology Example
Consider the simple topology in Figure 23 and a multicast packet that
needs to reach all BFER B7...B300. Assume that the desired maximum
RBM header size is such that a RBS address size of <= 256 bits is
desired. The CGM2 controller could create an RBS address
B1=>B2=>B4=>(B7..B99), for a first packet, an RBS address
B1=>B3=>B5=>(B100..B200) for a second packet and a third RBS address
B1=>B3=>B6=>B201...B300.
The elimination of larger BIFT state in BFR through multiple SI in
BIER/BIER-TE does come at the expense of replicating initial hops of
a tree in RBS addresses, such as in the example the encoding of
B1=>B3 in the example.
Consider that the assignment of BFIR-ids with BIER in the above
example is not carefully engineered. It is then easily possible that
the BFR-ids for B7..B99 are not sequentially, but split over a larger
BFIR-id space. If the same is true for all BFER, then it is possible
that each of the three BFR B4,B5 and B6 has attached BFER from three
different SI and one may need to send for example three multiple
packets to B7 to address all BFER B7..B99 or to B5 to address all
B100..B200 or B6 to address all B201...B300. These unnecessary
duplicate packets across B4, B5 or B6 are because of the addressing
principle in BIER and are not necessary in CGM2, as long as the total
length of an RBS address does not require it.
For more analysis, see Section 6.3.
Eckert & Xu Expires 13 August 2022 [Page 19]
Internet-Draft bier-cgm2-rbs February 2022
6.1.3. BIER-TE forwarding plane complexities
BIER-TE introduces forwarding plane complexities to allow reducing
the BSL required. While all of these could be supported /
implemented with CGM2, this document contends that they are not
necessary, therefore providing significant overall simplifications.
* BIER-TE supports multiple adjacencies in a single BIFT Index to
allow compressing multiple adjacencies into a single Index for
traffic that is known to always require replications to all those
adjacencies (such as when flooding TV traffic).
* BIER-TE support ECMP adjacencies which have to calculate which out
of 2 or more possible adjacencies a packet should be forwarded to.
* BIER-TE supports special Do-Not-Clear (DNC) behavior of
adjacencies to permit reuse of such a bit for adjacencies on
multiple consecutive BFR. This behavior specifically also raises
the risk of looping packets.
6.1.4. BIER-TE controller complexities
BIER-TE introduces BIER-TE controller plane mechanisms that allow to
reuse bits of the flat BIER-TE BitStrings across multiple BFR solely
to reduce the number of BP required but without introducing
additional complexities for the BIER-TE forwarding plane.
* Shared BP for all Leaf BFR.
* Shared BP for both Interfaces of p2p links.
* Shared bits for multi-access subnets (LANs).
These bit-sharing mechanisms are unnecessary and inapplicable to CGM2
because there is no need to share BP across the BIFT of multiple BFR.
6.1.5. BIER-TE specification complexities
The BIER-TE specification distinguishes between forward (link scope)
and routed (underlay routed) adjacencies to highlight, explain and
emphasize on the ability of BIER-TE to be deployed in an overlay
fashion especially also to reduce the necessary BSL, even when all
routers in the domain could or do support BIER-TE.
In CGM2, routed adjacencies are considered to be only required in
partial deployments to forward across non-CGM2 enabled routers. This
specification does therefore not highlight link scope vs. routed
adjacencies as core distinct features.
Eckert & Xu Expires 13 August 2022 [Page 20]
Internet-Draft bier-cgm2-rbs February 2022
6.1.6. Forwarding plane complexity
CGM2 introduces some more processing calculation steps to extract the
BitString that needs to be examined by a BFR from the RBS address.
These additional steps are considered to be non-problematic for
todays programmable forwarding planes such as P4.
Whereas BIER-TE clears bit on each hops processing, CGM2 rewrites the
address on every hop by extracting the recursive unit for the next
hop and make it become the packet copies address. This rewrite
shortens the RBS address. This hopefully has only the same
complexity as (tunnel) encapsulations/decapsulations in existing
forwarding planes.
6.2. CGM2 / RBS controller considerations
TBD. Any aspects not covered in Section 6.1.
6.3. Analysis of performance gain with CGM2
TBD: Comparison of number of packets/header sizes required in large
real-world operator topology between BIER/BIER-TE and CGM2.
Analysis: Gain in dense topology.
6.3.1. Reference topology
Reference topology description:
1. Typical topology of Beijing Mobile in China.
2. All zones dual homing access to backbone.
3. Core layer: 4 nodes full mesh connected
4. Aggregation layer: 8 nodes are divided into two layers, with full
interconnection between the layers and dual homing access to the
core layer on the upper layer.
5. Aggregation rings: 8 rings, 6 nodes per ring
6. Access rings: 3600 nodes, 18 nodes per ring.
┌──────┐ ┌──────┐
│ ├──────────┤ │
/└──────┘\ /└──────┘\ Interconnected
/ / | \ \ / / | \ \ BackBone
┌──────┐/ / | \ \ / / | \ \┌──────┐
│ │ / | \ \ / / | \ │ │
Eckert & Xu Expires 13 August 2022 [Page 21]
Internet-Draft bier-cgm2-rbs February 2022
└───┬──┘ / | \ \/ / | \ └─┬────┘
│ / | \ /\ / | \ │
┌──┴───┐ | / \ | ┌──┴───┐
│ │------------+ \/ +------------│ │
└──────┘\ | /\ | /└──────┘
\ | / \ | /
\ ┌──────┐/ \┌──────┐ /
\│ ├──────┤ │/
└───┬──┘ └───┬──┘
│ \ / │ Dual Return Access
│ \ / │
│ \ / │
│ / │
│ / \ │
┌─┴───┐/ \┌───┴─┐
│ ├─────┤ │
└─┬───┘\ /└───┬─┘
│ \ / │ Core Layer
│ / │
│ / \ │
┌─┴───┐/ \┌───┴─┐
/│ ├─────┤ │\
/ └──┬──┘\ /└──┬──┘ \
/ │\ \ / /│ \ Zone1
/ │ \ \ / │ \
/ │ \ / \ / │ \
/ +----│---+ +---│----+ \
/ / │ \ / │ \ \
/ / │ + │ \ \
/ / │ / \ │ \ \
┌───┐/ ┌┴──┐/ \┌──┴┐ \┌───┐
│ │\ /│ │ │ │\ /│ │
└─┬─┘ \ / └─┬─┘\ /└─┬─┘ \ / └─┬─┘
│ \ / │ \ / │ \ / │ Aggregation
│ \/ │ / │ \/ │ Layer
│ /\ │ / \ │ /\ │
┌─┴─┐ / \ ┌─┴─┐/ \┌─┴─┐ / \ ┌─┴─┐
│ │-- --│ │ │ │-- --│ │
└───┘ └───┘\ /└───┘\ └───┘
/ | \ \ / / | \
/ | \ \ / | \
/ | / \/ | \
/ +--|--+ \/+---|---+ \
/ / | /\ | \ \
┌───┐ ┌┴──┐/ \┌───┐ ┌───┐ ASBR
│ │ │ │ │ │ │ │
└─┬─┘ └─┬─┘ └─┬─┘ └─┬─┘
│ │ │ │
Eckert & Xu Expires 13 August 2022 [Page 22]
Internet-Draft bier-cgm2-rbs February 2022
│ │ │ │
┌─┴─┐ ┌─┴─┐ ┌─┴─┐ ┌─┴─┐
│ │ │ │ │ │ │ │
└─┬─┘ └─┬─┘ └─┬─┘ └─┬─┘
│ │ │ │
│ │ 8Rings │ │
┌─┴─┐ ┌─┴─┐ ...┌─┴─┐ ┌─┴─┐
│ │---│ │ │ │---│ │
----└───┘ └───┘ └───┘\ └───┘
/ / \ \ | \ \ \ | \
/ / \ \ | \ \ +---|-+ \
/ / \ +-|---+\ \ | \ \
/ / \ | \\ \ | \ \
/ / \ | \\ \ | \ \
/ / \ | \\ \ | \ \
┌───┐ ┌───┐ ┌───┐ ┌───┐ ┌───┐ ┌───┐ CSBR
│ │ │ │ │ │ │ │ │ │ │ │
└─┬─┘ └─┬─┘ └─┬─┘ └─┬─┘ └─┬─┘ └─┬─┘
│ │ Access │ │ │ │
│ │ Rings │ │ │ │
┌─┴─┐ ┌─┴─┐ ... ┌─┴─┐ ┌─┴─┐ ┌─┴─┐ ┌─┴─┐
│ │ │ │ │ │ │ │ │ │ │ │
└─┬─┘ └─┬─┘ └─┬─┘ └─┬─┘ └─┬─┘ └─┬─┘
│ │ │ │ │ │
│ │ │ │ │ │
┌─┴─┐ ┌─┴─┐ ┌─┴─┐ ┌─┴─┐ ┌─┴─┐ ┌─┴─┐
│ │ │ │ │ │ │ │ │ │ │ │
└───┘...└───┘ └───┘...└───┘ └───┘...└───┘
Figure 24: Reference Topology
6.3.2. Comparison BIER and CGM2/RBS
The following performance comparison is based on Figure 24.
1. CGM2: We randomly select egress points as group members, with the
total number ranging from 10 to 28800 (for sake of simplicity, we
assume merely one client per egress point). The egress points
are randomly distributed in the topology with 10 runs for each
value, showing the average result in our graphs. The total
number of samples is 60
2. BIER: We divide the overall topology into 160 BIER domains, each
of which includes 180 egress points, providing the total of 28000
egress points.
Eckert & Xu Expires 13 August 2022 [Page 23]
Internet-Draft bier-cgm2-rbs February 2022
3. Simulation: In order to compare the BIER against the in-packet
tree encoding mechanism, we limit the size of the header to 256
bits (the typical size of a BIER header).
Conclusion: 1. BIER reaches its 160 packet replication limit at
about 500 users, while the in-packet tree encoding reaching its limit
of 125 replications at about 12000 users. And the following decrease
of replications is caused by the use of node-local broadcast as a
further optimization. 2. For the sake of comparison, the same
256-bit encapsulation limit is imposed on CGM2, but we can completely
break the 256-bit encapsulation limit, thus allowing the source to
send fewer multicast streams. 3. CCGM2 encoding performs
significantly better than BIER in that it requires less packet
replications and there network bandwidth.
6.4. Example use case scenarios
TBD.
7. Acknowledgements
This work is based on the design published by Sheng Jiang, Xu Bing,
Yan Shen, Meng Rui, Wan Junjie and Wang Chuang {jiangsheng|bing.xu|ya
nshen|mengrui|wanjunjie2|wangchuang}@huawei.com, see [CGM2Design].
8. Security considerations
TBD.
9. Changelog
[RFC-Editor: please remove this section].
This document is written in https://github.com/cabo/kramdown-rfc2629
markup language. This documents source is maintained at
https://github.com/toerless/bier-cgm2-rbs, please provide feedback to
the appropriate IETF mailing list and submit an Issue to the GitHub.
01 - Added section 6.3 about performance comparison and co-author
(Robin).
00 - Initial version from [CGM2Design].
10. References
10.1. Normative References
Eckert & Xu Expires 13 August 2022 [Page 24]
Internet-Draft bier-cgm2-rbs February 2022
[I-D.ietf-bier-te-arch]
Eckert, T., Menth, M., and G. Cauchie, "Tree Engineering
for Bit Index Explicit Replication (BIER-TE)", Work in
Progress, Internet-Draft, draft-ietf-bier-te-arch-12, 28
January 2022, <https://www.ietf.org/archive/id/draft-ietf-
bier-te-arch-12.txt>.
[RFC1112] Deering, S., "Host extensions for IP multicasting", STD 5,
RFC 1112, DOI 10.17487/RFC1112, August 1989,
<https://www.rfc-editor.org/info/rfc1112>.
[RFC791] Postel, J., "Internet Protocol", STD 5, RFC 791,
DOI 10.17487/RFC0791, September 1981,
<https://www.rfc-editor.org/info/rfc791>.
[RFC8279] Wijnands, IJ., Ed., Rosen, E., Ed., Dolganow, A.,
Przygienda, T., and S. Aldrin, "Multicast Using Bit Index
Explicit Replication (BIER)", RFC 8279,
DOI 10.17487/RFC8279, November 2017,
<https://www.rfc-editor.org/info/rfc8279>.
[RFC8296] Wijnands, IJ., Ed., Rosen, E., Ed., Dolganow, A.,
Tantsura, J., Aldrin, S., and I. Meilik, "Encapsulation
for Bit Index Explicit Replication (BIER) in MPLS and Non-
MPLS Networks", RFC 8296, DOI 10.17487/RFC8296, January
2018, <https://www.rfc-editor.org/info/rfc8296>.
10.2. Informative References
[CGM2Design]
Jiang, S., Xu, B.(., Shen, Y., Rui, M., Junjie, W., and W.
Chuang, "Novel Multicast Protocol Proposal Introduction",
10 October 2021,
<https://github.com/BingXu1112/CGMM/blob/main/Novel%20Mult
icast%20Protocol%20Proposal%20Introduction.pptx>.
Authors' Addresses
Toerless Eckert
Futurewei Technologies USA
2220 Central Expressway
Santa Clara, CA 95050
United States of America
Email: tte@cs.fau.de
Eckert & Xu Expires 13 August 2022 [Page 25]
Internet-Draft bier-cgm2-rbs February 2022
Bing (Robin) Xu
Huawei Technologies (2012Lab)
China
Email: bing.xu@huawei.com
Eckert & Xu Expires 13 August 2022 [Page 26]