<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-fluechter-bier-bierte-subset-tunneling-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="bierte-subset-tunneling">Extensions to BIER Tree Engineering (BIER-TE) for Large Multicast Domains and 1:1 Protection</title>
    <seriesInfo name="Internet-Draft" value="draft-fluechter-bier-bierte-subset-tunneling-00"/>
    <author fullname="Moritz Flüchter">
      <organization>University of Tuebingen</organization>
      <address>
        <postal>
          <city>Tuebingen</city>
          <country>Germany</country>
        </postal>
        <email>moritz.fluechter@uni-tuebingen.de</email>
      </address>
    </author>
    <author fullname="Michael Menth">
      <organization>University of Tuebingen</organization>
      <address>
        <postal>
          <city>Tuebingen</city>
          <country>Germany</country>
        </postal>
        <email>michael.menth@uni-tuebingen.de</email>
      </address>
    </author>
    <author fullname="Toerless Eckert">
      <organization>Futurewei USA</organization>
      <address>
        <email>tte@cs.fau.de</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>Routing</area>
    <workgroup>Bit Indexed Explicit Replication</workgroup>
    <keyword>multicast</keyword>
    <keyword>resilience</keyword>
    <abstract>
      <?line 48?>

<t>BIER-TE extends BIER with tree engineering capabilities and can be supported by almost the same hardware.
However, a bitstring in BIER-TE hold bits for BFERs and links, which effects that the size of supportable topologies in terms of BFERs is smaller for BIER-TE than for BIER.
While for BIER, subsets can be utilized to improve scaling to large multicast domains, this mechanism requires adaptation for BIER-TE.
In this document, requirements for BIER-TE subsets are defined, a mechanism is described for how BIER-TE packets can reach their subsets using tunneling, and 1:1 protection for the entire BIER-TE multicast tree is explained.
The concept utilizes egress protection for reaching a subset when the ingress BFIR of the subset fails.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://uni-tue-kn.github.io/draft-bier-bierte-subset-tunneling/draft-fluechter-bier-bierte-subset-tunneling.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-fluechter-bier-bierte-subset-tunneling/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Bit Indexed Explicit Replication Working Group mailing list (<eref target="mailto:bier@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/bier/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/bier/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/uni-tue-kn/draft-bier-bierte-subset-tunneling"/>.</t>
    </note>
  </front>
  <middle>
    <?line 56?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Bit Index Explicit Replication with Traffic Engineering (BIER-TE) was introduced in <xref target="RFC9262"/> as an extension to the BIER archtecture, offering enhanced capabilities through traffic engineering, or "tree engineering" in this context.
In BIER-TE, the forwarding and replication of multicast traffic is guided by the BIER-TE header that includes bits representing Bit Forwarding Egress Routers (BFERs) and links.
As a result, the entire multicast distribution tree is encoded directly within the packet header.
This encoding leads to scalability challenges, particularly in large networks, which are similar as in BIER.
However, BIER-TE encodes more information in the bistring and thus scales worse than BIER for large networks.</t>
      <t>BIER-TE inherits the concept of subsets from BIER where the network domain can be partitioned into smaller sub-topologies.
A BIER-TE subset is a partition of the BIER-TE domain with a unique Set Identifier (SI).
The SI containing the destination BFERs of a packet is indicated in the BIER-TE header as a bitstring.
Further, the bitstring addresses only links and BFERs in that subset.</t>
      <t>In this document, requirements for BIER-TE subsets are defined, a mechanism is described for how BIER-TE packets can reach their subsets using tunneling.
Further the application of 1:1 protection for the entire multicast tree is explained.
With these extensions, BIER-TE can scale to large multicast domains.
The extensions depend on well established technologies and do not require any changes to the BIER header or forwarding logic.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<section anchor="abbreviations">
          <name>Abbreviations</name>
          <t>This document makes use of the terms defined in <xref target="RFC9262"/> and in <xref target="RFC8679"/>.</t>
          <t>Further abbreviations used in this document:</t>
          <table anchor="table_abbrev">
            <name>Abbreviations.</name>
            <thead>
              <tr>
                <th align="left">Abbreviation</th>
                <th align="left">Meaning</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">S-BFIR</td>
                <td align="left">Subset Bit Forwarding Ingress Router</td>
                <td align="left">This document</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="bier-te-subsets">
      <name>BIER-TE Subsets</name>
      <t>BIER subsets can be constructed by selecting a number of arbitrary BFERs within the BIER domain. The number of BFERs of each subset must not exceed the bitstring length and the BFERs of all subsets should cover all BFERs of the entire domain. This rather unconstraint selection of BFERs works well because a packet sent by a BIER BFIR reaches any BFER over the routing underlay, no matter which subset the BFER belongs to.</t>
      <t>In contrast, with BIER-TE, a BFER can be reached over a path that is encoded in the bitstring. Therefore, also links need to be part of the subset. Moreover, within a very large ring or a line, a BFIR may be so far away from a BFER that the links of the subset do not suffice to define a path from the BFIR to that BFER.</t>
      <t>Therefore, a different approach is needed for subsets in BIER-TE. First, a subset also needs links in additions to BFERs which are encoded in the bitstring. The number of BFERs and links within the subset <bcp14>MUST NOT</bcp14> exceed the size of the bitstring. Moreover, links and BFERs need to be connected so that a BIER-TE packet at a source of any link in the subset can reach all BFERs within the subset. The BFRs belonging to the links are also part of the subset but are not represented by a bit in the bitstring unless they constitute BFERs. Thus, a subset needs to be one-connected. That is, the mentioned property is fulfilled unless one link or BFR fails.
A BFIR may need to send a packet to a specific BFER, but it does not need to be part of the subset the BFER belongs to. It can however use unicast tunneling to direct packets to some BFR within the subset. That BFR is denoted as S-BFIR (subset BFIR). There may be one or many S-BFIRs for a subset.</t>
      <t>Subsets for BIER-TE with 1:1 protection have to be at least two-connected, i.e., the remaining subset is one-connected if a link or BFR fails. That is, in case of a failure, there is still a path from any BFR to any BFER within the subset. Further, for every S-BFIR in the subset, one or more backup S-BFIRs have to be assigned. When an S-BFIR fails, the backup S-BFIRs serve as alternative ingress to the subset and ensure that the packets reach the BFERs.</t>
      <t>A domain may be one- or two connected, but it may be difficult or even impossible to find a desired number of subsets with that property. Then, virtual links may be defined as tunnels whose paths extend over links outside the subset.</t>
    </section>
    <section anchor="subset-tunneling">
      <name>Subset Tunneling</name>
      <t>Any BFIR reaches each subset by tunneling packets to any S-BFIR in the subset.
To that end, the BFIR forwarding logic has to be slightly modified from the one defined in <xref target="RFC8279"/>.
When a BFIR receives an IPMC packet, it determines the destination BFERs and their subsets as with standard BIER-TE.
The BFIR clones the packet for each subset and adds the corresponding BIER-TE header to each packet.
The BIER-TE bitstring contains the multicast tree from S-BFIR to the BFERs in the same subset.
Then, the BFIR adds an outer tunneling header that reaches one of the S-BFIRs of the destination subset.</t>
      <figure anchor="fig-subset-tunneling-concept">
        <name>Example BIER-TE network with a one-connected BIER-TE subset, S-BFIR, and MPLS tunnel.</name>
        <artwork><![CDATA[
|       MPLS Tunnel         |     BIER-TE Subset      |
|                           |                         |
BFIR ───A─── LSR ───B─── S-BFIR ───0─── BFR ───1─── BFER
                                         |
                                         2
                                         |
                                        BFR ───3─── BFER                   
]]></artwork>
      </figure>
      <t>When an S-BFIR receives such a tunneled packet, it removes the tunnel header and applies BIER-TE forwarding.
The tunneling protocols used <bcp14>SHOULD</bcp14> support path steering, e.g., MPLS TE or SRv6.
Further, they <bcp14>SHOULD</bcp14> support FRR and egress protection mechanisms for 1:1 protection.</t>
    </section>
    <section anchor="protection">
      <name>1:1 Protection</name>
      <t>The protection of BIER-TE with subsets is split into three sections: during tunneling, at the subset ingress, and within the subset.</t>
      <section anchor="subset-tunneling-protection">
        <name>Subset Tunneling Protection</name>
        <t>The tunnel between BFIR and S-BFIR may be protected using existing FRR 1:1 protection mechanisms.
RSVP-TE with FRR <xref target="RFC8796"/> can be used for MPLS and <xref target="I-D.draft-ietf-rtgwg-segment-routing-ti-lfa"/> for FRR protection in SRv6.</t>
      </section>
      <section anchor="subset-ingress-protection">
        <name>Subset Ingress Protection</name>
        <t>When an S-BFIR fails, the packet has to be rerouted to a backup S-BFIR.
To protect against this failure, the tunneling protocol must support an egress protection mechanism.
If MPLS is used for the tunnel, then the MPLS Egress Protection Framework <xref target="RFC8679"/> can be used.
For SRv6 egress protection there is a similar draft <xref target="I-D.draft-ietf-rtgwg-srv6-egress-protection"/>.</t>
        <t>When the penultimate tunneling hop detects the failure of the S-BFIR, it becomes the PLR.
On a detected failure, the PLR determines a backup S-BFIR of the same subset.
If there are multiple backup S-BFIR, the PLR may select a backup S-BFIR based on different criteria, e.g., the closest backup S-BFIR.
The PLR uses the egress protection mechanism of the tunneling protocol to reroute the packet to the backup S-BFIR.</t>
        <figure anchor="fig-ingress-protection-concept">
          <name>MPLS example of a backup S-BFIR and a one-connected subset.</name>
          <artwork><![CDATA[
                 / ───C─── S-BFIR ───0─── \     / ──3── BFER
                /         (Backup)         \   /
               /                            \ /
BFIR ───A─── LSR  ───B───  S-BFIR  ───1───  BFR ───2─── BFER
]]></artwork>
        </figure>
        <t>The backup S-BFIR recognizes its role as backup ingress based on the tunneling protocol header.
It removes the tunneling header and applies BIER-TE FRR <xref target="I-D.draft-eckert-bier-te-frr"/> with node protection.
This ensures that the packet is forwarded to the correct next hops of the failed S-BFIR.
It also modifies the BIER-TE bitstring to prevent loops in the subset.
After the backup S-BFIR processing, standard BIER-TE forwarding is applied.</t>
      </section>
      <section anchor="intra-subset-protection">
        <name>Intra-Subset Protection</name>
        <t>Protection against failures inside a subset is achieved with existing BIER-TE FRR mechanisms.
There are currently two drafts for BIER-TE FRR <xref target="I-D.draft-eckert-bier-te-frr"/> and <xref target="I-D.draft-chen-bier-te-frr"/>.
Both define mechanisms for link and node protection and propose BIER-TE-in-BIER-TE tunneling to reroute packets around a failure.
Therefore, either of these drafts may be used for the FRR protection mechanisms.</t>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>In this section, we present two exemplary scenarios.
One for the subset tunneling and one for the ingress protection mechanism.</t>
      <section anchor="subset-tunneling-1">
        <name>Subset Tunneling</name>
        <t>An example topology using BIER-TE subset tunneling is illustrated in <xref target="fig-subset-tunneling"/>.
The BFIR determines that the packet needs to be delivered to BFERs 1 and 2.
It recognizes that the two BFERs lie within two different subsets and clones the packet.
The first packet receives a BIER-TE header with the bits set for link 0 and BFER 1 and is tunneled to the S-BFIR of subset 1.
The second packet receives a BIER-TE header with the bits set for link 1 and BFER 2 and is tunneled to subset 2.
When the packet arrives at each S-BFIR, the S-BFIR removes the MPLS tunnel header.
For subset 1, it then matches the BIER bitstring and forwards the packet over link 0.
The S-BFIR of subset to forwards the packet over link 1.</t>
        <figure anchor="fig-subset-tunneling">
          <name>Example BIER-TE network with two subsets and S-BFIRs.</name>
          <artwork><![CDATA[
                            BFIR
                              |
                              A
                SI:1          |           SI:2
               S-BFIR ───B── LSR ───C─── S-BFIR
                 |                         |   \
                 0                         1    2
                 |                         |     \
                BFER 1                  BFER 2   BFER 3
]]></artwork>
        </figure>
      </section>
      <section anchor="ingress-protection-with-mpls-tunneling">
        <name>Ingress Protection with MPLS Tunneling</name>
        <t><xref target="fig-ingress-protetion"/> illustrates the concept of ingress protection with MPLS.
When the tunneled BIER-TE packet arrives at the LSR B, it detects that S-BFIR A failed.
Using MPLS egress protection, the PLR (LSR B) switches the label to the context label C' which indicates the backup path to S-BFIR'.
S-BFIR' recognizes its role as protector by matching the context label to the failed ingress node.
Then, it applies the BIER-TE FRR node protection handling, unsets the bit for link 1 and sets the bit for link 0.
This way, the packet reaches the BFR and can be forwarded with standard BIER-TE.</t>
        <figure anchor="fig-ingress-protetion">
          <name>Example BIER-TE network with a single subset and two S-BFIRs.</name>
          <artwork><![CDATA[
|                    BIER-TE domain                            |
                                        | BIER-TE subset (SI:1)|
                               /--C'-- S-BFIR' -- 0 -- \
                              /                         \
                             /                           \
BFIR ───A─── LSR A ───B─── LSR B  ───C─── S-BFIR ───1─── BFR
                           (PLR)
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security issues discussed in <xref target="RFC8279"/>, <xref target="RFC9262"/>, and <xref target="RFC8679"/> apply to this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9262">
          <front>
            <title>Tree Engineering for Bit Index Explicit Replication (BIER-TE)</title>
            <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert"/>
            <author fullname="M. Menth" initials="M." surname="Menth"/>
            <author fullname="G. Cauchie" initials="G." surname="Cauchie"/>
            <date month="October" year="2022"/>
            <abstract>
              <t>This memo describes per-packet stateless strict and loose path steered replication and forwarding for "Bit Index Explicit Replication" (BIER) packets (RFC 8279); it is called "Tree Engineering for Bit Index Explicit Replication" (BIER-TE) and is intended to be used as the path steering mechanism for Traffic Engineering with BIER.</t>
              <t>BIER-TE introduces a new semantic for "bit positions" (BPs). These BPs indicate adjacencies of the network topology, as opposed to (non-TE) BIER in which BPs indicate "Bit-Forwarding Egress Routers" (BFERs). A BIER-TE "packets BitString" therefore indicates the edges of the (loop-free) tree across which the packets are forwarded by BIER-TE. BIER-TE can leverage BIER forwarding engines with little changes. Co-existence of BIER and BIER-TE forwarding in the same domain is possible -- for example, by using separate BIER "subdomains" (SDs). Except for the optional routed adjacencies, BIER-TE does not require a BIER routing underlay and can therefore operate without depending on a routing protocol such as the "Interior Gateway Protocol" (IGP).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9262"/>
          <seriesInfo name="DOI" value="10.17487/RFC9262"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8279">
          <front>
            <title>Multicast Using Bit Index Explicit Replication (BIER)</title>
            <author fullname="IJ. Wijnands" initials="IJ." role="editor" surname="Wijnands"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <author fullname="A. Dolganow" initials="A." surname="Dolganow"/>
            <author fullname="T. Przygienda" initials="T." surname="Przygienda"/>
            <author fullname="S. Aldrin" initials="S." surname="Aldrin"/>
            <date month="November" year="2017"/>
            <abstract>
              <t>This document specifies a new architecture for the forwarding of multicast data packets. It provides optimal forwarding of multicast packets through a "multicast domain". However, it does not require a protocol for explicitly building multicast distribution trees, nor does it require intermediate nodes to maintain any per-flow state. This architecture is known as "Bit Index Explicit Replication" (BIER). When a multicast data packet enters the domain, the ingress router determines the set of egress routers to which the packet needs to be sent. The ingress router then encapsulates the packet in a BIER header. The BIER header contains a bit string in which each bit represents exactly one egress router in the domain; to forward the packet to a given set of egress routers, the bits corresponding to those routers are set in the BIER header. The procedures for forwarding a packet based on its BIER header are specified in this document. Elimination of the per-flow state and the explicit tree-building protocols results in a considerable simplification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8279"/>
          <seriesInfo name="DOI" value="10.17487/RFC8279"/>
        </reference>
        <reference anchor="I-D.draft-eckert-bier-te-frr">
          <front>
            <title>Protection Methods for BIER-TE</title>
            <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
              <organization>Huawei USA - Futurewei Technologies Inc.</organization>
            </author>
            <author fullname="Gregory Cauchie" initials="G." surname="Cauchie">
              <organization>Bouygues Telecom</organization>
            </author>
            <author fullname="Wolfgang Braun" initials="W." surname="Braun">
              <organization>University of Tuebingen</organization>
            </author>
            <author fullname="Michael Menth" initials="M." surname="Menth">
              <organization>University of Tuebingen</organization>
            </author>
            <date day="5" month="March" year="2018"/>
            <abstract>
              <t>   This document proposes protection methods for the BIER-TE
   architecture [I-D.ietf-bier-te-arch].  These include 1+1 (live-live)
   path/tree [RFC7431] redundancy, 1:1 path/tree protection, as well as
   fast reroute (FRR) methods.  The latter may protect against link and/
   or node failures and leverage infrastructure tunnels, BIER-in-BIER
   encapsulation, or header modification for implementation.

   In particular, this memo describes FRR for BIER-TE in detail.  FRR
   for BIER-TE requires support from the BIER-TE controller and the BFRs
   that are attached to a link/adjacency for which FRR protection is
   desired.  FRR relies on the BIER header described in [RFC8279] which
   is also used by BIER-TE.  It does not require extensions or
   modifications to existing BIER-TE tables.  However, the presented FRR
   procedures need some additional forwarding plane logic on the BFR.
   An additional table is needed that carries information about pre-
   computed backup paths.  When a failure is detected, the information
   from this table is used to modify the bitstring in the BIER header
   before forwarding a packet over a backup path.  To prevent undesired
   packet duplication, packets should be tunneled on the backup paths.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-eckert-bier-te-frr-03"/>
        </reference>
        <reference anchor="I-D.draft-chen-bier-te-frr">
          <front>
            <title>BIER-TE Fast ReRoute</title>
            <author fullname="Huaimo Chen" initials="H." surname="Chen">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Mike McBride" initials="M." surname="McBride">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Yisong Liu" initials="Y." surname="Liu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Aijun Wang" initials="A." surname="Wang">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
              <organization>Verizon Inc.</organization>
            </author>
            <author fullname="Yanhe Fan" initials="Y." surname="Fan">
              <organization>Casa Systems</organization>
            </author>
            <author fullname="Lei Liu" initials="L." surname="Liu">
              <organization>Fujitsu</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <date day="28" month="March" year="2024"/>
            <abstract>
              <t>   This document describes a mechanism for fast re-route (FRR)
   protection against the failure of a transit node or link on an
   explicit point to multipoint (P2MP) multicast path/tree in a "Bit
   Index Explicit Replication" (BIER) Traffic Engineering (TE) domain.
   It does not have any per-path state in the core.  For a multicast
   packet to traverse a transit node along an explicit P2MP path, when
   the node fails, its upstream hop node as a PLR reroutes the packet
   around the failed node along the P2MP path once it detects the
   failure.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-chen-bier-te-frr-07"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8679">
          <front>
            <title>MPLS Egress Protection Framework</title>
            <author fullname="Y. Shen" initials="Y." surname="Shen"/>
            <author fullname="M. Jeganathan" initials="M." surname="Jeganathan"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="H. Gredler" initials="H." surname="Gredler"/>
            <author fullname="C. Michel" initials="C." surname="Michel"/>
            <author fullname="H. Chen" initials="H." surname="Chen"/>
            <date month="December" year="2019"/>
            <abstract>
              <t>This document specifies a fast reroute framework for protecting IP/MPLS services and MPLS transport tunnels against egress node and egress link failures. For each type of egress failure, it defines the roles of Point of Local Repair (PLR), protector, and backup egress router and the procedures of establishing a bypass tunnel from a PLR to a protector. It describes the behaviors of these routers in handling an egress failure, including local repair on the PLR and context-based forwarding on the protector. The framework can be used to develop egress protection mechanisms to reduce traffic loss before global repair reacts to an egress failure and control-plane protocols converge on the topology changes due to the egress failure.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8679"/>
          <seriesInfo name="DOI" value="10.17487/RFC8679"/>
        </reference>
        <reference anchor="RFC8796">
          <front>
            <title>RSVP-TE Summary Fast Reroute Extensions for Label Switched Path (LSP) Tunnels</title>
            <author fullname="M. Taillon" initials="M." surname="Taillon"/>
            <author fullname="T. Saad" initials="T." role="editor" surname="Saad"/>
            <author fullname="R. Gandhi" initials="R." surname="Gandhi"/>
            <author fullname="A. Deshmukh" initials="A." surname="Deshmukh"/>
            <author fullname="M. Jork" initials="M." surname="Jork"/>
            <author fullname="V. Beeram" initials="V." surname="Beeram"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>This document updates RFC 4090 for the Resource Reservation Protocol (RSVP) Traffic Engineering (TE) procedures defined for facility backup protection. The updates include extensions that reduce the amount of signaling and processing that occurs during Fast Reroute (FRR); as a result, scalability when undergoing FRR convergence after a link or node failure is improved. These extensions allow the RSVP message exchange between the Point of Local Repair (PLR) and the Merge Point (MP) nodes to be independent of the number of protected Label Switched Paths (LSPs) traversing between them when facility bypass FRR protection is used. The signaling extensions are fully backwards compatible with nodes that do not support them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8796"/>
          <seriesInfo name="DOI" value="10.17487/RFC8796"/>
        </reference>
        <reference anchor="I-D.draft-ietf-rtgwg-segment-routing-ti-lfa">
          <front>
            <title>Topology Independent Fast Reroute using Segment Routing</title>
            <author fullname="Ahmed Bashandy" initials="A." surname="Bashandy">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization>INSA Lyon</organization>
            </author>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel Voyer" initials="D." surname="Voyer">
              <organization>Bell Canada</organization>
            </author>
            <date day="5" month="July" year="2024"/>
            <abstract>
              <t>   This document presents Topology Independent Loop-free Alternate Fast
   Reroute (TI-LFA), aimed at providing protection of node and adjacency
   segments within the Segment Routing (SR) framework.  This Fast
   Reroute (FRR) behavior builds on proven IP Fast Reroute concepts
   being LFAs, remote LFAs (RLFA), and remote LFAs with directed
   forwarding (DLFA).  It extends these concepts to provide guaranteed
   coverage in any two-connected networks using a link-state IGP.  A key
   aspect of TI-LFA is the FRR path selection approach establishing
   protection over the expected post-convergence paths from the point of
   local repair, reducing the operational need to control the tie-breaks
   among various FRR options.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rtgwg-segment-routing-ti-lfa-17"/>
        </reference>
        <reference anchor="I-D.draft-ietf-rtgwg-srv6-egress-protection">
          <front>
            <title>SRv6 Path Egress Protection</title>
            <author fullname="Zhibo Hu" initials="Z." surname="Hu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Huaimo Chen" initials="H." surname="Chen">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Mehmet Toy" initials="M." surname="Toy">
              <organization>Verizon</organization>
            </author>
            <author fullname="Chang Cao" initials="C." surname="Cao">
              <organization>China Unicom</organization>
            </author>
            <author fullname="Tao He" initials="T." surname="He">
              <organization>China Unicom</organization>
            </author>
            <date day="1" month="February" year="2024"/>
            <abstract>
              <t>   TI-LFA specifies fast protections for transit nodes and links of an
   SR path.  However, it does not present any fast protections for the
   egress node of the SR path.  This document describes protocol
   extensions for fast protecting the egress node and link of a Segment
   Routing for IPv6 (SRv6) path.



              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rtgwg-srv6-egress-protection-16"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
