<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-bier-frr-12" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="BIER-FRR">A Framework for Fast Reroute with Bit Index Explicit Replication (BIER-FRR)</title>

    <author initials="H." surname="Chen" fullname="Huaimo Chen">
      <organization>Futurewei</organization>
      <address>
        <email>hchen.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="McBride" fullname="Mike McBride">
      <organization>Futurewei</organization>
      <address>
        <email>michael.mcbride@futurewei.com</email>
      </address>
    </author>
    <author initials="S." surname="Lindner" fullname="Steffen Lindner">
      <organization>University of Tuebingen</organization>
      <address>
        <email>steffen.lindner@uni-tuebingen.de</email>
      </address>
    </author>
    <author initials="M." surname="Menth" fullname="Michael Menth">
      <organization>University of Tuebingen</organization>
      <address>
        <email>menth@uni-tuebingen.de</email>
      </address>
    </author>
    <author initials="T." surname="Eckert" fullname="Toerless Eckert">
      <organization>Futurewei</organization>
      <address>
        <email>tte@cs.fau.de</email>
      </address>
    </author>

    <date year="2026"/>

    
    
    

    <abstract>


<?line 89?>

<t>This document provides a framework for the development of Fast Reroute (FRR)
mechanisms for Bit Index Explicit Replication forwarding (BIER-FRR). BIER-FRR
can provide protection against link or BFR failure by invoking locally
pre-determined repair paths that can react in the same time-scales as
(unicast) FRR for MPLS or IP networks - "sub 50msec", and without the creation
of additional per-path or per-flow state coordinated across multiple routers/LSR.</t>

<t>BIER-FRR can be implemed locally within a router/LSR with minimal interoperability
requirements against other router/LSR. It can therefore easily be introduced
incrementally or selectively where needed. BIER-FRR implementing nodes only
need to understand the routing topology of the network for calculation of
repair paths and know what type of unicast encapsulation can be used to send ("tunnel")
BIER packets to remote BFR.</t>

<t>This document proposes and discusses different options for BIER forwardng (BIFT) extensions
to support BIER-FRR. These are exemplary and non-normative. This document does not
specify any standards or experiments but aims to support such efforts.</t>



    </abstract>



  </front>

  <middle>


<?line 109?>

<section anchor="terminology"><name>Terminology</name>

<t>This document uses the following definitions:</t>

<t>BIER: Bit Index Explicit Replication</t>

<t>BIER-FRR: Bit Index Explicit Replication Fast ReRoute</t>

<t>BFR: Bit-Forwarding Router</t>

<t>BFR-NBR: Bit-Forwarding Neighbor</t>

<t>BFIR: Bit-Forwarding Ingress Router</t>

<t>BFER: Bit-Forwarding Egress Router</t>

<t>BIFT: Bit Index Forwarding Table</t>

<t>F-BM: Forwarding Bit Mask</t>

<t>PLR: Point of Local Repair</t>

<t>LFA: Loop Free Alternate</t>

<t>BF-BM: Backup F-BM</t>

<t>BBFR-NBR: Backup BFR-NBR</t>

<t>BFA: Backup Forwarding Action</t>

<t>BEA: Backup Entry Active</t>

</section>
<section anchor="overview"><name>Overview</name>

<t>BIER-FRR describes how IP FRR style sub-50 msec protection can be done for BIER.
The BIER-FRR mechanisms described in this document adhere to a
primary/backup path model, also known as 1:1 protection where traffic
is forwarded either over a primary path or over a backup path.</t>

<t>It is in contrast to a 1+1 protection model, where traffic is
duplicated across both primary and backup paths. That 1+1 principle has
been described by Multicast-only Fast Reroute (MoFRR) <xref target="RFC7431"/> and was explored for BIER in <xref target="BrAl17"/>.</t>

<t>This memo is informational because it is a technology primer explaining the
benefits of and mechanisms for Fast ReRoute (FRR) with Bit Inexed Explicit Replication (BIER)
stateless multicast forwarding. This document is not a standards track document because</t>

<t>o  Most if not all mechanisms possible can be implemented solely on single routers supporting
   BIER without the same or "interoperable" new mechanism to be supported by other
   routers supporting BIER.</t>

<t>o  At this point in time, it is unclear which of the advanced mechanisms presented are most
   feasible for implementation adoption in different type of routers supporting BIER,
   because the feasibility of implemeting them depend on the specifiec abilities of
   the routers forwarding plane.</t>

<section anchor="benefits"><name>Benefits</name>

<t>BIER is a novel method that allows to simplify and scale the deployments of
multicast services significantly over widely deployed technologies like
<xref target="PIM-SM"/> for IP networks including SRv6 networks or <xref target="mLDP"/> for MPLS or SR-MPLS networks.
The key novelty of BIER is that it is stateless whereas the prior mechanisms are stateful.</t>

<t>BIER-FRR allows to achieve fundamentally the same so-called "sub 50msec" recovery from link or
node failure that <xref target="IP-FRR"/> achieves the same networks for unicast traffic. Stateful
multicast mechanisms including <xref target="PIM-SM"/> and <xref target="mLDP"/> can not support FRR directly.
Instead, they must be combined with prior mechanisms to achieve link-protection (such as
<xref target="RSVP-TE"/> with <xref target="RFC4090"/> or explicit paths with SR). In summary, link-protection
with these pre-existing mechanisms is more complex and less efficient, and node-protection
is mostly considered infeasible  because of the involved complexity and excess traffic
it causes.</t>

<t>BIER-FRR likely allows for the most efficient and simple multicast FRR because it
fundamentally operates like unicast, except that a BIER packet does not indicate only
one destination but a list of multiple packets, allowing for each router to perform
unicast like forwarding plus whenever necessary replication of the packet to any
outgoing interface through which one or more of these destinations need to be reached.</t>

<t>The following sections detail these summaries.</t>

<section anchor="bier-versus-ip-multicast"><name>BIER versus IP multicast</name>

<t>BIER <xref target="RFC8279"/> is a novel method for so-called "stateless" forwarding and replication
of traffic, especially IP multicast, across networks such as Service Provider
network. BIER is intended to replace prior, so-called "stateful" methods of
IP multicast, such as the predominantly deployed <xref target="PIM-SM"/> in these networks.</t>

<t>In IP (unicast), variations in user traffic across such a Service Provider network
do only impact capacity utilization of the network (links and nodes), but not the
control-plane activity and forwarding plane state scalability: IGP and BGP
routing protocol operations and scalability and derived forwarding plane scalability
and change performance. Only changes in the network topology through failures, recovery
and network expansion cause the need for high-performance control-plane activity
and/or increased scale requirements. This makes IP unicast Service Provider network
designs arguably very easily scalable to arbitrary levels of throughput, a core
requirement for successful Service Provider network deployments.</t>

<t>In stateful IP multicast, this is not the case. Every individual new IP multicast
application, with new senders and/or receivers can create new control-plane
state (from e.g.: PIM-SM) hop-by-hop across such a Service Provider network. Every
failure or recovery of links or nodes in the network require control-plane and
forwarding-plane re-convergence that needs to be able to scale not with the
total size of the network (unicast routing table), but with the total number
of IP multicast applications. Denial of Service attacks in IP multicast are
equally not limited to attempts of overloading network bandwidth, but can more
easily attempt to overload this control-plane and forwarding-plane state through
the creation of new IP multicast application state. Because this does not even
need for the attackers to have significant bandwidth available, this attack
is a lot easier to achieve.</t>

<t>BIER resolves these issues by eliminating the per-IP-multicast application
state across Service Provider networks by utilizing fundamentally very much
the same packet forwarding paradigm as IP (unicast). The packet simply
contains a list of destinations in it's packet header (encoded very efficiently
as a bitstring), and on every hop the packet is replicated and forwarded to all the next-hop
routers towards one or more of those destinations. No IP-multicast group state is
required for this forwarding.</t>

</section>
<section anchor="frr-overview"><name>FRR for BIER versus IP/MPLS unicast and multicast</name>

<t>In IP-FRR, which is also applicable to FRR for SR-MPLS (and hence MPLS networks),
unicast packets are forwarded by every router/LSR (Label Switched Router) based</t>

<t>In IP (IPv4 and IPv6), packets are forwarded hop-by-hop in routers based on the
destination address of the packet. for each destination (prefix) the forwarding
entry indicates a next-hop which may be an outgoing interface or an outgoing
intercace with a particular next-hop-neighbor if the outgoing interface is a multi-access
subnet (like ethernet with multicast routers connected to it).</t>

<t>IP-FRR amends the per-packet forwarding with a check whether the outgoing interface or
the next-hop-neighbor are failed. If so, then the packet is instead forwarded
to a so-called FRR adjacency, which is primarily a different interface/next-hop-neighbor,
but can also involve an additional 'steering' header, such as from SR-MPLS or
<xref target="SRH"/>. These FRR adjacencies are pre-calculated by the routing control plane.</t>

<t>Note too, that these IP-FRR mechanisms are not limited to IP networks including SRv6
networks, but they are equally applicable to SR-MPLS networks.</t>

<t>In BIER-FRR, exactly the same principles of IP-FRR can be used, except that
when a BIER packet is processed by the forwarding plane, a forwarding decision needs
to be taken not only once (as in unicast), but once for every bit (destination)
in the bitstring. For each bit, an interface/next-hop-neighbor is determined and
a copy of the packet is sent to it. Unless such a copy was already made for a prior examined
bit in the packets bitstring, hence avoiding more than one copy of the packet to each
interface/next-hop-neighbor. Each packet will also receive a modified version of the
bitstring which indicates the subset of bits in the received packets bitstring
which are reachable across this same interface/next-hop-neighbor.</t>

<t>Beside being able to apply all the same mechanisms to BIER-FRR as available in
IP-FRR, BIER-FRR specifically maintains the benefit of the most efficient hop-by-hop
replication, even when a packet has to be put onto a BIER-FRR adjacency.</t>

<figure title="Example 1" anchor="example1"><artwork align="center"><![CDATA[
        R10 ---- R11 --- R12
         |               |
        R9          ---- R3 --- R6
         |        /      |
  R0 -- R1 ----- R2 ---- R4 --- R7
             L1   \      |
                    ---- R5 --- R8
]]></artwork></figure>

<t>pre-existing unicast LFA algorithms for LFA from R1 to R6 in case of R2 failure
would for example calculate that it is sufficient to encapsulate a packet up to
R10 but towards R8, that encapsulation endpoint would need to be R11 because
R10 would send back packets to R8 to R9 because that is its shorted path
(before reconvernce).</t>

<t>Consider some multicast packets from R0 would need to be received by a subset of (R6,R7,R8).
They would be forwarded from R0 to R1, by R1 to R2, and from R2 to R3, R4, R5 to then
reach R6, R7, R8. Assume one multicast group, G1 would only need to go to R6.
R2 would then have multicast forwarding state G1 -&gt; (R3) to copy the packet only to R3.
Another group G2 would need to go to R6, R7, R8. R2 would then have G2 -&gt; (R3, R4, R5)
meaning it would replicate packets to G1 to R3, R4 and R5.</t>

<t>Assumme R2 fails. FRR in R1 would recognize this as a failure of the link to R2
and be configured to assume this indicates failure of R2 and hence pre-established
R2 node-protection FRR would kich in. Instead of sending a packet to R2, R1 it would
send the packet onto the FRR packup path. With 
existing stateful multicast, FRR in R1 would have needed to pre-calculate and install
three unicast backup path ("tunnels"). R1-...-&gt;R3, R1-...-&gt;R4 and R1-...-&gt;R5. R1 would
then have to send three copies of each multicast packet, one into each backup path.
If this was a packet for G1, then two of these copies would be in wain and be discarded
by R4 and R5.</t>

<t>If a stateful multicast FRR solution would want to avoid such unnecessary excess traffic,
it would need to install per group FRR state - a separate state for G1 and G2. In real
networks there are not just 2 groups but thousands (#G). In the picture, R1 only has one
outgoing interface to which to replicate. In a real network, it would have on average
N outgoing interfaces/next-hops and this type of traffic optimized FRR for stateful
multicast would create #G*N additional states on each hop.  In addition, new protocol
mechanisms to signal all this information would need to be developed, because today,
R1 would not know which group would need to go to which subset of R3,R4,R5. Such
protocol mechanisms where never developed and hence this type of stateful FRR for
"node protection" (in this case for the failure of R2) is just theoretical.</t>

<t>With BIER-FRR, the solution becomes extremely simple for this example. The BIER-FRR control
plane in R1 can calculate that the FRR adjacency for the case of R2 failing for all
three possible destinations R6, R7, R8 can be R11.
When R1 recognizes failure of (link to) R2, it would send the BIER packet with
exactly the same bits encapsulated towards R11 (via R9, R10) and there normal BIER forwarding proceeds.
According to the subset of bits for R6, R7, R8 set in the bitstring, R3,R4,R5 would make according
copies. Like in FRR for unicast, it does not matter to BIER that the packet did
arrive from R10 as opposed to R2, it is only revelant what destinations it has
(in its bitstring).</t>

<t>R2 could not simply send the packt to R9, because it is not aware of R2 having failed,
so its routing table would send packet packets for R6,R7,R8 towards R1 because that 
is the shortest path from R9 to R6,R7,R8. Likewise, R10 too would still send back
packets towards R8 to R1. Only for R11 are paths not across the failed R2 the
shortest path towards R6,R7,R8.</t>

<t>Note that the forwarding described for BIER-FRR here is LFA-based BIER-FRR in the
terminology introduced later in this document.</t>

</section>
</section>
<section anchor="introduction"><name>Introduction</name>

<t>The protection level offered by BIER-FRR can be either link protection
or node protection. This is like in IP FRR and both of them can co-exist.</t>

<t>Link protection is limited to safeguarding against link failures and
is simpler to implement but will not be effective if a BFR neighbor fails.</t>

<t>Node protection, while more complex, also guards against the failure
of BFRs.  The choice of backup strategy determines the selection of backup
forwarding entries.</t>

<t>As in IP FRR, one would typically use node protection and apply link-protection
only when the next-hop node is the actual destination (BFER), so that only
link-protection makes sense.</t>

<t>The followin introductory text explains the two fundamental approaches
to BIER-FRR, one being tunnel-based BIER-FRR, and the other being
LFA-based BIER-FRR.</t>

<section anchor="tunnel-based-bier-frr"><name>Tunnel-based BIER-FRR</name>

<t>In this approach, a BIER forwarding entry to a BFR-NBR is replaced by
an (IP)-FRR protected adjacency which encapsulates the BIER packet
into a unicast packet towards that BFR-NBR. This is exactly what
classicial (non IP) FRR in MPLS was and is doing with RSVP-TE backup
tunnels. Hence the name tunnel-based.</t>

<t>For example, assuming the topology of <xref target="example1"/> and R1 as the BFR where
this form of FRR is to be installed. Usually a BIER forwarding entry
towards R2 is simply an L2 adjacency for BIER packets. Instead, that L2 adjacency
towards R2 is set to be a unicast encapsulation (IPv4, IPv6 or SR-MPLS) with
a unicast IPv4/IPv6 destination of R2. In the case of SR-MPLS, the
actual encapsulation will have an MPLS SID for the IPv4 and/or IPv6
address of R2.</t>

<t>Absent a failure of link L1, this change means simply an "unnecessary"
encapsulation of BIER packets from R1 to R2 and decapsulation there.</t>

<t>If instead, the link L1 fails, the BIER packet on R1 will get
encapsulated into the unicast packet, and once it is to be forwarded as
unicast, the unicast forwarding will determine that the link L1 has failed
and will hence forward the packet on the pre-calculated unicast FRR
adjacency towards R2. In the <xref target="example1"/> topology this means that
so-called TI-LFA (Topology Independent LFA) has to be used which can
calculate that packets towards R2 (in case of L1 link failures) need
to be encapsulated with a destination address of R11 - because 
sending the FRR packet only towards R9 or R10 would have it be
returned towards R1. In other topologies, simple (non TI) LFA may
suffice. In those cases, the FRR adjacency would simply be to
send the unicast packet to another next-hop without additional
encapsulation.</t>

<section anchor="limitations"><name>Limitations</name>

<t>Tunnel-based BIER-FRR is only applicable to link-protection but not
node-protection. This is because Tunnel-based BIER-FRR is based on
only having to replace BIER (L2) adjacencies with already existing FRR
protected unicast adjacencies. Tunnel-based BIER-FRR is not
applicable to node-protection because a failure of the next-hop
means that some other router in the network would need to replace
the replications of  BIER packet that this failed router could have
done, and there is no unicast FRR function that would do this.</t>

<t>The traffic efficiency of Tunnel-based BIER-FRR is typically lower
than that of LFA-based BIER-FRR because the traffic needs to be 
tunneled towards the BIER-NH and from there back as a regular
BIER packet. In the topology of <xref target="example1"/> a Tunnel-based BIER-FRR
packet from R1 to R6 would go R1-R9-R10-R11-R11-R12-R3-R2(decap)-R3-R6,
whereas as described in before, LFA-based would have it simply go
R1-R9-R10-R11-R11-R12-R3-R6 (not via R2).</t>

<t>Because Tunnel-based BIER-FRR requires FRR protected adjacencies to
a next-hop, unicast FRR needs to be configured to not only provide
node-protection adjacencies but also link-protection adjacencies
to all direct neighbors that are also BIER neighbors. This should
be standard unicast FRR deployment though when node-protection is
used.</t>

</section>
<section anchor="benefits-1"><name>Benefits</name>

<t>Tunnel-based BIER-FRR is least demanding to the BIER forwarding plane and
should be most easy to implement on any BFR already supporting unicast LFA.
No changes to the BIER forwarding tables (BIFT) are required other than
replacing the BFR-NBR entries.</t>

<t>For both unicast and BIER, Tunnel-based FRR is logically something
that can happen at the link-layer, not impacting the forwarding table,
and hence not requiring to scale with the size of the forwarding table.
Instead of sending a packet to a neighbor in a connected subnet, FRR
protection adds a check whether the interface to the subnet is up and/or
the neighbor is alive, and if not, then packet is instead redirected
to another interface (or neighbor on the same interface) with an
additional encapsulation.</t>

<t>The interoperability requirement for Tunnel-based is solely that the 
tailends of pre-calculated unicast FRR adjacencies are also BFR and will
accept to forward unicast FRR encapsulated BIER packets as BIER again
after decapsulation.</t>

<t>When the total amount of multicast/BIER traffic is insignificant compared
to the overall bandwidth in the network, the traffic inefficiencies of
Tunnel-based BIER-FRR may be irrelevant, but the inability to provide
node-protection may be insufficient.</t>

<t>Tunnel-based BIER-FRR does not necessarily have to be built from (IP)-LFA
based unicast adjacencies. It can equally be built from RSVP-TE tunnels
with FRR protection (or any other unicast FRR protected tunnels), which
may be attractive if those already exist in the network.</t>

</section>
</section>
<section anchor="lfa-based-bier-frr"><name>LFA-based BIER-FRR</name>

<t>In LFA-based BIER-FRR as in (unicast) IP FRR, the goal is to directly
get packets in the failure situation as directly as possible to
the ultimate destinations insted of back to the next-hop router
as in Tunnel-Mode.</t>

<t>The mechanisms are exactly the same as in unicast IP FRR, specifically
that it requires to establish for every destination in the unicast
or BIER forwarding table (BIFT) new "FRR protected" adjacencies", and
hence it requires additional forwarding resources in the order of
forwarding table entries. These can often be optimized, but it does
cost overall more forwarding plane resources than Tunnel-based BIER-FRR.</t>

<t>BIER-FRR will often be able to re-use pre-existing (unicast) IP FRR
adjcancies in the BIER forwarding table (BIFT), but there are some
optimizations and differences to observe. These are described here.</t>

<section anchor="principles-of-unicast-lfa"><name>Principles of (unicast) LFA</name>

<t>The principles of unicast LFA are to determine a path from the node
determining an adjacent link or node failure towards some desting
assuming that the intermediate hops on this alternative path still
have the routing tables in which there is no failed link or node.
The problem with this principle is that nodes along the best
alternative path would not send packets along the intended path
but back to where they come from because without a failure, that
could be the best path for them.</t>

<t>Using the example of <xref target="example2"/>, and examining the case
where R1 tries to calculate unicast link-protection FRR for the failure
of link L1. It calculates for each of the destinations of interest,
R6, R7 and R8 the shortest path. Each of these path goes along</t>

<figure title="Example 2" anchor="example2"><artwork align="center"><![CDATA[
              (q6,q7) (q8,q7,q6)
         (p)   (p)    (p)
        R11 -- R12 -- R13 --- R14 
         |                     |
        R10(p)                 R15 
         |                     |
        R9(p)          ------- R3 --- R6
         |           /         |
    R0- R1 -------- R2 ------- R4 --- R7
             L1      \         |
                       ------- R5 --- R8
]]></artwork></figure>

<t>LFA characterizes routers along an FRR path by whether they
are part of the so-called P-space and/or Q-space <xref target="RFC7490"/>.</t>

<t>The p)re-converge space are all routers that can be reached
from the router of interest (R1) in the pre-convergence routing
table without going through the failed link (or node). For
example from R1 under failure of L1 or R2, the routers
R9, R10, R11, R12 and R13 are in p-space. R14 is not in p-space
anymore because assuming all links have equal cost, the
path from R9 to R14 is ECMP through either R1 and the
failed link/node or R10. And R1 can not know which route
R9 is using. So packets from R1 to R14 via R9 might be
returned by R9. And R15 is most easily not in p-space anymore,
because R9 would be guaranteed to send packets from R1 towards
R15 back to R1.</t>

<t>q-space is the reverse p-space (as q is typographically a reverse p),
indicating whether a router can reach the ultimate destination
without going through the failed link/node in the pre-converged
routing tables.</t>

<t>R13 is in the q-space for R8, whereas
R12 is not. It has ECMP paths via R13 and R11, and the
path via R11 would go via the failed link/node (L1/R2).
However, R12 is in q-space for R6 and R7 though.</t>

<t>The FRR logic is now simply that if packets can not be sent
directly to an alternative next-hop without encapsulation,
then they need to be encapsulated and sent to a router that
is both in p-space and q-space for the final destination.
Because R9 is not in q-space for any of the destinations of
interest in BIER, directly sending packets to R9 does not
work - whether link failure of L1 is assumed, or node failure of R2.</t>

<t>Instead, R1 would create for R6 an FRR adjacency encapsulating
the packet with an appropriate unicast encapsulation destined
to R12 or R13 and make R9 the next-hop for this encapsulated packet.
Likewise for R7. For R8, it would need to use R13 as the encapsulation
destination.  Most likely R1 would pick R12 for R6 and R7 because the
path with encapsulation is typically choosen to be as short
as possible but with most often insignificant differences.</t>

</section>
<section anchor="optimization"><name>Adjustments for BIER-FRR</name>

<t>If the same logic as for unicast is choosen for BIER-FRR, it does make a significant
difference whether R12 or R13 are picked as FRR for R6,R7 or if
R13 is picked. For BIER, the same FRR adjacency "encapsualte towards R13"
would mean that a BIER packet destined to R6 and R8 could be sent once
across that FRR adjcency. If instead R6,R7 had the "encapsulate towards R12"
FRR adjacency, and R8 "encapsulate towards R13", then BIER would need
to send two copies of that BIER packet to R6,R8: once encapsulated for
R6 towards R12 and once encapsulated for R8 towards R13. In this case,
if L1 or R2 are failling, R1 would need to send two copies of the
same packet instead of one if R13 was choosen as the pq-router for
R6, R7 and R8.</t>

<t>So, while the principle of unicast FRR holds true, BIER makes it
more beneficial to choose longer encapsulated paths to minimize
unnecessary replications. On the other hand (not shown by example
topology), longer encapsulation paths may also result in longer
paths from the point of decapsulation, and there may be a more
complex weighting of multiple copies across the same encapsulated
path versus such longer paths after the decapsulation.</t>

</section>
<section anchor="topology-independent-frr"><name>Topology Independent FRR</name>

<t>A simple encapsulation towards a router in pq-space
may not suffice. This is the same for BIER-FRR as it is for unicast FRR.</t>

<figure title="Example 3" anchor="example3"><artwork align="center"><![CDATA[
        (p6,p7,p8)     (q6,q7,q8)
        R10 ************ R13
         |     L2        |
         |          ---- R3 --- R6
         |        /      |
  R0 -- R1 ----- R2 ---- R4 --- R7
             L1   \      |
                    ---- R5 --- R8

   *** - high link cost 100
   --- - low  link cost 1
]]></artwork></figure>

<t>Consider in <xref target="example3"/> that a link between R10 and R13 has a
significantly higher cost than the other links in the topology.
In result, R10 is in p-space, R13 in q-space and hence there is
no single router in pq-space that R1 could encapsulate packets to to
reach R6, R6, R8 under failure of L1 or R2. If R1 would want to
send packets to ANY node in the topology across R10 under failure
of L1 or R2, R10 would simply send them back because of the
high cost of L2.</t>

<t>To get packets across L2, a steering encapsulation is required that
does ignore the actual IGP routing table. For example with
SR-MPLS or SRv6 this could be a two-hop SID list, once to R10
and then to an adjacency-SID for R13. An adjacency SIP would only
be possible to interpret by R10 and indicate to R10 to forward
the packet to the interface of R13 connecting to R10. This type
of FRR solutions are documented in <xref target="RFC9855"/>. There are
no additional considerations for BIER-FRR.</t>

</section>
<section anchor="partitioned"><name>Partitioned q-space</name>

<t>Even though the big advantage of BIER-FRR with node protection
is that it allows most often and as shown in the prior example <xref target="example2"/>
to send out just one copy of a packet to an FRR adjacency instead
of to the primary adjacency, there are also cases that more
than one copy need to be sent. This is always true in BIER-FRR
node protection, when a BIER packet though the primary adjacency
would have to reach multiple destinations (BFER) and the q-spaces
for those destinations are non-overlapping (partitioned).</t>

<t>In <xref target="example4"/>, R1 is the PLR and R2 is the node assumed to fail.
R1 would have a BIFT in which R5, R6, R7, R8 are reachable via R2,
but in case of a node failure of R2, there is no single node which
is in q-space for all of R5, R6, R7, R8 (shown as p5, p6, p7, p8).
R12 for example is only in p-space for R1 but not in q-space for
any destination because it would go via R1 to reach any of R5, R6, R7, R8.</t>

<figure title="Example 4" anchor="example4"><artwork align="center"><![CDATA[
                (q5,q8) (q5,q6) (q5,q6)
                   (p1)   (p1)  (p1)
                -- R11 -- R10 - R12 - R3 -- R5
               /                     / \
              |             /--------   --- R6
     R0 ---- R12 -- R1 -- R2
          (p1)|        L1   \--------   --- R7
               \                     \ /
                -- R13 -- R9 -- R4 - R7 --- R8
                   (p1)  (p1)  (p1)
                (q7,q8) (q7,q8) (q7,q8)
                      
]]></artwork></figure>

<t>In result, R1 does need to create an FRR adjacencies for R5 and R6
towards R11 and one for R7 and R8 towards R13. If then a packet comes
towards all of R5, R6, R7, R8, R1 will create one copy towards
R11 for R5 and R6, and another copy towards R13 for R7 and R8.
This creates double the amount of originally received traffic from
R12 back towards R12, but from there on, it again has only
one copy on each link as opposed to any non-BIER FRR mechanism
which would still carry two copies for example one for R5 and another
for R6.</t>

<t>See <xref target="bier-in-bier"/> for discussions of non-working enhancements.</t>

</section>
</section>
<section anchor="re-use-of-routing-underlay-frr-adjacencies"><name>Re-use of routing underlay FRR adjacencies</name>

<t>If the routes in the network are the same for BIER as they are for
unicast routing from which FRR is being calculated, then the
FRR adjacencies created for unicast can equally be re-used for BIER.</t>

<t>For example, when creating BIER-FRR entries in the BIFT, the BIER
control plane could simply look up for every BFER the IP FRR information for
its BFR-prefix, which is the IP address of the BFER. The FRR adjacency
is then the same that could be used in the BIFT. This does of course
not take care of the optimization opportunities for BIER discussed
in <xref target="optimization"/>. But it equally works for the partitioned q-space
(<xref target="partitioned"/>).</t>

<t>What always needs to be set up explicitly for BIER with LFA-based
BIER-FRR is triggering of the FRR action from the BIER forwarding
(BIFT), because no unicast packet is involved at that point.</t>

</section>
<section anchor="conceptual-bier-forwarding-with-frr"><name>Conceptual BIER forwarding with FRR</name>

<t><xref target="RFC8279"/>, Figure 3, specifies the BIER forwarding conceptually through the
structure of the Bit Index Forwarding Table (BIFT).</t>

<t><xref target="bift-r1"/> shows an excerpt of the BIFT of R1 in <xref target="example4"/>, using 
slightly simplified representations to make it easiert to understand.
Every BFER has a BIFT forwarding entry (row). The forwarding 'address' is the
BIFT-id and is the BFRs bit in the packets bitstring. The BFR-NBR (BFR Neighbor)
is the adjacency to which a copy for the BFR-id needs to be sent.</t>

<t>The F-BM is the mechanism in BIER by which it avoid sending duplicates. It is
a bitstring including the bit of all BFR-id that can be reached when a
copy to this lines BFR-NBR is made. o</t>

<t>Assume a BIER packet to R5,R7,R13. Ithas a bitstring with the appropriate bit
for each of these destinations set. It first is matched against the one for R5
(first forwarding entry). It matches. A copy of the packet is made and sent
towards R1. This copy will have all bits in its bitstring removed which are
for R5,R6,R7,R8 - because these are the BFER that can be reached (shortest path).
The processing of the remaining forwarding plane entries continues with a packet
where those four bits are removed. Hence the rows for R6-R12 will not match,
but the forwarding entry for R13 will match again - and a second packet copy 
will be made following the same rules.</t>

<figure title="BIFT Example 4 R1 (exerpt)" anchor="bift-r1"><artwork align="center"><![CDATA[
       ------------------------------------
       | BFR-id |  F-BM         | BFR-NBR |
       ====================================
       | R5     |  R5,R6,R7,R8  |    R2   |
       ------------------------------------
       | R6     |  R5,R6,R7,R8  |    R2   |
       ------------------------------------
       | R7     |  R5,R6,R7,R8  |    R2   |
       ------------------------------------
       | R8     |  R5,R6,R7,R8  |    R2   |
       ------------------------------------
       | R11    |  R11,R12,R13  |    R12  |
       ------------------------------------
       | R12    |  R11,R12,R13  |    R12  |
       ------------------------------------
       | R13    |  R11,R12,R13  |    R12  |
       ------------------------------------
]]></artwork></figure>

<t>For FRR, logically the BIFT will need to have multiple forwarding
entries that need to behave differently under the event of one
specific link or node failure. For example <xref target="bift-r1-r2f"/>
shows the R1 BIFT excerpt under failure of R2.</t>

<figure title="BIFT Example 4 R1 under R2 failure" anchor="bift-r1-r2f"><artwork align="center"><![CDATA[
       ----------------------------------------------------
       | BFR-id |  F-BM         | BFR-NBR                 |
       ====================================================
       | R5     |  R5,R6        |  encap(dest:R11) NH:R12 |
       ----------------------------------------------------
       | R6     |  R5,R6        |  encap(dest:R11) NH:R12 |
       ----------------------------------------------------
       | R7     |  R7,R8        |  encap(dest:R13) NH:R12 |
       ----------------------------------------------------
       | R8     |  R7,R8        |  encap(dest:R13) NH:R12 |
       ----------------------------------------------------
       | R11    |  R11,R12,R13  |    R12                  |
       ----------------------------------------------------
       | R12    |  R11,R12,R13  |    R12                  |
       ----------------------------------------------------
       | R13    |  R11,R12,R13  |    R12                  |
       ----------------------------------------------------
]]></artwork></figure>

<t>In unicast LFA, there is alwys only one forwarding entry for a
packet that needs to be looked up and processed. And in result
also only the FRR adjacency to be considered: The one for the
next-hop of the forwarding entry.</t>

<t>In BIER-FRR with LFA-mode, this is not the case. Not only does
a node failure impact potentially multiple BIFT entries, but
one and the same BIFT entry may have multiple conflicting 
F-BM and BFR-NBR depending on which BFR-NBR has just failed.</t>

<t>TBD: shuold make an example of this problem.</t>

<t>Therefore, this memo will discuss some possible optimizations to
support this complexity.</t>

</section>
</section>
</section>
<section anchor="ex4_bier_frr"><name>Definition of BIER-FRR</name>

<t>BIER-FRR proposes a backup BIFT that comprises backup forwarding
entries.  They are executed before the primary forwarding entries in the normal
BIFT which is also denoted primary BIFT in this context.
In this subsection, forwarding actions are defined and the structure of
the backup BIFT is introduced.
Then activation and deactivation of backup forwarding entries as well
as the derivation of the backup F-BM (BF-BM) are explained.</t>

<section anchor="trigger_for_frr"><name>Definition of Forwarding Actions</name>

<t>A BFR-NBR is considered directly connected if it is a link-layer
next-hop.
Conversely, if the BFR-NBR cannot be reached directly through the link
layer, it is regarded as indirectly connected.</t>

<t>The following forwarding actions are defined:</t>

<t><list style="symbols">
  <t>Plain: The BIER packet is sent directly to a BFR-NBR via a direct
link without encapsulation in a tunnel.
This indicates that the packet is not forwarded through the underlying
network.</t>
  <t>Tunnel: The BIER packet is encapsulated with a tunnel header and
forwarded to a BFR-NBR over the routing underlay.</t>
  <t>Explicit: The packet is forwarded along an explicit path to a
BFR-NBR.
The specific path information must be provided.
If segment routing is employed for this purpose, the segment IDs
(SIDs) must be specified.
Two forwarding actions of type Explicit are considered equivalent
only if they utilize the same explicit path.</t>
</list></t>

<t>In the BIFT as outlined in <xref target="RFC8279"/>, the forwarding actions are
implicitly determined by the connectivity status of the BFR-NBR.
If the BFR-NBR is directly connected, the forwarding action is Plain.
If the BFR-NBR is not directly connected, the forwarding action is
Tunnel.</t>

</section>
<section anchor="backup_forwarding_entries"><name>Backup BIFT</name>

<t>The structure of the backup BIFT is given in <xref target="bift"/>.</t>

<figure title="Structure of the backup BIFT." anchor="bift"><artwork align="center"><![CDATA[
+--------+--------+----------+--------+-----+
| BFR-id | BF-BM  | BBFR-NBR |  BFA   | BEA |
+========+========+==========+========+=====+
|  ...   |  ...   |   ...    |  ...   | ... |
+--------+--------+----------+--------+-----+
]]></artwork></figure>

<t>The columns refer to:</t>

<t><list style="symbols">
  <t>BFR-id: the bit position of a BFER for which this row in the backup
BIFT applies.</t>
  <t>BF-BM: the Backup F-BM used for forwarding, used like the primary
F-BM.</t>
  <t>BBFR-NBR: the Backup BFR-NBR used for forwarding, used like the
primary BFR-NBR.</t>
  <t>BFA: the Backup Forwarding Action takes values as introduced in
Section 3.1 and indicates how the packet is forwarded to the
BBFR-NBR.</t>
  <t>BEA: the Backup Entry Active flag indicates if the backup forwarding
entry of this row is active.</t>
</list></t>

<t>The structure and semantics of the first three fields are identical to
the entries of the primary BIFT, as defined in Figure 3 of <xref target="RFC8279"/>,
and they are used in a very similar way.
The BEA indicates if the backup forwarding entry is executed.
In that case, the BFA indicates the forwarding action for the packet.</t>

</section>
<section anchor="a_backup_entry"><name>Activating and Deactivating Backup Forwarding Entries</name>

<t>When a primary BFR-NBR is not reachable over the implicit primary
action, a failure is observed.
Then, the BEA flag of the corresponding backup forwarding entry is
set.</t>

<t>If the primary BFR-NBR is directly connected, the information about
the failed interface is sufficient to detect its unreachability.
If the primary BFR-NBR is indirectly connected, a Bidirectional
Forwarding Detection (BFD) <xref target="RFC5880"/> session between the BFR as PLR and
the BFR-NBR may be used to monitor its reachability.</t>

<t>If the primary BFR-NBR is reachable again, the BEA flag is
deactivated.
This may be caused by the disappearance of the failure or by a change
of the primary BFR-NBR due to a reconfiguration of the BIFT.</t>

</section>
<section anchor="usage-of-the-backup-bift"><name>Usage of the Backup BIFT</name>

<t>An incoming packet is first matched against the backup BIFT.
A row in the backup BIFT matches a packet if the BEA flag in the
backup BIFT is set and if the BFR-id is set in the packet's bitstring.
Then, the BF-BM of the matching backup forwarding entry is applied to
the packet's bitstring.
That means, the packet is copied and in its bitstring the bits other
than those set in BF-BM are cleared before the packet is forwarded to
the BBFR-NBR with the indicated BFA.
Finally, the bits of the BF-BM are cleared in the bitstring of the
remaining packet.
In the absence of a match of the remaining packet, the normal
forwarding procedure continues, i.e., forwarding based on the primary
BIFT as described in <xref target="RFC8279"/>.</t>

<t>Note: If a BFR-id matches in the primary or backup BIFT, and the
transmission is not successful, the F-BM or BF-BM is still applied to
the bitstring of the remaining packet.</t>

</section>
<section anchor="f_bm_computation"><name>Computation of the Backup F-BM</name>

<t>The primary F-BM of a specific BFER identifies all BFERs that share
the same primary BFR-NBR.
The backup F-BM for a specific BFER is computed to indicate:</t>

<t><list style="symbols">
  <t>All BFERs that share both the primary and backup BFR-NBRs of the
specific BFER, and</t>
  <t>All BFERs for which the backup BFR-NBR of the specific BFER serves
as the primary BFR-NBR.</t>
</list></t>

</section>
<section anchor="alternative-representations-of-backup-forwarding-entries"><name>Alternative Representations of Backup Forwarding Entries</name>

<t>Alternative representations of backup forwarding entries are possible
as long as the same behavior is ensured.
Two other variants are introduced in the following sections.</t>

</section>
<section anchor="single-extended-bift"><name>Single Extended BIFT</name>

<t>The information of the primary BIFT and the backup BIFT may be
combined in a single extended BIFT.
Its structure is illustrated in <xref target="single_extended_bift"/>.</t>

<figure title="Structure of a single extended BIFT including backup forwarding entries." anchor="single_extended_bift"><artwork align="center"><![CDATA[
+--------+------+---------+--------+----------+--------+----+
| BFR-id | F-BM | BFR-NBR | BF-BM  | BBFR-NBR |  BFA   | BEA|
+========+======+=========+========+==========+========+====+
|  ...   |  ... |   ...   |   ...  |   ...    |  ...   |    |
+--------+------+---------+--------+----------+--------+----+
]]></artwork></figure>

<t>To ensure the same behavior, the BEA flag must be set like in the
backup BIFT.
Furthermore, two matching passes through the extended BIFT are needed.
A first one matches the bitstring combined with BEA=1.
If no further match is possible, then another pass with the remaining
bitstring combined with BEA=0 is performed.</t>

</section>
<section anchor="primary-bift-and-failure-specific-backup-bifts"><name>Primary BIFT and Failure-Specific Backup BIFTs</name>

<t>To avoid two distinct passes through a BIFT, the information of the
primary BIFT and backup BIFT may be combined into a primary BIFT and
multiple failure-specific BIFTs.
Each failure-specific BIFT corresponds to a specific failure scenario.
Failure-specific backup BIFTs are structured like normal backup BIFTs,
but do not have a BEA flag as they are enabled or disabled as a whole.</t>

<t>In the absence of a failure, packets are processed using the primary
BIFT.
In case of a failure, packets are processed using a failure-specific
BIFT that matches the occurred failure.
That means, there should be failure-specific BIFTs for at least any
adjacent link to protect against all single-link failures.
To support multiple failures, even more failure-specific BIFTs are
needed.
If failure-specific BIFTs are provided for only single-link failures,
the BIFT should be taken that covers the most relevant single failure.</t>

</section>
</section>
<section anchor="Representation"><name>Illustration and the Need for Prioritized Backup Forwarding Entries</name>

<t>In this section, BIER-FRR is illustrated using a small example.
It is pointed out that unnecessary redundant packets may occur if
primary forwarding entries are erroneously applied before backup
forwarding entries.
Therefore, it is important that the backup BIFT is applied before the
primary BIFT.</t>

<section anchor="redundant_packets"><name>Example</name>

<t><xref target="networking_scenario"/> presents an example of a BIER network.
In this example, BFRs are identified by the prefix "B" followed by
their BFR-ids.
For simplicity, each BFR also serves as a BFER, and its bit position
in the bitstring corresponds to its BFR-id.
The number assigned to each link represents its cost, which the
routing underlay uses to compute the shortest paths.</t>

<figure title="BIER network example." anchor="networking_scenario"><artwork align="center"><![CDATA[
        1              1
  B1 --------- B6 ------------ B5       BFR Bi is BFER
  |            |               |       (i = 1,2,3,4,5,6,7;
  |            |               |        i is BFR-id of Bi)
2 |            | 1             |
  |      1     |               | 1     cost of link B1->B2 is 2
  B2 --------- B7              |       cost of link B3->B4 is 4
  |                            |       cost of other links is 1
1 |                            |
  |                  4         |
 B3 ------------------------- B4
]]></artwork></figure>

<t>In the absence of a failure, traffic for BFR-id 2 and 3 is forwarded
via BFR-NBR B2 and traffic to BFR-id 4, 5, 6, and 7 is forwarded to
BFR-NBR B6.
If a packet with bitstring 0001100 (destinations B3 and B4) is
forwarded, the row for BFR-id B3 matches first.
A packet with bitstring 0000100 is sent to B2 and the bitstring of the
remaining packet is also processed with F-BM 0001100, i.e., the
remaining bitstring is
0001000.
Then the remaining bitstring is matched again so that BFR-id B4 yields
a match.
A packet copy with bitstring 0001000 is sent to B6 and the application
of the F-BM 1111000 to the bitstring of the remaining packet results
in 0000000, which terminates the forwarding process.
This BIER forwarding process avoids redundant packet copies.</t>

<figure title="B1's primary BIFT." anchor="extended_bift_plr_redundant"><artwork align="center"><![CDATA[
+------+----------+-------+
|BFR-id|   F-BM   |BFR-NBR|
+======+==========+=======+
|   2  | 0000110  |  B2   |
+------+----------+-------+
|   3  | 0000110  |  B2   |
+------+----------+-------+
|   4  | 1111000  |  B6   |
+------+----------+-------+
|   5  | 1111000  |  B6   |
+------+----------+-------+
|   6  | 1111000  |  B6   |
+------+----------+-------+
|   7  | 1111000  |  B6   |
+------+----------+-------+
]]></artwork></figure>

<t>A backup BIFT for B1 in the example of Figure 2 is given in
<xref target="extended_bift_plr_redundant"/>.
It implements LFA-based FRR as a protection strategy and link
protection.</t>

<t>If B1 cannot reach B2 or B6, BEA will be set to 1 in the rows for the
backup BIFT for which B2 or B6 is the BFR-NBR in the primary BIFT.
Thus, if B1 cannot reach B2, traffic for BFR-id 2 and 3 will be
forwarded over B6 and 1111110 is applied as BF-BM.
This mask also includes all the BFR-ids that have B6 as their primary
BFR-NBR.
Likewise, if B1 cannot reach B6, traffic for BFR-id 4, 5, 6, and 7
will be forwarded over B2 and again 1111110 is applied as BF-BM for
the same reason.</t>

</section>
<section anchor="lfa-based_FRR"><name>B1's backup BIFT for LFA-based FRR with link protection</name>

<figure title="B1's backup BIFT for LFA-based FRR with link protection." anchor="LFA-based"><artwork align="center"><![CDATA[
+------+----------+-------+
|BFR-id|   F-BM   |BFR-NBR|
+======+==========+=======+
|   2  | 0000110  |  B2   |
+------+----------+-------+
|   3  | 0000110  |  B2   |
+------+----------+-------+
|   4  | 1111000  |  B6   |
+------+----------+-------+
|   5  | 1111000  |  B6   |
+------+----------+-------+
|   6  | 1111000  |  B6   |
+------+----------+-------+
|   7  | 1111000  |  B6   |
+------+----------+-------+
]]></artwork></figure>

<t>We now consider that the link B1-&gt;B2 failed and that B1 needs to
forward a packet with bitstring 0001100.
Therefore, the BEA is set for BFR-id 2 and 3 in the backup BIFT.
If B1 needs to forward a packet with bitstring 0001100 (destinations
B3 and B4), the row for BFR-id B3 in the backup BIFT matches first.
Therefore, a packet with bitstring 0001100 is sent to B6 and the
bitstring of the remaining packet is also processed with BF-BM 1111110
so that the remaining bitstring is 0000000, which terminates the
forwarding process.
That is, only a single packet copy is sent to B6.</t>

</section>
</section>
<section anchor="primary_bift_single_backup_bift"><name>Prioritization of Backup Forwarding Entries over Primary Forwarding Entries</name>

<t>BIER-FRR defines that the backup BIFT is applied before the primary
BIFT.
The reason for that is twofold.
First, applying the primary BIFT first may erase the forwarding
information for BFERs whos primary BFR-NBR is unreachable.
Second, if that can be fixed, redundant packets can occur if the
primary BIFT is applied before the backup BIFT.
These issues are demonstrated in the above example when the link
B1-&gt;B2 has failed and B1 applies the primary BIFT before the backup
BIFT when forwarding a packet with bitstring 0011000 (B3 and B4 as
destinations).</t>

<t>We first assume that B1 just ignores the failed interface when
forwarding the packet with the primary BIFT but processes the
bitstring of remaining packet like if the transmission was successful.
That means, when BFR-id 3 matches first in the primary BIFT, no packet
is sent to B2, but the bits in the bitstring are still cleared,
leading to a remaining bitstring of 0001000.
Another pass through the primary BIFT forwards a packet copy to B6 and
clears the remaining bitstring to 0000000, which terminates the
forwarding process.
However, no packet will reach B3 as the bitstring information was lost
during the unsuccessful transmission.</t>

<t>We now assume a feature that saves the bitstring information when the
transmission to a specific BFR-id was not successful.
This can be done by AND-ing the remaining bitstring and the F-BM and
OR-ing the result with a remaining backup bitstring which was
initially zero.
Only then the bits of the F-BM are cleared from the remaining
bitstring.
When B1 is to forward a packet with bitstring 0001100, the first match
in the primary BIFT is for BFR-id 3.
As the transmission is not successful, 00000100 is saved in the
remaining backup bitstring and the remaining bitstring is 0001000.
Therefore, a second match in the primary BIFT is for BFR-id 4, which
sends a packet copy with bitstring 0001000 to B6.
Then, the remaining backup bitstring is processed with the backup
BIFT.
As there is a match for BFR-id 3, another packet is sent to B6, now
with bitstring 0000100.
This can be considered redundant.</t>

<t>Below the line, it is important to first process backup forwarding
entries before backup forwarding entries.
This avoids additions to the forwarding process with the primary BIFT
and avoids redundant packets.</t>

</section>
<section anchor="Protection_Levels"><name>Protection Levels</name>

<t>Both link protection and node protection may be supported.
Link protection is designed to safeguard against the failure of an
adjacent link, whereas node protection addresses the failure of a
neighboring node and the associated path leading to that node.
The relevance of link or node protection depends on the specific
service being supported.
Additionally, both protection levels can be combined with any of the
backup strategies outlined in <xref target="Strategies"/>.</t>

<section anchor="link_protection"><name>Link Protection</name>

<t>In link protection, the backup path is designed to circumvent the
failed link, i.e., the failed primary path from the PLR to the primary
BFR-NBR, while still potentially including the primary BFR-NBR itself.
Consequently, the backup path with link protection cannot protect
against the failure of the primary BFR-NBR.</t>

</section>
<section anchor="node_protection"><name>Node Protection</name>

<t>In node protection, the backup path is designed to avoid both the
failed node and the link to that node, i.e., the failed primary path
from the PLR to the primary BFR-NBR, including the primary BFR-NBR.
Consequently, the backup path with link protection also protects
against the failure of the primary BFR-NBR.
If a BFER and its primary BFR-NBR are the same, only link protection
is feasible for that BFER.</t>

</section>
<section anchor="protection_example"><name>Example</name>

<t>In the network depicted in <xref target="networking_scenario"/>, the primary path
from BFR B1 to BFER B5 is B1-&gt;B6-&gt;B5.
Protecting BFER B5 from a BFR-NBR B6 node failure can only be provided
through the backup path B1-&gt;B2-&gt;B3-&gt;B4-&gt;B5.
Link protection for BFER B5 is achieved via the backup path
B1-&gt;B2-&gt;B7-&gt;B6, and additionally through the backup path
B1-&gt;B2-&gt;B3-&gt;B4-&gt;B5-&gt;B6.
The specific backup entries are determined by the selected protection
level and backup strategy.
Example BIFTs illustrating link and node protection are provided in
<xref target="Strategies"/>.</t>

</section>
</section>
<section anchor="Strategies"><name>Backup Strategies</name>

<t>Backup strategies determine the selection of backup forwarding
entries, influencing both the choice of the backup BFR-NBR and the
backup forwarding action, and consequently, the backup path.
The following sections present tunnel-based BIER-FRR and LFA-based
BIER-FRR as potential strategies.
Both can be implemented with BIER-FRR presented in Section 3.</t>

<section anchor="Tunnel_Based"><name>Tunnel-Based BIER-FRR</name>

<t>The routing underlay may possess the capability to forward packets to
their destinations even in the presence of a failure, potentially due
to FRR mechanisms within the routing underlay.
In such scenarios, while the primary BFR-NBR may no longer be
reachable via the primary action (Direct), it could still be
accessible through a backup action (Tunnel).</t>

<t>Tunnel-based BIER-FRR encapsulates BIER packets impacted by a failure
within the routing underlay, thereby leveraging the routing underlay's
fast restoration capabilities.
As soon as connectivity in the routing underlay is reestablished, the
affected BIER packets can be forwarded to their intended destinations.
The appropriate backup forwarding entries in a BIFT for BIER-FRR are
determined by the desired protection level.</t>

<section anchor="tunnel-based-bier-frr-with-link-protection"><name>Tunnel-Based BIER-FRR with Link Protection</name>

<t>In the context of link protection, the backup BFR-NBRs are identical
to the primary BFR-NBRs.
If a primary BFR-NBR is directly connected to the BFR acting as the
Point of Local Repair (PLR), the corresponding backup forwarding
action is Tunnel.
Consequently, BIER packets affected by a failure are tunneled through
the routing underlay to their BFR-NBR, rather than being directly sent
as pure BIER packets.
If the primary BFR-NBR is not directly connected to the BFR as a PLR
(i.e., the implicit primary action is Tunnel), the corresponding
backup action is also Tunnel.
The backup F-BMs are identical to the primary F-BMs, which is
consistent with the computation of backup F-BMs described in
<xref target="f_bm_computation"/>.</t>

<figure title="B1's backup BIFT for tunnel-based BIER-FRR with link protection." anchor="backup_bift_tunnel_based_link_protection"><artwork align="center"><![CDATA[
  +------+----------+--------+-----------+---+-----------------+
  |BFR-id|  BF-BM   |BBFR-NBR|   BFA     |BEA|Comment: protects|
  |      |          |        |           |   |  failure of     |
  +======+==========+========+===========+===+=================+
  |   2  | 0000110  |  B2    |  Tunnel   |   |  Link B1->B2    |
  +------+----------+--------+-----------+---+-----------------+
  |   3  | 0000110  |  B2    |  Tunnel   |   |  Link B1->B2    |
  +------+----------+--------+-----------+---+-----------------+
  |   4  | 1111000  |  B6    |  Tunnel   |   |  Link B1->B6    |
  +------+----------+--------+-----------+---+-----------------+
  |   5  | 1111000  |  B6    |  Tunnel   |   |  Link B1->B6    |
  +------+----------+--------+-----------+---+-----------------+
  |   6  | 1111000  |  B6    |  Tunnel   |   |  Link B1->B6    |
  +------+----------+--------+-----------+---+-----------------+
  |   7  | 1111000  |  B6    |  Tunnel   |   |  Link B1->B6    |
  +------+----------+--------+-----------+---+-----------------+
]]></artwork></figure>

<t><xref target="backup_bift_tunnel_based_link_protection"/> illustrates B1's backup
BIFT for tunnel-based BIER-FRR with link protection in the BIER
network example depicted in <xref target="networking_scenario"/>.
The backup BFR-NBRs and backup F-BMs in this backup BIFT correspond to
the primary BFR-NBRs and primary F-BMs in the primary BIFT.
However, the backup actions in this backup BIFT are Tunnel, while the
primary forwarding actions in the primary BIFT are Direct (which are
not explicitly shown but are implicit).</t>

<t>When B1, acting as the PLR, detects a failure of its link to B6, a
BIER packet with the bitstring 0100000 destined for B6 is tunneled by
B1 through the routing underlay towards B6.
The specific path of the backup tunnel depends on the routing underlay
and could be B1-&gt;B2-&gt;B7-&gt;B6 or B1-&gt;B2-&gt;B3-&gt;B4-&gt;B5-&gt;B6.</t>

<t>If a BIER packet is destined for {B2, B5, B7}, an encapsulated packet
copy is first forwarded via link B1-&gt;B2 to backup BFR-NBR B6 using the
backup forwarding action Tunnel to deliver packet copies to BFERs B5
and B7.
Subsequently, a non-encapsulated packet copy is forwarded via link
B1-&gt;B2 to BFR-NBR B2 using the primary forwarding action Direct to
deliver a packet copy to BFER B2.
Therefore, with tunnel-based BIER-FRR, and link protection, a single
redundant packet copy may occur in the event of a failure because an
encapsulated and a non-encapsulated packet copy are forwarded over the
same link.
This redundancy occurs even though BIER packets affected by failures
are forwarded before those unaffected by failures.
The redundant packet is rather caused by the fact that two packet
copies are sent over the link with different next-hops on the BIER
layer, namely B2 and B6.</t>

<t>A BIER packet with the bitstring 1000000 destined for B7 is forwarded
along the backup path B1-&gt;B2-&gt;B7-&gt;B6-&gt;B7, as it is first delivered to
the backup BFR-NBR B6.
Consequently, the backup path may be unnecessarily long.
This phenomenon is similar to the facility backup method described in
<xref target="RFC4090"/> which employs paths analogous to those in tunnel-based
BIER-FRR.</t>

</section>
<section anchor="tunnel-based-bier-frr-with-node-protection"><name>Tunnel-Based BIER-FRR with Node Protection</name>

<t>To determine the backup forwarding entries for node protection, two
cases need to be distinguished.
If the BFER is the same as its primary BFR-NBR, node protection is not
feasible for that BFER.
Therefore, link protection is applied, meaning the backup BFR-NBR is
set to the primary BFR-NBR.
If the BFER is different from its primary BFR-NBR, the backup BFR-NBR
is set to the primary BFR-NBR's primary BFR-NBR for that BFER, making
the backup BFR-NBR a next-next-hop BFR.
In both cases, the backup forwarding action is Tunnel.
In the first case, the backup F-BM is set to all zeros with the bit
for the BFER to be protected enabled.
In the second case, the backup F-BM is computed as described in
<xref target="f_bm_computation"/>.</t>

<figure title="B1's backup BIFT for tunnel-based BIER-FRR with node protection." anchor="backup_bift_tunnel_based_node_protection"><artwork align="center"><![CDATA[
  +------+----------+--------+----------+---+-----------------+
  |BFR-id|  BF-BM   |BBFR-NBR|   BFA    |BEA|Comment: protects|
  |      |          |        |          |   |  failure of     |
  +======+==========+========+==========+===+=================+
  |   2  | 0000010  |   B2   |  Tunnel  |   |  Link B1->B2    |
  +------+----------+--------+----------+---+-----------------+
  |   3  | 0000100  |   B3   |  Tunnel  |   |  BFR-NBR B2     |
  +------+----------+--------+----------+---+-----------------+
  |   4  | 0011000  |   B5   |  Tunnel  |   |  BFR-NBR B6     |
  +------+----------+--------+----------+---+-----------------+
  |   5  | 0011000  |   B5   |  Tunnel  |   |  BFR-NBR B6     |
  +------+----------+--------+----------+---+-----------------+
  |   6  | 0100000  |   B6   |  Tunnel  |   |  Link B1->B6    |
  +------+----------+--------+----------+---+-----------------+
  |   7  | 1000000  |   B7   |  Tunnel  |   |  BFR-NBR B6     |
  +------+----------+--------+----------+---+-----------------+
]]></artwork></figure>

<t><xref target="backup_bift_tunnel_based_node_protection"/> illustrates B1's backup
BIFT for tunnel-based BIER-FRR with node protection in the BIER
network example provided in <xref target="networking_scenario"/>.
BFERs B2 and B6 are direct neighbors of B1.
To protect them, only link protection is applied, as B1's primary
BFR-NBRs for these nodes are the nodes themselves.
As described above, only the bit for B2 is set in the backup F-BM of
B2, and similarly for B6.
For BFER B5, the backup BFR-NBR is B5, as it is B1's next-next-hop BFR
towards B5.
Similarly, for BFER B7, the backup BFR-NBR is B7.
When B1, acting as the PLR, detects the failure of its BFR-NBR B6, a
BIER packet with bitstring 1010010 destined for {B2, B5, B7} is
processed as follows: an encapsulated copy of the packet is sent via
tunnel B1-&gt;B2-&gt;B3-&gt;B4-&gt;B5, another encapsulated copy is sent via
tunnel B1-B2-B7, and a non-encapsulated copy is sent via link B1-&gt;B2.
In this example, two redundant packets are sent over link B1-&gt;B2.
Therefore, node protection may result in more redundant packet copies
than link protection.</t>

<t>Caveat: If the routing underlay does not support node protection,
tunnel-based BIER-FRR will similarly be unable to provide node
protection.
This limitation is illustrated in the following example.
In the network depicted in <xref target="networking_scenario"/>, the underlay offers
only link protection.
If BFR-NBR B6 fails and B1 must forward a packet to B5, according to
the backup BIFT in <xref target="backup_bift_tunnel_based_node_protection"/> the
packet is tunneled towards B5.
The underlay may route the packet along the path B1-&gt;B2-&gt;B7-&gt;B6-&gt;B5
due to FRR with link protection.
However, since B6 is also unreachable from B7, the packet is returned
to B2, resulting in a loop between B2 and B7.</t>

</section>
</section>
<section anchor="LFA_Based"><name>LFA-based BIER-FRR</name>

<t>LFA-based BIER-FRR leverages alternate BFRs to deliver BIER packets to
BFERs if their primary BFR-NBR is unreachable.
This approach does not rely on any fast restoration or protection
mechanisms in the underlying routing infrastructure.
First, the prerequisites for LFA-based BIER-FRR are clarified,
followed by the definition of BIER-LFAs.
Subsequently, link and node protection for LFA-based BIER-FRR are
discussed using a single backup BIFT.</t>

<section anchor="relation-of-bier-lfas-to-ip-lfas-and-prerequisites"><name>Relation of BIER-LFAs to IP-LFAs and Prerequisites</name>

<t>An LFA for a specific destination is an alternate node to which a
packet is sent if the primary next-hop for that destination is
unreachable.
This alternate node should be capable of forwarding the packet without
creating a forwarding loop.
LFAs have been defined for IP networks in <xref target="RFC5286"/>, <xref target="RFC7490"/> and
<xref target="I-D.ietf-rtgwg-segment-routing-ti-lfa"/>, and such LFAs are referred to
as IP-LFAs.
BIER-LFAs are similar to IP-LFAs, but a BIER-LFA node must be a BFR.
If only a subset of the nodes in the routing underlay are BFRs, some
IP-LFAs in the routing underlay may not be usable as BIER-LFAs.
To compute BIER-LFAs, network topology and link cost information from
the routing underlay are required.
This differs from tunnel-based BIER-FRR, where knowledge of the
primary BIFTs of a PLR and its BFR-NBRs is sufficient.</t>

<t>LFA-based BIER-FRR may reuse IP-LFAs as BIER-LFAs under the following
conditions: if an IP-LFA node for the destination of a specific BFER
is a BFR, it may be reused as the backup BFR-NBR for that BFER, along
with the backup action applied for that IP-LFA at the IP layer.
A normal IP-LFA corresponds to the backup forwarding action Direct, a
remote IP-LFA to Tunnel, and a TI-IP-LFA to Explicit.</t>

</section>
<section anchor="definition-of-bier-lfas"><name>Definition of BIER-LFAs</name>

<t>As with IP-LFAs, there are several types of BIER-LFAs:</t>

<t><list style="symbols">
  <t>A BFR is considered a normal BIER-LFA for a specific BFER if it is
directly connected to the PLR and:  <list style="numbers">
      <t>the BFER can be reached from it through the BIER domain.</t>
      <t>both the path from the PLR to the BFR and the path from the BFR to the
BFER are disjoint from the primary path from the PLR to the primary BFR-NBR.
These paths:      <list style="symbols">
          <t>may include the primary BFR-NBR for link protection.</t>
          <t>must not include the primary BFR-NBR for node protection.</t>
        </list></t>
    </list></t>
  <t>A BFR is considered a remote BIER-LFA for a specific BFER if it is
not directly connected to the PLR, can be reached via a tunnel from
the PLR, and satisfies the aforementioned conditions 1 and 2.</t>
  <t>A BFR is considered a TI-BIER-LFA for a specific BFER if it is not
directly connected to the PLR, cannot be reached via a tunnel from
the PLR, but is reachable from the PLR via an explicit path (e.g.,
with the assistance of a Segment Routing (SR) header), and satisfies
the aforementioned conditions 1 and 2.</t>
</list></t>

<t>For the protection of some BFERs, one or more normal BIER-LFAs may be
available at a specific PLR.
For the protection of other BFERs, only remote or TI-BIER-LFAs may be
available.
There may also be BFERs which can be protected only through
TI-BIER-LFAs.</t>

<t>The backup forwarding actions for rerouting BIER packets depending on
the type of BIER-LFA are:</t>

<t><list style="symbols">
  <t>For normal BIER-LFA: Direct</t>
  <t>For remote BIER-LFA: Tunnel</t>
  <t>For TI-BIER-LFA: Explicit</t>
</list></t>

</section>
<section anchor="bier_lfa_protection_coverage"><name>Protection Coverage of BIER-LFA Types</name>

<t>Protection coverage refers to the set of BFERs that can be protected
with a desired level of protection by a particular type of BIER-LFA.
The BIER-LFA types exhibit the following characteristics:</t>

<t><list style="symbols">
  <t>Normal BIER-LFAs  <list style="symbols">
      <t>The protection coverage is the least as some or many BFERs may not
be protected at the desired protection level or at all.</t>
      <t>Redundant packet copies are avoided.</t>
      <t>There is no encapsulation overhead.</t>
    </list></t>
  <t>Remote BIER-LFAs  <list style="symbols">
      <t>They enhance the protection coverage of normal BIER-LFAs.</t>
      <t>Redundant packet copies may occur on a link, similar to
tunnel-based BIER-FRR.</t>
      <t>The encapsulation overhead is similar to that of tunnel-based
BIER-FRR.</t>
    </list></t>
  <t>TI-BIER-LFAs  <list style="symbols">
      <t>They complement the protection coverage of normal and remote
BIER-LFAs to achieve 100% coverage.</t>
      <t>Redundant packets may occur on a link, similar to tunnel-based
BIER-FRR.</t>
      <t>The encapsulation overhead is similar or equivalent to that of
tunnel-based BIER-FRR, depending on the FRR mechanism employed in
the routing underlay.</t>
      <t>There is increased complexity as segment routing, or some other
forms of explicit tunnels, needs to be supported by the routing
underlay.</t>
    </list></t>
</list></t>

</section>
<section anchor="sets-of-supported-bier-lfas"><name>Sets of Supported BIER-LFAs</name>

<t>Normal BIER-LFAs are the simplest option, as they do not require
tunneling or explicit paths.
Remote BIER-LFAs offer greater capabilities but introduce additional
header overhead and require more functionality from the PLR.
TI-BIER-LFAs are the most complex BIER-LFAs, necessitating the use of
explicit paths.
When implementing LFA-based BIER-FRR, it is essential to specify the
set of supported BIER-LFAs.
The available options are as follows:</t>

<t><list style="symbols">
  <t>Option 1: Only normal BIER-LFAs are supported.</t>
  <t>Option 2: Both normal and remote BIER-LFAs are supported.</t>
  <t>Option 3: All types of BIER-LFAs are supported.</t>
</list></t>

<t>Options 1 and 2 may not be able to protect the reachability of all
BFERs against all single link failures and all single node failures.</t>

</section>
<section anchor="lfa-based-1backup-bift-link-protect"><name>Link Protection</name>

<t>In the following, LFA-based BIER-FRR with link protection is
illustrated.
Thereby, normal BIER-LFAs are prioritized over remote LFAs, and remote
BIER-LFAs are preferred over TI-BIER-LFAs.
Depending on the specific PLR, simple BIER-LFAs are sufficient, remote
BIER-LFAs are needed, or even TI-BIER-LFAs to protect the reachability
of all BFERs against single link failures.</t>

<t>If the link between B1 and B6 fails, B1 cannot reach the BFERs B4, B5,
B6, and B7 via their primary BFR-NBR.
Consequently, B1 forwards their traffic via the backup BFR-NBR B2,
along with the traffic for B2 and B3, as B2 is their primary BFR-NBR.
In this scenario, the backup F-BM is set to 1111110.
Similarly, if the link between B1 and B2 fails, B1 routes all traffic
to B6, with the backup F-BM also set to 1111110.</t>

<t>B1 requires only normal BIER-LFAs to protect all BFERs.
However, this situation can vary significantly for other BFRs.
<xref target="b7-backup_bift_lfa-based-link-protect"/> and
<xref target="b5-backup_bift_link-protect"/> present the backup BIFTs for B7 and B5,
respectively.
BFR B7 requires one normal BIER-LFA, three remote BIER-LFAs, and two
TI-BIER-LFAs to protect all BFERs.
BFR B5 requires one normal BIER-LFA, one remote BIER-LFA, and four
TI-BIER-LFAs as backup BFR-NBRs.
Thus, depending on the set of supported BIER-LFAs, it may not be
possible to protect all BFERs using BIER-FRR.</t>

<t>Consider a scenario where B7 holds a BIER packet with destinations
{B1, B4, B5, B6}.
If the link between B7 and B6 fails, the packet copy for B1 is sent to
B2 using the backup forwarding action Direct, the packet copy for B4
is tunneled via B2 to B3, and the packet copies for B5 and B6 are sent
via explicit paths to B4 and B1, respectively.
Since these packet copies have different next-hops on the BIER layer,
all of them must be transmitted, resulting in three redundant copies.</t>

<figure title="B7's backup BIFT with link protection." anchor="b7-backup_bift_lfa-based-link-protect"><artwork align="center"><![CDATA[
  +------+----------+--------+-----------+---+-----------------+
  |BFR-id|  BF-BM   |BBFR-NBR|   BFA     |BEA|Comment: protects|
  |      |          |        |           |   |  failure of     |
  +======+==========+========+===========+===+=================+
  |   1  | 0000111  |   B2   |  Direct   |   |  Link B7->B6    |
  +------+----------+--------+-----------+---+-----------------+
  |   2  | 0000110  |   B1   |  Tunnel   |   |  Link B1->B2    |
  +------+----------+--------+-----------+---+-----------------+
  |   3  | 0000110  |   B1   |  Tunnel   |   |  Link B1->B2    |
  +------+----------+--------+-----------+---+-----------------+
  |   4  | 0001000  |   B3   |  Tunnel   |   |  Link B1->B6    |
  +------+----------+--------+-----------+---+-----------------+
  |   5  | 0010000  |   B4   |  Explicit |   |  Link B1->B6    |
  +------+----------+--------+-----------+---+-----------------+
  |   6  | 0100000  |   B1   |  Explicit |   |  Link B1->B6    |
  +------+----------+--------+-----------+---+-----------------+
]]></artwork></figure>

<figure title="B5's backup BIFT with link protection." anchor="b5-backup_bift_link-protect"><artwork align="center"><![CDATA[
  +------+----------+--------+-----------+---+-----------------+
  |BFR-id|  BF-BM   |BBFR-NBR|   BFA     |BEA|Comment: protects|
  |      |          |        |           |   |  failure of     |
  +======+==========+========+===========+===+=================+
  |   1  | 1100011  |   B3   |  Explicit |   |  Link B5->B6    |
  +------+----------+--------+-----------+---+-----------------+
  |   2  | 1100011  |   B3   |  Explicit |   |  Link B5->B6    |
  +------+----------+--------+-----------+---+-----------------+
  |   3  | 0000100  |   B4   |  Direct   |   |  Link B5->B6    |
  +------+----------+--------+-----------+---+-----------------+
  |   4  | 0001000  |   B3   |  Tunnel   |   |  Link B5->B4    |
  +------+----------+--------+-----------+---+-----------------+
  |   6  | 1100011  |   B3   |  Explicit |   |  Link B5->B6    |
  +------+----------+--------+-----------+---+-----------------+
  |   7  | 1100011  |   B3   |  Explicit |   |  Link B5->B6    |
  +------+----------+--------+-----------+---+-----------------+
]]></artwork></figure>

</section>
<section anchor="node-protection"><name>Node Protection</name>

<t>To determine the backup forwarding entries for node protection, it is
necessary to conduct a case-by-case analysis of the BFER to be
protected.
If the BFER is the same as its primary BFR-NBR, node protection is not
feasible for that BFER, and link protection must be applied instead.
In all other cases, the BFER should be protected by a node-protecting
BIER-LFA.
In this context, normal BIER-LFAs are prioritized over remote
BIER-LFAs, and remote BIER-LFAs are preferred over TI-BIER-LFAs.
Depending on the set of supported BIER-LFAs, it may not be possible to
protect certain BFERs.</t>

<t><xref target="b1-backup_bift_node-protect"/> illustrates B1's backup BIFT for
LFA-based BIER-FRR with node protection, using the network example
provided in <xref target="networking_scenario"/>.</t>

<figure title="B1's backup BIFT with node protection." anchor="b1-backup_bift_node-protect"><artwork align="center"><![CDATA[
  +------+----------+--------+-----------+---+-----------------+
  |BFR-id|  BF-BM   |BBFR-NBR|   BFA     |BEA|Comment: protects|
  |      |          |        |           |   |  failure of     |
  +======+==========+========+===========+===+=================+
  |   2  | 1111010  |   B6   |  Direct   |   |  BFR-NBR B2     |
  +------+----------+--------+-----------+---+-----------------+
  |   3  | 0000100  |   B4   |  Tunnel   |   |  BFR-NBR B2     |
  +------+----------+--------+-----------+---+-----------------+
  |   4  | 0001000  |   B3   |  Tunnel   |   |  BFR-NBR B6     |
  +------+----------+--------+-----------+---+-----------------+
  |   5  | 0010000  |   B4   |  Explicit |   |  BFR-NBR B6     |
  +------+----------+--------+-----------+---+-----------------+
  |   6  | 1100100  |   B2   |  Direct   |   |  BFR-NBR B6     |
  +------+----------+--------+-----------+---+-----------------+
  |   7  | 1100100  |   B2   |  Direct   |   |  BFR-NBR B6     |
  +------+----------+--------+-----------+---+-----------------+
]]></artwork></figure>

<t>As B6 serves as the primary BFR-NBR for BFER B6, only link protection
can be applied.
Consequently, B2 is utilized as a normal, link-protecting BIER-LFA to
safeguard B6.
Similarly, as B2 is the primary BFR-NBR for BFER B2, B2 is protected
with B6 as its normal, link-protecting BIER-LFA.
BFER B7 is protected against the failure of node B6 by using B2 as its
normal, node-protecting BIER-LFA, as B2 has a shortest path to B7 that
does not traverse B6.
The backup F-BMs for BFERs B6 and B7 are set to {B2, B6, B7}, as
traffic for these BFERs is routed via link B1-&gt;B2 with the backup
forwarding action Direct when B6 is unreachable.</t>

<t>BFER B4 cannot be reached via a normal LFA when BFR B6 fails.
However, B3 serves as a remote, node-protecting BIER-LFA for BFER B4,
as B3 has a shortest path to B4, is reachable from B1 via a shortest
path, and the resulting backup path from B1 to B4 does not traverse
B6.
Similarly, B4 serves as a remote LFA for BFER B3 if BFR B2 fails.</t>

<t>BFER B5 is neither reachable through a normal BIER-LFA nor through a
remote BIER-LFA when BFR B6 fails.
However, B4 acts as a node-protecting TI-BIER-LFA for BFER B5 as B4 is
reachable through the explicit path B1-&gt;B2-&gt;B3-&gt;B4 and has a shortest
path to B5 that does not traverse B6.</t>

<t>Consider a scenario where B1 holds a BIER packet with destinations
{B4, B5, B6}.
If the link between B1 and B2 fails, the packet copy for B1 is sent to
B2 using the backup forwarding action Direct, a packet copy for B4 is
tunneled via B2, and a packet copy for B5 is sent via an explicit path
to B4.
Since these packet copies have different next-hops on the BIER layer,
all of them must be transmitted, resulting in two redundant copies.</t>

</section>
<section anchor="optimization-potential-to-reduce-redundant-bier-packets-in-failure-cases"><name>Optimization Potential to Reduce Redundant BIER Packets in Failure Cases</name>

<t>Redundant packets can occur with LFA-based BIER-FRR when BIER packets
are transmitted over a specific link in different forms, including:</t>

<t><list style="symbols">
  <t>Directly sent BIER packets (either primary transmission or reroute
to a normal BIER-LFA).</t>
  <t>BIER packets encapsulated for transmission to a specific BFR-NBR
(either tunneled primary transmission or reroute to a remote
BIER-LFA).</t>
  <t>BIER packets routed with an encoded explicit path (reroute to a
TI-LFA).</t>
</list></t>

<t>When different remote BIER-LFAs are utilized, multiple redundant
packets may be generated.
A similar situation can arise with TI-BIER-LFAs.
However, some redundant packets can be mitigated if remote BIER-LFAs
or TI-BIER-LFAs are selected such that they can protect multiple
BFERs, thereby reducing the need for additional remote BIER-LFAs or
TI-BIER-LFAs.
This approach, while potentially leading to longer backup paths,
introduces a new optimization objective for the selection of remote or
TI-BIER-LFAs, which does not exist in IP-FRR.
The relevance of this optimization may vary depending on the specific
use case.</t>

<t>To illustrate this optimization potential, consider LFA-based BIER-FRR
with link protection for B7, as described in its backup BIFT in
<xref target="b7-backup_bift_lfa-based-link-protect"/>.
As noted in <xref target="lfa-based-1backup-bift-link-protect"/>, B7 needs to
transmit four copies to forward a packet to {B1, B4, B5, B6}.
If the more complex TI-BIER-LFA B4 is chosen to protect BFER B4
instead of the remote BIER-LFA B3, only two redundant copies need to
be transmitted.</t>

</section>
</section>
</section>
<section anchor="Comparison"><name>Comparison</name>

<t>This section first addresses the differences between IP-LFAs for
IP-FRR and BIER-LFAs for BIER-FRR.
It then examines the advantages and disadvantages of tunnel-based and
LFA-based BIER-FRR.</t>

<section anchor="comparison-of-lfa-based-protection-for-ip-frr-and-bier-frr"><name>Comparison of LFA-Based Protection for IP-FRR and BIER-FRR</name>

<t>LFAs were initially proposed for IP networks.
They are straightforward in that they do not require any tunneling
overhead.
However, certain destinations cannot be protected against specific
link failures, and even more destinations may be unprotectable against
certain node failures.
To improve coverage, remote LFAs (R-LFAs) were introduced, which
tunnel affected traffic to another node from which the traffic can
reach the destination through normal forwarding.
Despite this, there may still be destinations that remain unprotected
against link or node failures.
To address this, topology-independent LFAs (TI-LFAs) were developed,
wherein affected traffic is tunneled via an explicit path (preferably
using segment routing headers) to another node from which the traffic
can reach its destination through standard IP forwarding.
With TI-LFAs, all destinations can be protected against any failures
as long as connectivity exists.</t>

<t>LFA-based BIER-FRR adopts the principles of LFAs but differs from
IP-FRR in that the LFA target node, i.e., the next-hop on the BIER
layer to which traffic is diverted, must be a BFR.
If an IP-LFA target is a BFR, it can be utilized as a BIER-LFA;
otherwise, it cannot serve as a BIER-LFA.
Consequently, if only a subset of nodes in the underlay are BFRs, the
BIER-LFAs will differ substantially from IP-LFAs.
Furthermore, this makes it more challenging to find normal BIER-LFAs
which do not require tunneling.
As a result, LFA-based BIER-FRR is likely to require more remote
BIER-LFAs and TI-BIER-LFAs than IP-FRR under such conditions.</t>

</section>
<section anchor="advantages-and-disadvantages-of-tunnel-based-bier-frr"><name>Advantages and Disadvantages of Tunnel-Based BIER-FRR</name>

<section anchor="advantages"><name>Advantages</name>

<t><list style="symbols">
  <t>The computation of backup forwarding entries for tunnel-based
BIER-FRR is straightforward, requiring only the primary BIFTs of a
PLR and its BFR-NBRs.
No routing information from the routing underlay is needed.</t>
  <t>The forwarding action "Explicit" is not required for tunnel-based
BIER-FRR.
However, depending on the underlay, explicit forwarding may still be
utilized to achieve FRR in the underlay.</t>
</list></t>

</section>
<section anchor="disadvantages"><name>Disadvantages</name>

<t><list style="symbols">
  <t>Tunnel-based BIER-FRR relies on the presence of a FRR mechanism in
the underlay.</t>
  <t>Its protection level is constrained by the protection level provided
by the underlay.
For instance, if the underlay supports only link protection,
tunnel-based BIER-FRR cannot offer node protection.</t>
  <t>Redundant packet copies may occur in tunnel-based BIER-FRR.</t>
  <t>Backup paths may be longer than with LFA-based BIER-FRR.</t>
  <t>A tunneling header is required for any rerouting, resulting in
additional header overhead.</t>
</list></t>

</section>
</section>
<section anchor="advantages-and-disadvantages-of-lfa-based-bier-frr"><name>Advantages and Disadvantages of LFA-Based BIER-FRR</name>

<section anchor="advantages-1"><name>Advantages</name>

<t><list style="symbols">
  <t>LFA-based BIER-FRR does not depend on any fast protection mechanisms
in the underlay.</t>
  <t>Therefore, it can provide superior protection at the BIER layer
compared to the IP layer, particularly if LFA-based BIER-FRR
utilizes BIER-LFAs with a higher protection level than those used in
LFA-based IP-FRR.
For example, the underlay may only offer FRR with link protection,
while BIER-FRR can provide node protection for BIER traffic.</t>
  <t>LFA-based BIER-FRR avoids header overhead for normal BIER-LFAs.</t>
</list></t>

</section>
<section anchor="disadvantages-1"><name>Disadvantages</name>

<t><list style="symbols">
  <t>The computation of backup forwarding entries requires routing
information from the underlay.</t>
  <t>The computation of backup forwarding entries is more complex when
some nodes in the underlay are not BFRs because then BIER-LFAs
differ from IP-LFAs.</t>
  <t>The "Tunnel" forwarding action is required to protect certain BFERs,
which adds header overhead.</t>
  <t>The "Explicit" forwarding action is necessary to achieve full
protection coverage in some topologies; without it, only partial
protection coverage is possible.
This requires support for explicit paths, such as Segment Routing.</t>
  <t>More remote BIER-LFAs and TI-BIER-LFAs are needed compared to IP-FRR
if some nodes in the routing underlay are not BFRs.</t>
  <t>Redundant packet copies may occur in LFA-based BIER-FRR, though this
is less frequent than with tunnel-based BIER-FRR as simple BIER-LFAs
do not require a tunnel.</t>
</list></t>

</section>
</section>
</section>
<section anchor="Security"><name>Security Considerations</name>

<t>This specification does not introduce additional security concerns
beyond those already discussed in the BIER architecture <xref target="RFC8279"/>
along with the IP FRR <xref target="RFC5286"/> and LFA <xref target="RFC7490"/> specifications.</t>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>No requirements for IANA.</t>

</section>
<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to thank Daniel Merling, Jeffrey Zhang, Tony
Przygienda and Shaofu Peng for their comments to this work.
A special thank you to Gunter van de Velde for his extensive editing
to help bring this document to publication.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC5286">
  <front>
    <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
    <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
    <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
    <date month="September" year="2008"/>
    <abstract>
      <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG). The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure. Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5286"/>
  <seriesInfo name="DOI" value="10.17487/RFC5286"/>
</reference>

<reference anchor="RFC7431">
  <front>
    <title>Multicast-Only Fast Reroute</title>
    <author fullname="A. Karan" initials="A." surname="Karan"/>
    <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
    <author fullname="IJ. Wijnands" initials="IJ." role="editor" surname="Wijnands"/>
    <author fullname="B. Decraene" initials="B." surname="Decraene"/>
    <date month="August" year="2015"/>
    <abstract>
      <t>As IPTV deployments grow in number and size, service providers are looking for solutions that minimize the service disruption due to faults in the IP network carrying the packets for these services. This document describes a mechanism for minimizing packet loss in a network when node or link failures occur. Multicast-only Fast Reroute (MoFRR) works by making simple enhancements to multicast routing protocols such as Protocol Independent Multicast (PIM) and Multipoint LDP (mLDP).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7431"/>
  <seriesInfo name="DOI" value="10.17487/RFC7431"/>
</reference>

<reference anchor="RFC8279">
  <front>
    <title>Multicast Using Bit Index Explicit Replication (BIER)</title>
    <author fullname="IJ. Wijnands" initials="IJ." role="editor" surname="Wijnands"/>
    <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
    <author fullname="A. Dolganow" initials="A." surname="Dolganow"/>
    <author fullname="T. Przygienda" initials="T." surname="Przygienda"/>
    <author fullname="S. Aldrin" initials="S." surname="Aldrin"/>
    <date month="November" year="2017"/>
    <abstract>
      <t>This document specifies a new architecture for the forwarding of multicast data packets. It provides optimal forwarding of multicast packets through a "multicast domain". However, it does not require a protocol for explicitly building multicast distribution trees, nor does it require intermediate nodes to maintain any per-flow state. This architecture is known as "Bit Index Explicit Replication" (BIER). When a multicast data packet enters the domain, the ingress router determines the set of egress routers to which the packet needs to be sent. The ingress router then encapsulates the packet in a BIER header. The BIER header contains a bit string in which each bit represents exactly one egress router in the domain; to forward the packet to a given set of egress routers, the bits corresponding to those routers are set in the BIER header. The procedures for forwarding a packet based on its BIER header are specified in this document. Elimination of the per-flow state and the explicit tree-building protocols results in a considerable simplification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8279"/>
  <seriesInfo name="DOI" value="10.17487/RFC8279"/>
</reference>

<reference anchor="RFC7490">
  <front>
    <title>Remote Loop-Free Alternate (LFA) Fast Reroute (FRR)</title>
    <author fullname="S. Bryant" initials="S." surname="Bryant"/>
    <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
    <author fullname="S. Previdi" initials="S." surname="Previdi"/>
    <author fullname="M. Shand" initials="M." surname="Shand"/>
    <author fullname="N. So" initials="N." surname="So"/>
    <date month="April" year="2015"/>
    <abstract>
      <t>This document describes an extension to the basic IP fast reroute mechanism, described in RFC 5286, that provides additional backup connectivity for point-to-point link failures when none can be provided by the basic mechanisms.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7490"/>
  <seriesInfo name="DOI" value="10.17487/RFC7490"/>
</reference>

<reference anchor="RFC5880">
  <front>
    <title>Bidirectional Forwarding Detection (BFD)</title>
    <author fullname="D. Katz" initials="D." surname="Katz"/>
    <author fullname="D. Ward" initials="D." surname="Ward"/>
    <date month="June" year="2010"/>
    <abstract>
      <t>This document describes a protocol intended to detect faults in the bidirectional path between two forwarding engines, including interfaces, data link(s), and to the extent possible the forwarding engines themselves, with potentially very low latency. It operates independently of media, data protocols, and routing protocols. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5880"/>
  <seriesInfo name="DOI" value="10.17487/RFC5880"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RSVP-TE">
  <front>
    <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
    <author fullname="D. Awduche" initials="D." surname="Awduche"/>
    <author fullname="L. Berger" initials="L." surname="Berger"/>
    <author fullname="D. Gan" initials="D." surname="Gan"/>
    <author fullname="T. Li" initials="T." surname="Li"/>
    <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
    <author fullname="G. Swallow" initials="G." surname="Swallow"/>
    <date month="December" year="2001"/>
    <abstract>
      <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3209"/>
  <seriesInfo name="DOI" value="10.17487/RFC3209"/>
</reference>

<reference anchor="RFC4090">
  <front>
    <title>Fast Reroute Extensions to RSVP-TE for LSP Tunnels</title>
    <author fullname="P. Pan" initials="P." role="editor" surname="Pan"/>
    <author fullname="G. Swallow" initials="G." role="editor" surname="Swallow"/>
    <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
    <date month="May" year="2005"/>
    <abstract>
      <t>This document defines RSVP-TE extensions to establish backup label-switched path (LSP) tunnels for local repair of LSP tunnels. These mechanisms enable the re-direction of traffic onto backup LSP tunnels in 10s of milliseconds, in the event of a failure.</t>
      <t>Two methods are defined here. The one-to-one backup method creates detour LSPs for each protected LSP at each potential point of local repair. The facility backup method creates a bypass tunnel to protect a potential failure point; by taking advantage of MPLS label stacking, this bypass tunnel can protect a set of LSPs that have similar backup constraints. Both methods can be used to protect links and nodes during network failure. The described behavior and extensions to RSVP allow nodes to implement either method or both and to interoperate in a mixed network. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4090"/>
  <seriesInfo name="DOI" value="10.17487/RFC4090"/>
</reference>

<reference anchor="IP-FRR">
  <front>
    <title>IP Fast Reroute Framework</title>
    <author fullname="M. Shand" initials="M." surname="Shand"/>
    <author fullname="S. Bryant" initials="S." surname="Bryant"/>
    <date month="January" year="2010"/>
    <abstract>
      <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths. Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5714"/>
  <seriesInfo name="DOI" value="10.17487/RFC5714"/>
</reference>

<reference anchor="mLDP">
  <front>
    <title>Label Distribution Protocol Extensions for Point-to-Multipoint and Multipoint-to-Multipoint Label Switched Paths</title>
    <author fullname="IJ. Wijnands" initials="IJ." role="editor" surname="Wijnands"/>
    <author fullname="I. Minei" initials="I." role="editor" surname="Minei"/>
    <author fullname="K. Kompella" initials="K." surname="Kompella"/>
    <author fullname="B. Thomas" initials="B." surname="Thomas"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document describes extensions to the Label Distribution Protocol (LDP) for the setup of point-to-multipoint (P2MP) and multipoint-to-multipoint (MP2MP) Label Switched Paths (LSPs) in MPLS networks. These extensions are also referred to as multipoint LDP. Multipoint LDP constructs the P2MP or MP2MP LSPs without interacting with or relying upon any other multicast tree construction protocol. Protocol elements and procedures for this solution are described for building such LSPs in a receiver-initiated manner. There can be various applications for multipoint LSPs, for example IP multicast or support for multicast in BGP/MPLS Layer 3 Virtual Private Networks (L3VPNs). Specification of how such applications can use an LDP signaled multipoint LSP is outside the scope of this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6388"/>
  <seriesInfo name="DOI" value="10.17487/RFC6388"/>
</reference>

<reference anchor="PIM-SM">
  <front>
    <title>Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised)</title>
    <author fullname="B. Fenner" initials="B." surname="Fenner"/>
    <author fullname="M. Handley" initials="M." surname="Handley"/>
    <author fullname="H. Holbrook" initials="H." surname="Holbrook"/>
    <author fullname="I. Kouvelas" initials="I." surname="Kouvelas"/>
    <author fullname="R. Parekh" initials="R." surname="Parekh"/>
    <author fullname="Z. Zhang" initials="Z." surname="Zhang"/>
    <author fullname="L. Zheng" initials="L." surname="Zheng"/>
    <date month="March" year="2016"/>
    <abstract>
      <t>This document specifies Protocol Independent Multicast - Sparse Mode (PIM-SM). PIM-SM is a multicast routing protocol that can use the underlying unicast routing information base or a separate multicast-capable routing information base. It builds unidirectional shared trees rooted at a Rendezvous Point (RP) per group, and it optionally creates shortest-path trees per source.</t>
      <t>This document obsoletes RFC 4601 by replacing it, addresses the errata filed against it, removes the optional (*,*,RP), PIM Multicast Border Router features and authentication using IPsec that lack sufficient deployment experience (see Appendix A), and moves the PIM specification to Internet Standard.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="83"/>
  <seriesInfo name="RFC" value="7761"/>
  <seriesInfo name="DOI" value="10.17487/RFC7761"/>
</reference>

<reference anchor="SRH">
  <front>
    <title>IPv6 Segment Routing Header (SRH)</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
    <author fullname="S. Previdi" initials="S." surname="Previdi"/>
    <author fullname="J. Leddy" initials="J." surname="Leddy"/>
    <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <date month="March" year="2020"/>
    <abstract>
      <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8754"/>
  <seriesInfo name="DOI" value="10.17487/RFC8754"/>
</reference>

<reference anchor="RFC9855">
  <front>
    <title>Topology Independent Fast Reroute Using Segment Routing</title>
    <author fullname="A. Bashandy" initials="A." surname="Bashandy"/>
    <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
    <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
    <author fullname="P. Francois" initials="P." surname="Francois"/>
    <author fullname="B. Decraene" initials="B." surname="Decraene"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <date month="October" year="2025"/>
    <abstract>
      <t>This document presents Topology Independent Loop-Free Alternate (TI-LFA) Fast Reroute (FRR), which is aimed at providing protection of node and Adjacency segments within the Segment Routing (SR) framework. This FRR behavior builds on proven IP FRR concepts being LFAs, Remote LFAs (RLFAs), and Directed Loop-Free Alternates (DLFAs). It extends these concepts to provide guaranteed coverage in any two-connected networks using a link-state IGP. An important aspect of TI-LFA is the FRR path selection approach establishing protection over the expected post-convergence paths from the Point of Local Repair (PLR), reducing the operational need to control the tie-breaks among various FRR options.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9855"/>
  <seriesInfo name="DOI" value="10.17487/RFC9855"/>
</reference>


<reference anchor="I-D.chen-bier-egress-protect">
   <front>
      <title>BIER Egress Protection</title>
      <author fullname="Huaimo Chen" initials="H." surname="Chen">
         <organization>Futurewei</organization>
      </author>
      <author fullname="Mike McBride" initials="M." surname="McBride">
         <organization>Futurewei</organization>
      </author>
      <author fullname="Aijun Wang" initials="A." surname="Wang">
         <organization>China Telecom</organization>
      </author>
      <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
         <organization>Verizon Inc.</organization>
      </author>
      <author fullname="Yisong Liu" initials="Y." surname="Liu">
         <organization>China Mobile</organization>
      </author>
      <author fullname="Michael Menth" initials="M." surname="Menth">
         <organization>University of Tuebingen</organization>
      </author>
      <author fullname="Boris Khasanov" initials="B." surname="Khasanov">
         <organization>Yandex LLC</organization>
      </author>
      <author fullname="Xuesong Geng" initials="X." surname="Geng">
         <organization>Huawei</organization>
      </author>
      <author fullname="Yanhe Fan" initials="Y." surname="Fan">
         <organization>Casa Systems</organization>
      </author>
      <author fullname="Lei Liu" initials="L." surname="Liu">
         <organization>Fujitsu</organization>
      </author>
      <author fullname="Xufeng Liu" initials="X." surname="Liu">
         <organization>Alef Edge</organization>
      </author>
      <date day="28" month="March" year="2024"/>
      <abstract>
	 <t>   This document describes a mechanism for fast protection against the
   failure of an egress node of a &quot;Bit Index Explicit Replication&quot;
   (BIER) domain.  It is called BIER egress protection.  It does not
   require any per-flow state in the core of the domain.  With BIER
   egress protection the failure of a primary BFER (Bit Forwarding
   Egress Router) is protected with a backup BFER such that traffic
   destined to the primary BFER in the BIER domain is fast rerouted by a
   neighbor BFR to the backup BFER on the BIER layer.  The mechanism is
   applicable if all BIER traffic sent to the primary BFER can reach its
   destination also via the backup BFER.  It is complementary to BIER-
   FRR which cannot protect against the failure of a BFER.


	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-chen-bier-egress-protect-07"/>
   
</reference>


<reference anchor="I-D.ietf-rtgwg-segment-routing-ti-lfa">
   <front>
      <title>Topology Independent Fast Reroute using Segment Routing</title>
      <author fullname="Ahmed Bashandy" initials="A." surname="Bashandy">
         <organization>Individual</organization>
      </author>
      <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
         <organization>Cisco Systems</organization>
      </author>
      <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
         <organization>Cisco Systems</organization>
      </author>
      <author fullname="Pierre Francois" initials="P." surname="Francois">
         <organization>INSA Lyon</organization>
      </author>
      <author fullname="Bruno Decraene" initials="B." surname="Decraene">
         <organization>Orange</organization>
      </author>
      <author fullname="Daniel Voyer" initials="D." surname="Voyer">
         <organization>Bell Canada</organization>
      </author>
      <date day="12" month="February" year="2025"/>
      <abstract>
	 <t>   This document presents Topology Independent Loop-free Alternate Fast
   Reroute (TI-LFA), aimed at providing protection of node and adjacency
   segments within the Segment Routing (SR) framework.  This Fast
   Reroute (FRR) behavior builds on proven IP Fast Reroute concepts
   being LFAs, remote LFAs (RLFA), and remote LFAs with directed
   forwarding (DLFA).  It extends these concepts to provide guaranteed
   coverage in any two-connected networks using a link-state IGP.  An
   important aspect of TI-LFA is the FRR path selection approach
   establishing protection over the expected post-convergence paths from
   the point of local repair, reducing the operational need to control
   the tie-breaks among various FRR options.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rtgwg-segment-routing-ti-lfa-21"/>
   
</reference>


<reference anchor="BrAl17" >
  <front>
    <title>Performance Comparison of Resilience Mechanisms for Stateless Multicast Using BIER</title>
    <author initials="W." surname="Braun" fullname="W. Braun">
      <organization></organization>
    </author>
    <author initials="M." surname="Albert" fullname="M. Albert">
      <organization></organization>
    </author>
    <author initials="T." surname="Eckert" fullname="T. Eckert">
      <organization></organization>
    </author>
    <author initials="M." surname="Menth" fullname="M. Menth">
      <organization></organization>
    </author>
    <date year="2017" month="May"/>
  </front>
</reference>


    </references>


<?line 1769?>

<section anchor="non-working-frr-options"><name>Non-working FRR options</name>

<section anchor="bier-in-bier"><name>BIER-in-BIER encapsulation</name>

<t><xref target="example41"/> is again the example shown in <xref target="example4"/>. One
option not discussed in before - because it can reasonably not
be made to work - is to attempt using BIER-in-BIER encapsulation
to improve over the solution described.</t>

<figure title="Example 4" anchor="example41"><artwork align="center"><![CDATA[
                (q5,q8) (q5,q6) (q5,q6)
                   (p1)   (p1)  (p1)
                -- R11 -- R10 - R12 - R3 -- R5
               /                     / \
              |             /--------   --- R6
     R0 ---- R12 -- R1 -- R2
          (p1)|        L1   \--------   --- R7
               \                     \ /
                -- R13 -- R9 -- R4 - R7 --- R8
                   (p1)  (p1)  (p1)
                (q7,q8) (q7,q8) (q7,q8)
                      
]]></artwork></figure>

<t>One way how one could attempt to avoid having to send out
two copies from R1 under the failure of R2, one towards R11 to then
reach R5, R6 and one towards R13 to then reach R7, R8 is to
consider encapsulating the packet into a new BIER header which
for example has as destinations (BFER) R11 and R13. When 
R11 and R13 respectively receive this packet, they decapsulate it,
encounter the original BIER packet (that was FRR redirected by R1),
and continue to forward it to it's ultimate destinations.</t>

<t>Unfortunately, this topology also shows how this would fail.
When R11 would process the original BIER packet and encounter
the bits for either R7 and.or R8, then it would send a copy
back to R12 to reach R7, R8. That copy would again reach R1,
and in result in another FRR'ed copy of the same packet. This
duplication would only stop due to TTL expiry.</t>

<t>Arguably, if the BIER encapsulation was choosen not to send
copies towards R11, R13, but instead R12, R4, then this
looping would not happen because the copy for R7, R8 from R12
would instead be sent towards R3, which would send it towards
R2 which assumably has failed and hence the packet copy from
R3 would be dropped.</t>

<t>However, in reality FRR would not only be set up on R1 towards R2,
but equally on R3 and R7, so both of them would equally create
FRR packets when they recognize R2 to be down.</t>

</section>
</section>
<section anchor="changelog"><name>Changelog</name>

<t>[RFC-Editor: Please remove this section].</t>

<section anchor="rev-11-sent-back-from-iesg-to-wg"><name>rev 11 - sent back from IESG to WG</name>

<t>Intermediate version. Added primarily the Overview Chapter to better
introduce the concepts and benefits of BIER-FRR to readers (customers et all) only aware of unicast FRR,
and to better explain unicast FRR concepts (p, q space) to readers primarily aware of BIER.</t>

<t>Changes / optimizations in further parts of the document yet.</t>

</section>
<section anchor="rev-11-sent-back-from-iesg-to-wg-1"><name>rev 11 - sent back from IESG to WG</name>

<t>Triage of IESG review feedback. Fixed the following core / simple feedback. See TBD section below for the missing IESG and directorate review feedback that will need to be folded into the next rev's.</t>

<t>Brought document into kramdown format for easier editing.</t>

<t>Rewrote abstract to answer Roman Danyliw / Éric Vyncke / Brian Haberman
questions about scope (framework) and intended status (informational) of
document.</t>

<t>Changed set of authors to meeth 5-authors max requirements. Changed
authors to contributors.</t>

<t>Removed RFC2119 boilerplate because as a framework, this document does
not use RFC2119 language (Mike Bishop).</t>

<t>Resolved Eric Vyncke Abstract text convern (removed). But see TBD for more work on refining text required.</t>

<t>Resolved expanding LFA on first use.</t>

<t>Ketan: Please remove extra "." I saw a few other similar instances in the document.</t>

<t>Ketan: minor: perhaps s/reconvergence/control plane reconvergence .</t>

<t>Ketan: fixed "persistent failure" text.</t>

<t>Ketan: In the following ? ... perhaps "In this subsection," ?</t>

</section>
<section anchor="resolved-iesg-discuss-comments-before-rev-11"><name>Resolved IESG discuss / comments before rev 11.</name>

<t>Added text for BFD referring to RFC5880 (prior no use of RFC5880 reference).</t>

<t>EVyncke: s/without encapsulation in a tunnel header/without encapsulation in a tunnel/</t>

<t>EVyncke: s/link layer technology/link-layer technology/</t>

</section>
<section anchor="tbd"><name>TBD</name>

<t>Fold in RTGDIR feedback (eckert).</t>

<t>Fold in unanswered questions from INTDIR review (Haberman):
 https://datatracker.ietf.org/doc/review-ietf-bier-frr-08-intdir-telechat-haberman-2025-06-03/)</t>

<t>Section 6.1: Add text about PMTU when using tunnels (Evyncke DISCUSS). Although: RFC7490 which explicitly require stunnels also does not address tunnels MTU issues. Maybe attempt to declare MTU problem out of scope given how we're "just" doing something similar for BIER that several unicast RFCs are doing - without addressing MTU.</t>

<t>Check/remove unused references. Add text explaining benefits of reading reference 
"Performance Comparison of Resilience Mechanisms for Stateless Multicast Using BIER" (aka: which pieces relevant to this draft does this research paper cover).</t>

<t>Add text about egress protection (Aka: node protection against BFER failure),
reference I-D.chen-bier-egress-protect (Roman Danilyv).</t>

<t>EVyncke: I fail to see the logical link between <spanx style="verb">Typically, BIER packets are forwarded without an outer IP header.</spanx> and the consequence <spanx style="verb">if a link or node failure occurs, the corresponding BFR Neighbor (BFR-NBR) becomes unreachable</spanx>. Strongly suggest adding some explanations. Answer: linkage is that BIER can not automatically use IP FRR but has to deal with unreachability events itself. But even if BIER was using per-hop IP/MPLS encap to rely on IP/MPLS FRR, then the result would not be as good as "direct" BIER-FRR. Text rewrite requires some restructuring.</t>

<t>EVyncke: Should a reference be provide for SR in <spanx style="verb">If segment routing is employed</spanx> ?</t>

<t>Evyncke: The last paragraph does not mention the 'explicit' forwarding action, is it on purpose ? If so, the read will welcome an explanation.</t>

<t>Ketan: major: Please provide a reference or explanation of "normal BIER-LFAs". Did
you mean RFC5286? Same goes for the other types - please provide references. TBD because text needs more structured rewrite of aligning the BIER behavior with the pre-defined unicast FRR terminology / cases.</t>

<t>Ketan: Is that IP-TI-LFA ? Same Q for TI-BIER-LFA. Need more structured rewrite of text...</t>

<t>Ketan: Isn't that 100% theoretical? Practically, there are limits of platform
and implementations. Also, all routers should be BFRs. Answer: No, should be as practically applicable as unicast TI-LFA is. There may be othrer platform limitations for BIER-FRR though.</t>

<t>DebCooley: The word 'tunnel' is used many times in this draft.  There is no definition of what is meant by tunnel(s), I have to assume that they are not for security purposes.  If they are specific types of tunnels, e.g. MPLS or other security tunnel options (IPsec), then it would be nice to have that defined. Yes: Need to define "tunnel" for the purpose of this ocument as an encapsulation of BIER packets into some unicast header that allows forwarding of the packet to a remote BFR. On the other hand, RFC like RFC7490 (RLFA in unicast) uses "tunnel" without explaininf/defining it.</t>

<t>Ketan:  References to respective RFCs related to different types of LFA/FRR
unicast mechanisms would be helpful in this section as well. Yes!</t>

<t>All of Mohammeds IESG review (sorry, ran out of time).</t>

</section>
</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="A." surname="Wang" fullname="Aijun Wang">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>
          <city>Beijing</city>
          <code>102209</code>
          <country>China</country>
        </postal>
        <email>wangaj3@chinatelecom.cn</email>
      </address>
    </contact>
    <contact initials="G." surname="Mishra" fullname="Gyan S. Mishra">
      <organization>Verizon Inc.</organization>
      <address>
        <postal>
          <street>13101 Columbia Pike</street>
          <city>Silver Spring</city>
          <code>MD 20904</code>
          <country>USA</country>
        </postal>
        <phone>301 502-1347</phone>
        <email>gyan.s.mishra@verizon.com</email>
      </address>
    </contact>
    <contact initials="Y." surname="Liu" fullname="Yisong Liu">
      <organization>China Mobile</organization>
      <address>
        <email>liuyisong@chinamobile.com</email>
      </address>
    </contact>
    <contact initials="Y." surname="Fan" fullname="Yanhe Fan">
      <organization>Casa Systems</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>yfan@casa-systems.com</email>
      </address>
    </contact>
    <contact initials="L." surname="Liu" fullname="Lei Liu">
      <organization>Fujitsu</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>liulei.kddi@gmail.com</email>
      </address>
    </contact>
    <contact initials="X." surname="Liu" fullname="Xufeng Liu">
      <organization>Alef Edge</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>xufeng.liu.ietf@gmail.com</email>
      </address>
    </contact>
    <contact initials="X." surname="Geng" fullname="Xuesong Geng">
      <organization></organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>gengxuesong@huawei.com</email>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

