Internet DRAFT - draft-merling-bier-frr
draft-merling-bier-frr
BIER Working Group D. Merling
Internet-Draft M. Menth
Intended status: Standards Track University of Tuebingen
Expires: September 6, 2019 March 05, 2019
BIER Fast Reroute
draft-merling-bier-frr-00
Abstract
BIER is a scalable multicast overlay [RFC8279] that utilizes some
routing underlay, e.g., IP, to build up its Bit Index Forwarding
Tables (BIFTs). This document proposes a Fast Reroute Extension for
BIER (BIER-FRR). In case of a link or node failure, the routing
underlay may first utilize FRR techniques to restore connectivity and
then its forwarding tables converge. After that, BIER can update its
BIFTs, which requires time. BIER packets may not be delivered until
the last procedure has finished. With BIER-FRR, a BIER Forwarding
Router (BFR) can deliver BIER packets again after a link or node
failures as soon as the connectivity within the routing underlay is
restored and the BFR is informed about a next-hop (NH) that is
unreachable on a lower layer. BIER-FRR provides a mode for link
protection and node protection. For link protection, it tunnels
traffic to the next-hop using the underlying routing. For node
protection, it forwards BIER packets to their specific next-hop and
next-next-hops using tunnels in the underlying routing after applying
a suitable backup bitmask to the bitstring in the BIER header of each
packet. This procedure prevents duplicates. If topology allows,
BIER-FRR achieves full protection against any single component
failure. For link protection, BIER-FRR requires only a minor change
to the forwarding logic. For node protection, BIER-FRR also requires
backup entries in the BIFT.
This document describes the concept and operating principles of BIER-
FRR. It defines the necessary modifications to the BIER forwarding
Procedure and the BIFT, and explains how backup entries are computed.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Merling & Menth Expires September 6, 2019 [Page 1]
Internet-Draft BIER-FRR March 2019
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on September 6, 2019.
Copyright Notice
Copyright (c) 2019 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1. Requirements Language . . . . . . . . . . . . . . . . . . 6
3. Problem Statement . . . . . . . . . . . . . . . . . . . . . . 6
3.1. Link Failures . . . . . . . . . . . . . . . . . . . . . . 6
3.1.1. BIER Encapsulation within a Lower-Layer Technology
with Protection . . . . . . . . . . . . . . . . . . . 6
3.1.2. BIER Encapsulation within the Routing Underlay . . . 6
3.1.3. BIER Encapsulation within a Lower-Layer Technology
without Protection . . . . . . . . . . . . . . . . . 7
3.2. Node Failures . . . . . . . . . . . . . . . . . . . . . . 7
4. Fast Reroute Extension for BIER (BIER-FRR) . . . . . . . . . 7
4.1. BIER-FRR Link Protection . . . . . . . . . . . . . . . . 7
4.1.1. Mechanism . . . . . . . . . . . . . . . . . . . . . . 8
4.1.2. Example . . . . . . . . . . . . . . . . . . . . . . . 8
4.2. BIER-FRR Node Protection . . . . . . . . . . . . . . . . 8
4.2.1. Mechanism . . . . . . . . . . . . . . . . . . . . . . 8
4.2.2. Example . . . . . . . . . . . . . . . . . . . . . . . 10
4.2.3. Computation of Backup BIFT Entries . . . . . . . . . 11
4.2.3.1. Computation . . . . . . . . . . . . . . . . . . . 11
4.2.3.2. Example . . . . . . . . . . . . . . . . . . . . . 12
4.3. Protection Level . . . . . . . . . . . . . . . . . . . . 12
5. Necessary Changes to the BIER Architecture . . . . . . . . . 13
5.1. Unicast Tunneling . . . . . . . . . . . . . . . . . . . . 13
Merling & Menth Expires September 6, 2019 [Page 2]
Internet-Draft BIER-FRR March 2019
5.2. Detecting Unreachable N(N)Hs . . . . . . . . . . . . . . 13
5.3. BIFT with backup entries . . . . . . . . . . . . . . . . 13
6. Security Considerations . . . . . . . . . . . . . . . . . . . 13
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 13
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 13
8.1. Normative References . . . . . . . . . . . . . . . . . . 14
8.2. Informative References . . . . . . . . . . . . . . . . . 14
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14
1. Introduction
With BIER [RFC8279], Bit-Forwarding Routers (BFRs) forward packets
based on a bitstring in the BIER header using the information in
their Bit Index Forwarding Tables (BIFTs). In case of a persistent
link or node failure, BIER traffic may not be delivered until the
BIFT has been updated based on the re-converged routing underlay.
The routing underlay restores connectivity more quickly than BIER, in
particular if the routing underlay leverages fast reroute (FRR)
mechanisms because then the forwarding ability is retained before
forwarding tables of the routing underlay have converged. In this
document we propose Fast Reroute Extension for BIER (BIER-FRR). It
enables a BFR to quickly reroute BIER packets as soon as the
underlying routing works again and it is informed about a next-hop
(NH) that is unreachable on a lower layer.
We first explain the problem and distinguish link and node failures
for that purpose. In case of a persistent link failure, a BFR cannot
deliver BIER traffic until the NH in the BIFT is updated with an
appropriate node. In case of a node failure, the entire multicast
subtree behind the failed not is not reachable until the BIFT is
updated. Thus, in either case, BIER's connectivity is restored only
after the underlying routing has converged and the BIFTs have been
updated. This may require substantial time during which BIER traffic
is dropped. An exception are unreachable NHs to which BIER traffic
is sent through tunnels in the routing underlay. They are reachable
again as soon as the routing underlay works again.
BIER-FRR tackles this problems with two different modes that have
different implementation complexity: link protection and node
protection. In any case, a BFR with an unreachable NH needs to be
informed about the failure and acts as a point of local repair (PLR).
E.g., BFD mechanisms may be used [I-D.hu-bier-bfd] to detect failed
NHs. With BIER-FRR link protection, a BFR tunnels affected BIER
packets towards the NH using a tunnel in the underlying routing.
Then, this traffic can be delivered as soon as the underlying routing
works again. With BIER-FRR node protection, a BFR tunnels affected
BIER packets to the NH and all relevant next-next-hops (NNHs) in the
underlying routing after applying suitables backup bitmasks to the
Merling & Menth Expires September 6, 2019 [Page 3]
Internet-Draft BIER-FRR March 2019
bitstring in the BIER header. This procedure ensures that both the
NH and all potential multicast subtrees receive the traffic if
possible, and it prevents potential duplicates and loops on the BIER
layer. Thus, BIER-FRR basically implements 1:1 protection. The
latter is discussed in [I-D.xiong-bier-resilience] without proposing
a specific mechanism.
This document describes the concept of BIER-FRR, protection
properties, the computation of backup bitmasks, and gives a detailed
BIER-FRR forwarding example.
2. Terminology
The following sections require the understanding of certain
abbreviations and definitions that were defined within other
documents, especially [RFC8279]. To facilitate the reading of this
document, they are shortly explained in this section.
o BFR: Bit-Forwarding Router, Section 1 of [RFC8279]
A device that acts as a BIER forwarding device in the BIER domain.
o BFIR: Bit-Forwarding Ingress Router, Section 1 of [RFC8279]
Entry point to the BIER domain. A BFIR adds a BIER header to a
multicast packet.
o BFER: Bit-Forwarding Egress Router, Section 1 of [RFC8279]
Exit point of the BIER domain. A BFER removes the BIER header of
a multicast packet.
o NH: Next-hop
The next downstream BFR to which a packet is forwarded.
o BIFT: Bit Index Forwarding Table, Section 6.4 of [RFC8279]
A BFR uses its BIFT to determine the NH(s) of a BIER packet. The
BIFT maps a F-BM to each NH of a BFR.
o F-BM: Forwarding bitmask Section 6.4 of [RFC8279]
A F-BM is a bitmask that indicates which destinations are reached
via the subtree of the corresponding NH. A F-BM is applied to the
BIER header by bitwise AND'ing the F-BM with the bitstring in the
BIER header. This prevents duplicates at BFERs.
Merling & Menth Expires September 6, 2019 [Page 4]
Internet-Draft BIER-FRR March 2019
o Routing underlay: Section 4.1 of [RFC8279]
The routing underlay connects pairs of BFR. If a typical Interior
Gateway Protocol (IGP) like OSPF is used, the multicast packets
will be forwarded on shortest paths. Other routing underlays with
different path layouts are possible. The routing underlay is used
to determine the NH entries of the BIFT.
o BIER Layer: Section 4.2 of [RFC8279]
Conceptually the BIER layer is placed above the routing underlay.
The BIER layer can be understood as a transport layer for
multicast packets. It consists of all necessary protocols and
mechanisms to forward a BIER packet from a BFIR, over potentially
multiple BFRs, to a set of BFERs.
o Multicast Overlay: Section 4.3 of [RFC8279]
Conceptually the multicast overlay is placed above the BIER layer.
It is used to maintain information about egress points of
multicast groups. The multicast overlay passes those information
to the BIER layer which then determines the corresponding BIER
headers.
o PLR: Point of Local Repair
A node that cannot forward a packet due to an unreachable NH.
o BIER-FRR: Fast Reroute Extension for BIER (BIER-FRR)
A mechanism to restore connectivity on the BIER layer as soon as
BFRs are informed about non-reachable NHs and the underlying
routing works again.
o BIER-FRR link protection
A mode of BIER-FRR that can handle only link failures.
o BIER-FRR node protection
A mode of BIER-FRR that can handle both link and node failures.
It is more complex than BIER-FRR link protection.
o NNH: Next-next-hop
Next downstream BFR after the NH.
Merling & Menth Expires September 6, 2019 [Page 5]
Internet-Draft BIER-FRR March 2019
2.1. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
3. Problem Statement
We first consider the impact of link failures and then the one of
node failures on the behavior of a BIER network without BIER-FRR.
3.1. Link Failures
The effect of a link failure depends on the technology used for
encapsulation of BIER packets. We distinguish three cases. (1) BIER
packets are carried over some lower-layer technology with protection.
(2) BIER packets are tunneled through the routing underlay. (3) BIER
packets are carried over some lower-layer technology without
protection.
3.1.1. BIER Encapsulation within a Lower-Layer Technology with
Protection
MPLS is an example for a lower-layer technology with protection
capabilities. In case of a link failure, first packets are lost,
then the protection mechanism of the lower-layer technology quickly
restores the link. From then on, packets are no longer lost.
3.1.2. BIER Encapsulation within the Routing Underlay
IP is an example for a routing underlay. The routing underlay is
expected to deal with failures of lower- layer technologies. In case
of a link failure, packets are lost. If the failure persists due to
a lower-layer technology without protection, the routing underlay is
informed about the failure. The routing underlay may leverage FRR
techniques, e.g., Loop-Free Alternates (LFAs) [RFC5286], to quickly
restore reachability so that packets are delivered again which are
sent encapsulated the within routing underlay. From then on, also
BIER packets encapsulated within the routing underlay are delivered
again.
At the same time, routing reconvergence is triggered. When the
routing has converged after some time, forwarding tables of the
routing underlay are updated. Based on them, new NHs for BIFTs are
computed and installed so that the PLR delivers BIER packets to a
different NH than the one that is still unreachable via the lower-
layer technology.
Merling & Menth Expires September 6, 2019 [Page 6]
Internet-Draft BIER-FRR March 2019
3.1.3. BIER Encapsulation within a Lower-Layer Technology without
Protection
Ethernet is an example for a lower-layer technology without
protection. In case of a link failure, the failure persists from the
perspective of BIER and the routing underlay unless the failure is
repaired. As a consequence, packets are lost. Then, the routing
underlay acts as described above to restore rechability and finally
updates its forwarding tables. By that time, BIER packets
encapsulated within the lower-layer technology are still dropped.
Then, new NHs for BIFTs are computed based on the new forwarding
tables of the routing underlay and are installed. From then on, BIER
can deliver packets again over a different NH.
When BIER-FRR is used, BIER packets can be delivered again as soon as
the BFR is informed about the unreachable NH and routing underlay
works again.
3.2. Node Failures
The effect of node failures is more severe. First, the packets
cannot be delivered to the failed node. This, however, cannot be
repaired. Second, multicast distribution trees downstream of a
failed NH cannot receive traffic as the failed NH replicate traffic
towards relevant NNHs. This problem is solved neither by lower-layer
technologies with link protection nor by BIER encapsulation within
the routing underlay. Therefore, BIER packets sent to the failed NH
are dropped until BIFTs are updated based on reconverged forwarding
tables of the routing underlay. This may require quite some time.
When BIER-FRR node protection is used, BIER packets can be delivered
along the affected multicast tree as soon as the BFR is informed
about the unreachable NH and the routing underlay works again.
4. Fast Reroute Extension for BIER (BIER-FRR)
This section describes the concept of BIER-FRR. In case of a link or
node failure, it reroutes BIER packets until the BIFTs are updated or
the failure is repaired. BIER-FRR offers two modes: link protection
and node protection. Their protection level is summarized.
4.1. BIER-FRR Link Protection
We introduce the mechanism and illustrate it by an example.
Merling & Menth Expires September 6, 2019 [Page 7]
Internet-Draft BIER-FRR March 2019
4.1.1. Mechanism
When a BFR is informed about an unreachable NH, it tunnels all BIER
packets towards that NH through the routing underlay. As soon as the
routing underlay works again, the BIER packets are delivered to the
NH if the NH still works. Then, the NH forwards the BIER packets
further along the multicast distribution tree.
4.1.2. Example
Figure 1 shows an example toplogy for the routing underlay and
Figure 2 the multicast distribution tree for BFR 1 on the BIER Layer
which is computed based on shortest paths.
1------2------3
| |
4------|
Figure 1: Example topology for the routing underlay.
1
/ \
2 4
/
3
Figure 2: Multicast distribution tree for BFR 1 on the BIER Layer.
When BFR 1 sends a packet to BFR 3, the NH is BFR 2. If link 1<->2
fails, packets encapsulated within a lower-layer technology can no
longer be delivered from BFR 1 to BFR 2. As soon as BFR 1 is
informed that BFR 2 is no longer reachable, it encapsulates the BIER
packets to BFR 3 within the routing underlay towards BFR 2. When the
routing underlay has restored connectivity, the BIER packets are
tunneled from BFR 1 via BFR 4 to BFR 2 which decapsulates them. Then
BFR further forwards the BIER packets to BFR 3.
4.2. BIER-FRR Node Protection
We introduce the mechanism, illustrate it by an example, and explain
how needed backup BIFT entries are computed.
4.2.1. Mechanism
When a BFR is informed about an unreachable NH, it tunnels all
affected BIER packets to that NH if the NH receives a copy of the
BIER packet, and to all NNHs over which copies of the BIER packet are
Merling & Menth Expires September 6, 2019 [Page 8]
Internet-Draft BIER-FRR March 2019
to be delivered. The latter are the relevant NNHs. Before tunneling
the packets, their bitstrings are modified using backup F-BMs to
avoid forwarding loops and duplicates.
The BIFT and its operation are explained in detail in Section 6.4 of
[RFC8279]. We briefly revise them to facilitate further reading
before introducing backup BIFT entries to support the solution
presented above. Figure 3 illustrates the structure of the BIFT.
The BIFT contains for each BFR-id a F-BM and the next hop (BFR-NBR).
The BFR-id is mapped to a position in the bitstring of the BIER
header; for this purpose, the bits within a bitstring are counted
from right to left starting with 1. The F-BM is also a bitstring and
indicates all BFRs that are reachable through the multicast
distribution subtree via BFR-NBR. As a result, the F-BMs in a BIFT
are either identical (same BFR-NBR) or disjoint with regard to
activated bits. For transmission of BIER packets, the BIFT is used
together with a copy of the bitstring of the BIER header. Processing
is performed by the following loop. An entry from the BIFT is
selected that holds a BFR-id which is set in the copy of the
bitstring. Then, the F-BM of that entry is applied to the bitstring
of the BIER packet and then the BIER packet is sent to the indicated
BFR-NBR. The bits of the F-BM are cleared in the bitstring copy and
the loop restarts. It ends when all bits in the bitstring copy are
zero.
--------------------------------------------------------------
| BFR-id | F-BM | BFR-NBR |
--------------------------------------------------------------
| 1 | | |
Figure 3: Structure of the BIFT according to [RFC8279].
--------------------------------------------------------------
| BFR-id | F-BM | BFR-NBR |
--------------------------------------------------------------
| 1 | primary F-BM | primary NH |
| | backup F-BM | backup NH |
--------------------------------------------------------------
| ... | ... | ... |
Figure 4: Structure of a BIFT with primary and backup entries.
To support BIER-FRR node protection, backup BIFT entries for
protected BFR-NBRs are added to the BIFT. That structure is
illustrated in Figure 4. We call the normal BIFT entries primary
entries. Backup BIFT entries have the same structure as primary BIFT
entries and are used for forwarding in the same way. The set of
Merling & Menth Expires September 6, 2019 [Page 9]
Internet-Draft BIER-FRR March 2019
active bits in a primary BIFT entry must equal the set of active bits
in its corresponding backup entries to guarantee that all
destinations in the multicast distribution subtree via BFR-NBR are
protected.
If the BFR-NBR of a primary BIFT entry is reachable, the
corresponding backup BIFT entries are ignored in the forwarding
process. If the BFR-NBR of a primary BIFT entry is unreachable, the
BIER packet is processed using the corresponding backup BIFT entries
instead of the primary BIFT entry. BIER packets sent by a backup
BIFT entry MUST be tunneled through the routing underlay to the
backup BFR-NBR after application of the backup F-BM.
There are other options to organize the backup entries just as there
are options for more scalable BIFT organization.
4.2.2. Example
Figure 5 shows an example toplogy for the routing underlay and
Figure 6 the multicast distribution trees for BFR 1 and BFR 2 on the
BIER Layer which are computed based on shortest paths.
1------2------5
| | |
3------4------6
Figure 5: Example topology for the routing underlay.
1 2
/ \ /|\
2 3 4 5 1
/ \ / \
4 5 3 6
/
6
Figure 6: Multicast distribution trees for BFR 1 and BFR 2 on the
BIER Layer.
Figure 7 gives the BIFT for BFR 1 with backup entries.
Merling & Menth Expires September 6, 2019 [Page 10]
Internet-Draft BIER-FRR March 2019
---------------------------------
| FRR-BIFT BFR 1 |
---------------------------------
| BFR-id | F-BM | BFR-NBR |
---------------------------------
| 1 | 000001 | - |
| | - | - |
---------------------------------
| 2 | 111010 | 2 |
| | 000010 | 2 |
---------------------------------
| 3 | 000100 | 3 |
| | 000100 | 3 |
---------------------------------
| 4 | 111010 | 2 |
| | 101000 | 4 |
---------------------------------
| 5 | 111010 | 2 |
| | 010000 | 5 |
---------------------------------
| 6 | 111010 | 2 |
| | 101000 | 4 |
---------------------------------
Figure 7: BIFT of BFR 1 with backup entries.
When BFR 1 sends a BIER packet to BFR 6, the NH is BFR 2. If link
1<->2 fails, BIER packets encapsulated within a lower-layer
technology can no longer be delivered from BFR 1 to BFR 2. As soon
as BFR 1 is informed that BFR 2 is no longer reachable, it applies
backup BIFT entries to forward affected BIER packets. That means, it
modifies the bitstring of BIER packets towards BFR 6 with the
appropriate backup F-BM and sends them to backup NH BFR 4 after
encapsulation within the routing underlay. Therefore, the packets
are tunneled from BFR 1 via BFR 3 to BFR 4. BFR 4 decapsulates the
packet and a copy of the BIER packet is delivered to BFR 6.
4.2.3. Computation of Backup BIFT Entries
We explain the computation and give an example.
4.2.3.1. Computation
BIER-FRR node protection ensures that a PLR can send BIER packets in
case of an unreachable NH to all BFRs in the downstream multicast
subtree of the unreachable NH. For this purpose, backup entries for
these BFRs need to be provided in the BIFT of the PLR. We compute
them differently for the NHs of PLRs and for all other BFRs which
Merling & Menth Expires September 6, 2019 [Page 11]
Internet-Draft BIER-FRR March 2019
belong to multicast subtrees starting with a NNH. This leads to two
computation rules:
1. BIER packets for NHs are sent to the NHs (backup-NH = NH) via a
tunnel and the backup F-BM must ensure that these BIER packets
are not forwarded any further. That means, the backup F-BM
contains only the BFR-id of the NH.
2. BIER packets for other BFRs are sent via a tunnel to the NNH in
the multicast subtree they belong to. Also all other BFRs in the
same multicast subtree should be reached with the same BIER
packet. Therefore, the backup F-BM for a BFR contains the BFR-
ids for all BFRs in its multicast subtree starting with the
respective NNH. Thus, the corresponding backup F-BM can be
computed by ANDing the PLR's F-BM for the NH and the NH's F-BM
for the specific NNH.
4.2.3.2. Example
We consider the BIFT of BFR 1 in Figure 7.
Example for rule (1): The backup BIFT entry for BFR 2 has a F-BM that
just contains BFR 2 (000010).
Example for rule (2): The backup BIFT entry for BFR 4 has a F-BM that
contains BFR 4 and BFR 6 (101000). It is computed ANDing the F-BM of
BFR 1 for BFR 2 (111010) and the F-BM of BFR 2 for BFR 4 (101100).
The latter has been derived from the multicast distribution tree of
BFR 2 in Figure 6.
4.3. Protection Level
BIER-FRR is a protection scheme that reacts when a NH is no longer
reachable. It is a local mechanism that does not require signaling
or cooperation with other nodes, possibly except for the detection of
locally unreachable NHs.
The protection ensures that BIER multicast traffic is forwarded to
all destinations that are reachable over the routing underlay and
that no duplicates occur. The protection is fast as it works as soon
as the BFR is informed about a unreachable NH and the underlying
routing works again after the failure occurred.
BIER-FRR link protection is able to protect single link failures
within a network provided that the underlying routing can restore
full connectivity. Multiple link failures within a network are not
necessarily protected.
Merling & Menth Expires September 6, 2019 [Page 12]
Internet-Draft BIER-FRR March 2019
BIER-FRR node protection protects both single link and single node
failures within a network provided that the underlying routing can
restore full connectivity. Multiple link and node failures within a
network are not necessarily protected.
The design of BIER-FRR guarantees loop-freeness on the BIER layer.
Since the BIER packet is tunneled, the BIER is header is only used
for forwarding if the tunneled packet arrives at the designated BFR.
Loop-freeness on the routing underlay is out of the scope of this
document.
5. Necessary Changes to the BIER Architecture
This section serves as an overview to list the necessary conceptual
features or changes that are required for BIER-FRR.
5.1. Unicast Tunneling
Unicast tunnels to connect two not directly adjacent BFRs are already
available. This feature is described in Section 6.9 of [RFC8279].
5.2. Detecting Unreachable N(N)Hs
A liveness component (e.g. BFD) has to be added to enable the
detection of unreachable NHs. This feature has been proposed in
[I-D.hu-bier-bfd].
5.3. BIFT with backup entries
The BIFT has to be extended with backup entries as described in
Section XXX. When the regular BIER forwarding procedure yields an
unreachable NH, the backup entry contains a backup F-BM for header
modification and a NNH to which the BIER packet should be tunneled
to.
6. Security Considerations
This memo does not extend the security considerations for BIER.
7. IANA Considerations
This document requests no action by IANA.
8. References
Merling & Menth Expires September 6, 2019 [Page 13]
Internet-Draft BIER-FRR March 2019
8.1. Normative References
[I-D.hu-bier-bfd]
hu, f., Mirsky, G., Xiong, Q., and C. Liu, "BIER BFD",
draft-hu-bier-bfd-02 (work in progress), October 2018.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC8279] Wijnands, IJ., Ed., Rosen, E., Ed., Dolganow, A.,
Przygienda, T., and S. Aldrin, "Multicast Using Bit Index
Explicit Replication (BIER)", RFC 8279,
DOI 10.17487/RFC8279, November 2017,
<https://www.rfc-editor.org/info/rfc8279>.
8.2. Informative References
[I-D.xiong-bier-resilience]
Xiong, Q., hu, f., and G. Mirsky, "The Resilience for
BIER", draft-xiong-bier-resilience-01 (work in progress),
October 2018.
[RFC5286] Atlas, A., Ed. and A. Zinin, Ed., "Basic Specification for
IP Fast Reroute: Loop-Free Alternates", RFC 5286,
DOI 10.17487/RFC5286, September 2008,
<https://www.rfc-editor.org/info/rfc5286>.
Authors' Addresses
Daniel Merling
University of Tuebingen
Sand 13
Tuebingen 72076
Germany
Phone: +49 7071 29-70507
Email: daniel.merling@uni-tuebingen.de
Merling & Menth Expires September 6, 2019 [Page 14]
Internet-Draft BIER-FRR March 2019
Michael Menth
University of Tuebingen
Sand 13
Tuebingen 72076
Germany
Phone: +49 7071 29-70505
Email: menth@uni-tuebingen.de
Merling & Menth Expires September 6, 2019 [Page 15]