<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC8296 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8296.xml">
<!ENTITY RFC8279 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8279.xml">
<!ENTITY RFC5120 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5120.xml">
<!ENTITY RFC8444 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8444.xml">
<!ENTITY RFC8401 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8401.xml">
<!ENTITY I-D.ietf-bier-ospfv3-extensions SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-bier-ospfv3-extensions.xml">
<!ENTITY I-D.ietf-bier-lsr-non-mpls-extensions SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-bier-lsr-non-mpls-extensions.xml">
<!ENTITY RFC3906 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3906.xml">
<!ENTITY RFC2784 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2784.xml">
<!ENTITY RFC3036 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3036.xml">
<!ENTITY RFC8402 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8402.xml">
<!ENTITY RFC5286 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5286.xml">
<!ENTITY I-D.ietf-bier-tether SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-bier-tether.xml">
<!ENTITY RFC9272 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9272.xml">
<!ENTITY RFC6514 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6514.xml">
<!ENTITY RFC7432 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7432.xml">
<!ENTITY I-D.ietf-bier-php SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-bier-php.xml">
<!ENTITY RFC7024 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7024.xml">
<!ENTITY I-D.ietf-bess-evpn-virtual-hub SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-bess-evpn-virtual-hub.xml">
<!ENTITY RFC9574 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9574.xml">
]>

<?rfc toc, sortrefs, symrefs, comments="yes"?>

<rfc ipr="trust200902" docName="draft-zzhang-bier-brownfield-options-00" category="info">
  <front>
    <title abbrev="BIER Brownfield">BIER Brownfield Frameworks</title>

    <author initials="Z." surname="Zhang" fullname="Zhaohui Zhang">
      <organization>Juniper Networks</organization>
      <address>
        <email>zzhang@juniper.net</email>
      </address>
    </author>
    <author initials="A." surname="Przygienda" fullname="Antoni Przygienda">
      <organization>Juniper Networks</organization>
      <address>
        <email>prz@juniper.net</email>
      </address>
    </author>
    <author initials="Z." surname="Zhang" fullname="Zheng Zhang">
      <organization>ZTE</organization>
      <address>
        <email>zhang.zheng@zte.com.cn</email>
      </address>
    </author>

    <area>routing</area>
    <workgroup>bier</workgroup>
    <keyword>bier, brown field, migration</keyword>

    <abstract>


<t>BIER is a new architecture for the forwarding and replication of
   multicast data packets.  This document defines possible approaches to
   introduce BIER into networks consisting of a mixture of BFRs and non-
   BFRs and their respective preconditions and properties.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>BIER <xref target="RFC8279"></xref> is a new architecture for the forwarding of multicast
   data packets.  It allows replication through a "multicast domain" and
   it does not precondition construction of a multicast distribution
   tree, nor does it precondition intermediate nodes to maintain any
   per-flow state.</t>

<t>Given that BIER encompasses a novel switching path it can be
   reasonably expected that in many deployment scenarios, at least
   initially, a mixture of BFRs and non-BFR (i.e. routers having all or
   some of the interfaces not being capable of BIER forwarding) will be
   used and represent what we will call "mixed environments".  <xref target="RFC8279"></xref>
   offers several suggestions how a mixture of such routers can be
   handled in the network.  The purpose of this memo is to cover other
   possible deployment options with explanation what preconditions are
   necessary to apply each of those and what properties and requirements
   they bring in operational considerations respectively.</t>

<t>The presented sequence of possible solutions follows very loosely an
   ordering starting with the ones that use "least" amount of additional
   technologies beside BIER to deploy a "mixed environment".  This</t>

<t>serves subsequently to facilitate the introduction of consecutive,
   more interdependent solutions.  Nevertheless, this does not imply
   that any of the solutions is better or simpler.  The "optimal"
   solution will depend every time on operational realities of the
   network performing a migration towards BIER deployment.</t>

<t>Any tunnelling technology used when deploying BIER in a "mixed
   environment" must ensure that in case the tunnel carries other types
   of traffic beside BIER the tunnel termination point MUST be capable
   of identifying BIER frames by some means.  In case of tunnel carrying
   only Ethernet frames or MPLS encapsulated traffic <xref target="RFC8296"/> allows to
   distinguish BIER from other frames.</t>

<t>This document uses terminology defined in <xref target="RFC8279"/>.</t>

</section>
<section anchor="naked-mt"><name>'Naked' MT</name>

<t>Strictly speaking BIER can be deployed in "mixed environments"
   without any additional extensions or new technologies in its basic
   form.  Proper use of multi-topology <xref target="RFC5120"/> configuration in IGPs
   will allow separation of BIER capable routers and interfaces in the
   topology, possibly connected via IGP tunnels to create at minimum a
   graph of BFRs.</t>

<section anchor="preconditions"><name>Preconditions</name>

<t><list style="symbols">
  <t>BIER IGP signalling via <xref target="RFC8444"/>, <xref target="RFC8401"/>,
   <xref target="I-D.ietf-bier-ospfv3-extensions"/>, or
   <xref target="I-D.ietf-bier-lsr-non-mpls-extensions"/>, and</t>
  <t>implementation of multi-topology and</t>
  <t>any kind of tunneling technology that can be viewed as adjacency
in IGP.</t>
</list></t>

</section>
<section anchor="properties"><name>Properties</name>

<t><list style="symbols">
  <t>Multi-topology has been standardized and used for many years in
IGPs and other signalling protocols.</t>
  <t>The use of multi-topology allows for multicast and unicast traffic
to follow (per subdomain) different paths if necessary in case
such a behavior is desired operationally.</t>
  <t>Normal IGP computation results are used as BIER nexthops, i.e.
normal SPF nexthops or even TE computation nexthops and techniques
like <xref target="RFC3906"/> are applicable.</t>
  <t>Reconfiguring multi-topology preconditions the touching of both
sides of a link in the multi-topology and recomputation of BIER
nexthops for the given topology on all routers.  On changes in
topology the tunnels may need to be reprovisioned depending on
technology and protection scheme used.</t>
  <t>Physical links configured as members of several multi-topologies
can be "shared" between subdomains for e.g. protection purposes,
i.e. if multi topologies used for different sub-domains are using
same physical links, the links will be used by the according sub-
domains as well.  By adjusting IGP metrics the traffic can be kept
separate per subdomain with the possiblity of a "fail-over" onto
the links with high IGP metric in case of failures.  It is even
possible to use the same physical topology with each multi-
topology carrying different metrics to make different links having
different preference for each sub-domain and "separate" traffic
per sub-domain that way.</t>
  <t>Since multi-topology membership is a "per interface" property it
allows to manage "partial BFR" routers, i.e. routers where only a
subset of interfaces is BIER capable.</t>
  <t>Multi-topology solution can be combined in case of "mixed
environment" with any other solution described in this document
that is multi-topology aware.</t>
  <t>If tunnel metrics are chosen based on purely IGP metrics the
solution may load-balance between hop-by-hop BIER path and tunnels
which can lead to different timing behavior on each path albeit in
case of BIER entropy encompassing a logical flow this should be
benign.</t>
  <t>Multi-topology provides inherently separate routing tables and
according statistics.</t>
</list></t>

</section>
</section>
<section anchor="section69"><name>RFC8279 Section 6.9</name>

<t>This section deals with the "re-parenting" solution outlined in
   Section 6.9 of <xref target="RFC8279"/>.  We will deal with the modified step 2)
   solution in Section 4.</t>

<section anchor="preconditions-1"><name>Preconditions</name>

<t><list style="symbols">
  <t>BIER IGP signalling via <xref target="RFC8444"/>, <xref target="RFC8401"/>,
   <xref target="I-D.ietf-bier-ospfv3-extensions"/>, or
   <xref target="I-D.ietf-bier-lsr-non-mpls-extensions"/>, and</t>
  <t>pre-provisioned "static" tunnels that allows "re-parenting" in any
possible failure scenario and/or</t>
  <t>a "dynamic tunneling" technology that can use a unicast tunnel
between any pair of nodes in the domain without configuration or
setup, e.g. "soft" GRE <xref target="RFC2784"/>, LDP <xref target="RFC3036"/> in Downstream
Unsolicited mode or Segment Routing
<xref target="RFC8402"/> are assumed to be deployed
through the whole BIER domain.</t>
</list></t>

</section>
<section anchor="properties-1"><name>Properties</name>

<t><list style="symbols">
  <t>When used with dynamic tunnels the solution can automatically
"bridge" disconnected areas without necessity to provision multi
topology or static tunnel configuration, i.e.  this solution can
deal with any arbitrary breakage of topology as long the network
does not become partitioned.  It is equivalent to node protection
<xref target="RFC5286"/>.</t>
  <t>IGPs do not have to be aware of the tunnels.</t>
  <t>BIER traffic strictly follows unicast path only (assuming that the
"dynamic tunnels" are following IGP unicast nexthops as well) and
with that  <list style="symbols">
      <t>all BIER capable routers MUST have enough scale to carry
unicast load and</t>
      <t>if the unicast next-hop is a non-BIER capable router the router
upstream will ingress replicate to all the children on the
unicast tree of that next-hop and</t>
      <t>BIER may load balance between tunneled and BIER native
forwarding paths which can lead to different timing behavior
albeit in case of BIER entropy encompassing a logical flow this
should be benign.</t>
    </list></t>
  <t>All interfaces on BFRs MUST be capable of BIER forwarding.</t>
  <t>Dynamic tunneling topologies do not provide extensive OAM normally
albeit they may provide node and link failure protection.  On the
other hand, some "dynamic tunnelling" technologies like segment
routing will hold minimum amount of state in the network, i.e. no
per-tunnel specific state while providing coverage for any non-
partitioning failure.</t>
  <t>If a tunnel is used to reach the next BFR, the tunnel's own node/
link protection provides FRR.</t>
  <t>Each change in dynamic tunnel signalling (such as LDP) may lead to
recomputation of BIFT entries.</t>
</list></t>

</section>
</section>
<section anchor="bier-tethering"><name>BIER Tethering</name>

<t>With the RFC8279 Section 6.9 solution, an upstream BFR will ingress replicate
to downstream BFRs that are the children/grandchildren of a non-BFR on the
SPF tree. This may not be desired in certain situations, as described in
<xref target="I-D.ietf-bier-tether"/>.</t>

<t>A solution is specified in <xref target="I-D.ietf-bier-tether"/>. In the simplest form,
a BFR can be attached to a non-BFR with a local fat pipe, as a helper to
the non-BFR. The upstream BFR
will tunnel a single copy to the tethered BFR, which will then tunnel to
downstream BFRs.</t>

<section anchor="preconditions-2"><name>Preconditions</name>

<t>The same as in <xref target="section69"/>, plus signaling as specified in
<xref target="I-D.ietf-bier-tether"/>.</t>

</section>
<section anchor="properties-2"><name>Properties</name>

<t><list style="symbols">
  <t>The same as in <xref target="section69"/>, except that ingress replication from the
upstream BFR is replaced by a single tunnel to the tethered BFR, and then
ingress replication from the tethered BFR to downstream BFRs.</t>
  <t>As described in <xref target="I-D.ietf-bier-tether"/>, the tethered BFR does not have
to be a dedicated one - it can be used in the network for other purposes.
A single tethered BFR can help multiple non-BFRs, and multiple helpers can
help a single non-BFR. The same method that is used to ensure loop-free
in LFA/TI-LFA is used to ensure loop-free in this BIER tethering case.</t>
</list></t>

</section>
</section>
<section anchor="bier-specific-algorithm-based-solutions"><name>BIER Specific Algorithm Based Solutions</name>

<t>BIER can support a multitude of BIER Algorithms (BAR) as specified in
   IGP drafts and <xref target="RFC9272"/> to operate in "mixed
   environments" and take into consideration BIER specific constraints
   and properties.  While doing that BFRs signal which algorithm they
   use so the distributed computation delivers consistent results on all
   BFRs.  In its simplest form BAR can defined an SPF where non-BFRs are
   not being put on the candidate list which we denote for the moment as
   BAR=1 and consider further.</t>

<section anchor="preconditions-3"><name>Preconditions</name>

<t><list style="symbols">
  <t>BIER IGP signalling via <xref target="RFC8444"/>, <xref target="RFC8401"/>,
   <xref target="I-D.ietf-bier-ospfv3-extensions"/>, or
   <xref target="I-D.ietf-bier-lsr-non-mpls-extensions"/>, and</t>
  <t>Implementation of non-zero BAR values and</t>
  <t>any kind of tunneling technology that can be viewed as an
adjacency in IGP.</t>
</list></t>

</section>
<section anchor="properties-3"><name>Properties</name>

<t><list style="symbols">
  <t>BAR allows for multicast and unicast traffic to follow different
paths if necessary in case such a behavior is desired
operationally.</t>
  <t>BAR could take into accounts different limitations like e.g.
maximum possible fan-out degree on nodes or inter-dependency of
sub-domains in same BIER domain.</t>
  <t>Normal IGP computation can be used easily to compute BAR BIER
nexthops while preserving all unicast node and link-protection
schemes.</t>
  <t>Reconfiguring BAR preconditions the touching of all participating
BFR.</t>
  <t>BAR can allow to manage "partial BFR" routers, i.e. routers where
only a subset of interfaces is BIER capable if additional
information is advertised with BIER sub-TLVs.</t>
  <t>All interfaces on BFRs MUST be capable of BIER forwarding unless
the static tunnels can be "homed" on BIER capable interfaces only.</t>
</list></t>

</section>
</section>
<section anchor="controller-based-solutions"><name>Controller Based Solutions</name>

<t>Ultimately, the according BIRTs and BIFTs can be precomputed by an
   off-line controller via any algoirthm desirable (in a sense similar
   to Section 4 but being able to take other metrics and constraints in
   the computation than distributed by IGP possibly) and downloaded.</t>

<section anchor="preconditions-4"><name>Preconditions</name>

<t><list style="symbols">
  <t>Controller computing BIRTs and/or BIFTs and downloading them into
all BIER nodes and</t>
  <t>Preferrably signalling of a special BAR value on each router to
ensure that it is configured to use the according controller
downloaded tables.</t>
</list></t>

</section>
<section anchor="properties-4"><name>Properties</name>

<t><list style="symbols">
  <t>Controller based solution can take into account many constraints
and metrics that are not distributed network-wide such as
provisioning constraints depending on time of day.</t>
  <t>Centralized cntroller computation cannot normally react quickly to
node or link failures due to delays involved.  It is possible that
a centralized computation precomputes and installs according link-
and node-protection BIER next-hops and installs those in the
forwarding path.  Depending on delays two set of tables may be
necessary where after download to all routers a <spanx style="verb">fast switch-over</spanx>
is performed to minimize holes and traffic losses.</t>
</list></t>

</section>
</section>
<section anchor="bier-php"><name>BIER PHP</name>

<t>Consider a scenario where BIER is used as underlay for overlay services like
MVPN/EVPN <xref target="RFC6514"/> <xref target="RFC7432"/>, where the PEs would need to be BFIRs/BFERs
and encapsulate/decapsulate BIER packets. The migration/brownfield solutions
described in previous sections are all for routers that cannot forward BIER
traffic, and won't help if a PE cannot encapsulate/decapsulate BIER packets.</t>

<t><xref target="I-D.ietf-bier-php"/> specifies a solution where an egress PE would
participate in BIER flow overlay signaling and BIER signaling, but
request its upstream BFRs to pop the BIER header so that it would only receive
the payload without the BIER header.</t>

<section anchor="preconditions-5"><name>Preconditions</name>

<t><list style="symbols">
  <t>Additional PHP-request in the BIER signaling</t>
  <t>Upstream-assgined service labels cannot be used, because an egress PE cannot
determine which ingress PE sent the packets</t>
  <t>Ingress PEs must be able to send BIER packets, or they must rely on some other
BIER-capable helper PEs to relay traffic, as specified in <xref target="RFC7024"/> for MVPN and <xref target="I-D.ietf-bess-evpn-virtual-hub"/> or <xref target="RFC9574"/> for EVPN.</t>
</list></t>

</section>
<section anchor="properties-5"><name>Properties</name>

<t><list style="symbols">
  <t>A router requesting PHP behaves as BFER, i.e., participating in BIER and
flow overlay signaling even though it does not do BIER forwarding
(because its upstream BFRs remove the BIER header from the traffic destined
to this router).</t>
  <t>A BFR treats a BFER requesting PHP as BIER-incapable for transit traffic,
and deliver traffic destined to the BFER with BIER header popped.</t>
</list></t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>None.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>General BIER security considerations apply and this document does not
   introduce any new security relevant topics.</t>

<t>Controller based solutions may introduce new security considerations.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

&RFC8296;
&RFC8279;
&RFC5120;
&RFC8444;
&RFC8401;
&I-D.ietf-bier-ospfv3-extensions;
&I-D.ietf-bier-lsr-non-mpls-extensions;
&RFC3906;
&RFC2784;
&RFC3036;
&RFC8402;
&RFC5286;
&I-D.ietf-bier-tether;
&RFC9272;
&RFC6514;
&RFC7432;
&I-D.ietf-bier-php;
&RFC7024;
&I-D.ietf-bess-evpn-virtual-hub;
&RFC9574;


    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

