summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9272.txt
blob: ae3970c3e254c336d556d23faf1e2ee60a958896 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
Internet Engineering Task Force (IETF)                          Z. Zhang
Request for Comments: 9272                                 A. Przygienda
Updates: 8401, 8444                                     Juniper Networks
Category: Standards Track                                    A. Dolganow
ISSN: 2070-1721                                               Individual
                                                              H. Bidgoli
                                                                   Nokia
                                                            IJ. Wijnands
                                                              Individual
                                                                A. Gulko
                                          Edward Jones Wealth Management
                                                          September 2022


   Underlay Path Calculation Algorithm and Constraints for Bit Index
                      Explicit Replication (BIER)

Abstract

   This document specifies general rules for the interaction between the
   BIER Algorithm (BAR) and the IGP Algorithm (IPA) used for underlay
   path calculation within the Bit Index Explicit Replication (BIER)
   architecture.  The semantics defined in this document update RFC 8401
   and RFC 8444.  This document also updates the "BIER Algorithm"
   registry established in RFC 8401.

Status of This Memo

   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force
   (IETF).  It represents the consensus of the IETF community.  It has
   received public review and has been approved for publication by the
   Internet Engineering Steering Group (IESG).  Further information on
   Internet Standards is available in Section 2 of RFC 7841.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   https://www.rfc-editor.org/info/rfc9272.

Copyright Notice

   Copyright (c) 2022 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Revised BSD License text as described in Section 4.e of the
   Trust Legal Provisions and are provided without warranty as described
   in the Revised BSD License.

Table of Contents

   1.  Introduction
     1.1.  Requirements Language
   2.  Updated Definitions for IPA and BAR Fields
   3.  General Rules for the BAR and IPA Interaction
     3.1.  When BAR Is Not Used
     3.2.  Exceptions or Extensions to the General Rules
   4.  Examples
   5.  IANA Considerations
   6.  Security Considerations
   7.  Normative References
   Acknowledgements
   Authors' Addresses

1.  Introduction

   In the Bit Index Explicit Replication (BIER) architecture [RFC8279],
   packets with a BIER encapsulation header are forwarded to the
   neighbors on the underlay paths towards Bit-Forwarding Egress Routers
   (BFERs) that are represented by bits set in the BIER header's
   BitString.  The paths are calculated in the underlay topology for
   each sub-domain following a calculation algorithm specific to the
   sub-domain.  The topology or algorithm may or may not be congruent
   with unicast.  The algorithm could be a BIER-specific algorithm or
   could be a generic IGP one, e.g., Shortest Path First (SPF).

   In [RFC8401] and [RFC8444], an 8-bit BAR (BIER Algorithm) field and
   8-bit IPA (IGP Algorithm) field are defined to signal the BIER-
   specific algorithm and generic IGP Algorithm, respectively, and only
   value 0 is allowed for both fields in those two documents.

   This document specifies general rules for the interaction between the
   BIER Algorithm (BAR) and the IGP Algorithm (IPA) used for underlay
   path calculation when other BAR and/or IPA values are used.  The
   semantics defined in this document update [RFC8401] and [RFC8444].
   This document also updates the "BIER Algorithm" registry defined in
   [RFC8401] by renaming the "Experimental Use" range to "Private or
   Experimental Use".

1.1.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

2.  Updated Definitions for IPA and BAR Fields

   The definitions for the IPA and BAR fields in Section 6.1 of
   [RFC8401] and Section 2.1 of [RFC8444] are updated as follows.

   IPA:  IGP Algorithm.  Specifies a generic Routing Algorithm and
      related Routing Constraints to calculate underlay paths to reach
      other Bit-Forwarding Routers (BFRs).  Values are from the "IGP
      Algorithm Types" registry.  One octet.

   BAR:  BIER Algorithm.  Specifies a BIER-specific Algorithm and BIER-
      specific Constraints used to either modify, enhance, or replace
      the calculation of underlay paths to reach other BFRs as defined
      by the IPA value.  Values are allocated from the "BIER Algorithm"
      registry.  One octet.

      When a BAR value is defined, the corresponding BIER-specific
      Algorithm (BA) and BIER-specific Constraint (BC) semantics SHOULD
      be specified.  For an IGP Algorithm to be used as a BIER IPA, its
      Routing Algorithm (RA) and Routing Constraint (RC) semantics
      SHOULD be specified.  If any of these semantics is not specified,
      it MUST be interpreted as the "NULL" algorithm or constraint.  For
      example, the IGP Algorithm 0 defined in [RFC8665] is treated as
      having a NULL RC, i.e., no constraints (see Section 3).

      If a specification is not available for a specific BAR value, its
      value MUST be from the Private or Experimental Use range of the
      registry.

3.  General Rules for the BAR and IPA Interaction

   For a particular sub-domain, all BFRs MUST be provisioned with and
   signal the same BAR and IPA values.  If a BFR discovers another BFR
   advertising a different BAR or IPA value for a sub-domain, it MUST
   treat the advertising router as incapable of supporting BIER for that
   sub-domain.  (One way of handling incapable routers is documented in
   Section 6.9 of [RFC8279], and additional methods may be defined in
   the future.)

   For a particular topology X that a sub-domain is associated with, a
   router MUST calculate the underlay paths according to its BAR and IPA
   values in the following way:

   1.  Apply the BIER constraints, resulting in BC(X).  If BC is NULL,
       then BC(X) is X itself.

   2.  Apply the routing constraints, resulting in RC(BC(X)).  If RC is
       NULL, then RC(BC(X)) is BC(X).

   3.  Select the algorithm AG as follows:

       a.  If BA is NULL, AG is set to RA.

       b.  If BA is not NULL, AG is set to BA.

   4.  Run AG on RC(BC(X)).

   It's possible that the resulting AG is not applicable to BIER.  In
   that case, no BIER paths will be calculated, and this is a network
   design issue that an operator needs to avoid when choosing the BAR or
   IPA.

3.1.  When BAR Is Not Used

   BAR value 0 is defined as "No BIER-specific algorithm is used"
   [RFC8401].  This value indicates NULL BA and BC.  Following the rules
   defined above, the IPA value alone identifies the calculation
   algorithm and constraints to be used for a particular sub-domain.

3.2.  Exceptions or Extensions to the General Rules

   Exceptions or extensions to the above general rules may be specified
   in the future for specific BAR and/or IPA values.  When that happens,
   compatibility with defined BAR and/or IPA values and semantics need
   to be specified.

4.  Examples

   As an example, one may define a new BAR with a BIER-specific
   constraint of "excluding BIER-incapable routers".  No BIER-specific
   algorithm is specified, and the BIER-specific constraint can go with
   any IPA, i.e., any RC defined by the IPA is augmented with "excluding
   BIER-incapable routers".  (Routers that do not support BIER are not
   considered when applying the IGP Algorithm.)

   If the BC and RC happen to conflict and lead to an empty topology,
   then no BIER forwarding path will be found.  For example, the BC
   could be "exclude BIER-incapable routers", and the RC could be
   "include green links only".  If all the green links are associated
   with BIER-incapable routers, it results in an empty topology.  This
   is a network design issue that an operator needs to avoid when
   choosing the BAR or IPA.

   In another example, a BAR value can be specified to use the Steiner
   tree algorithm and used together with IPA 0 (which uses an SPF
   algorithm).  According to the general rules, the BIER-specific
   algorithm takes precedence so SPF is not used.

5.  IANA Considerations

   The "BIER Algorithm" registry has been updated as follows:

   1.  The "Experimental Use" range has been renamed "Private or
       Experimental Use".

   2.  This document has been added as a reference both for the registry
       itself and for values 240-254 in the registry.

6.  Security Considerations

   This document specifies general rules for the interaction between the
   BIER Algorithm (BAR) and the IGP Algorithm (IPA) used for underlay
   path calculation.  It does not change the security aspects as
   discussed in [RFC8279], [RFC8401], and [RFC8444].

7.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

   [RFC8279]  Wijnands, IJ., Ed., Rosen, E., Ed., Dolganow, A.,
              Przygienda, T., and S. Aldrin, "Multicast Using Bit Index
              Explicit Replication (BIER)", RFC 8279,
              DOI 10.17487/RFC8279, November 2017,
              <https://www.rfc-editor.org/info/rfc8279>.

   [RFC8401]  Ginsberg, L., Ed., Przygienda, T., Aldrin, S., and Z.
              Zhang, "Bit Index Explicit Replication (BIER) Support via
              IS-IS", RFC 8401, DOI 10.17487/RFC8401, June 2018,
              <https://www.rfc-editor.org/info/rfc8401>.

   [RFC8444]  Psenak, P., Ed., Kumar, N., Wijnands, IJ., Dolganow, A.,
              Przygienda, T., Zhang, J., and S. Aldrin, "OSPFv2
              Extensions for Bit Index Explicit Replication (BIER)",
              RFC 8444, DOI 10.17487/RFC8444, November 2018,
              <https://www.rfc-editor.org/info/rfc8444>.

   [RFC8665]  Psenak, P., Ed., Previdi, S., Ed., Filsfils, C., Gredler,
              H., Shakir, R., Henderickx, W., and J. Tantsura, "OSPF
              Extensions for Segment Routing", RFC 8665,
              DOI 10.17487/RFC8665, December 2019,
              <https://www.rfc-editor.org/info/rfc8665>.

Acknowledgements

   The authors thank Alia Atlas, Eric Rosen, Senthil Dhanaraj and many
   others for their suggestions and comments.  In particular, the
   BC/BA/RC/RA representation for the interaction rules is based on
   Alia's write-up.

Authors' Addresses

   Zhaohui Zhang
   Juniper Networks
   Email: zzhang@juniper.net


   Antoni Przygienda
   Juniper Networks
   Email: prz@juniper.net


   Andrew Dolganow
   Individual
   Email: adolgano@gmail.com


   Hooman Bidgoli
   Nokia
   Email: hooman.bidgoli@nokia.com


   IJsbrand Wijnands
   Individual
   Email: ice@braindump.be


   Arkadiy Gulko
   Edward Jones Wealth Management
   Email: arkadiy.gulko@edwardjones.com