Skip to main content

Bit Indexed Explicit Replication
charter-ietf-bier-02

Yes

(Alia Atlas)

No Objection

(Alissa Cooper)
(Barry Leiba)
(Jari Arkko)
(Kathleen Moriarty)
(Martin Stiemerling)
(Pete Resnick)
(Richard Barnes)
(Ted Lemon)

Note: This ballot was opened for revision 00-01 and is now closed.

Ballot question: "Is this charter ready for external review?"

Adrian Farrel Former IESG member
Yes
Yes (2015-02-19 for -00-01) Unknown
I am very strongly supportive of this work and appreciate how hard
Alia has driven to get a WG formed and how she has acted to avoid
any further delay.

Balancing this as Experimental *in*the*first*instance* seems to be a
very wise move and to enable us to start the work in earnest. There
are many things that need to be discovered about building and
deploying this technology before we should attempt to publish as 
standards track. I believe, however that it may be possible to move
the deliverables to standards track (by rechartering) before
publication as RFC if the experimentation yields results.



That said, I think some of the bars are set too high in this charter.
If everyone is comfortable with them, then I see no issue, but I would
not mind relaxing as follows:

Deliverble 2

   Due to the critical need
   to have a high-quality and stable RFC for a new data-plane
   encapsulation, the MPLS-based encapsulation draft shall wait after
   WGLC and not progress to IETF Last Call until there are two
   independent interoperable implementations.

This seems wholly unnecessary for an Experimental RFC

Deliverable 2

   This draft also shall wait after WGLC
   and not progress to IETF Last Call until there are two independent
   interoperable implementations.

Ditto

Deliverable 9 might better be called "Deployment Evaluation" since many
of the things it calls for are future-looking rather than reports. 
Recall that widescale deployment of an experiment is less likely.




Maybe three things missing:

- Multi-domain or not. I don't mind which way you jump, but you should 
  jump.

- Consideration of whether extensions to IGPs are experimental (using
  experimental code points) or can access other code points. This
  question was touched on by Eric Rosen on the mailing list. Will the                         
  existing registration policies support this work in a sensible way
  or will soething have to change (the registries or the target status
  of this work)?

- Statement of experimental criteria and objectives. Although
  deliverable 9 hints at these, by placing it at the bottom of the list
  you lose the focus in the protocol desgin phase.
Alia Atlas Former IESG member
Yes
Yes (for -00-01) Unknown

                            
Alissa Cooper Former IESG member
No Objection
No Objection (for -00-01) Unknown

                            
Barry Leiba Former IESG member
No Objection
No Objection (for -00-01) Unknown

                            
Brian Haberman Former IESG member
No Objection
No Objection (2015-02-19 for -00-01) Unknown
1. The first work item says the WG "will specify the information that is required by a BIER header to support BIER forwarding."  That doesn't parse right to me.  Will the WG specify what information is needed by a router to support BIER forwarding?  Will the WG specify what information is needed in a BIER header?  A little clarification would be good.

2. Work item #2 (non-MPLS data plane) combined with the last paragraph of the charter seems to preclude the WG from looking at the BIER and PIM/IGMP/MLD interactions.  Is that the intent?

3. Does the WG need to develop an Applicability Statement for the non-MPLS data plane, if they choose to move that direction?

4. Does the charter require the WG to publish the use cases document?
Jari Arkko Former IESG member
No Objection
No Objection (for -00-01) Unknown

                            
Joel Jaeggli Former IESG member
No Objection
No Objection (2015-02-14 for -00-01) Unknown
So the size of the bier domain is bounded I suppose by the number of egress points you're willing to include in your header. given the inherent suitability of such a method for overlays it seems like it distinctly bounds the size of such an overlay based on the header size/  if you chain bier domains (no subdomain) how do you do loop detection (or don't you).
Kathleen Moriarty Former IESG member
No Objection
No Objection (for -00-01) Unknown

                            
Martin Stiemerling Former IESG member
No Objection
No Objection (for -00-01) Unknown

                            
Pete Resnick Former IESG member
No Objection
No Objection (for -00-01) Unknown

                            
Richard Barnes Former IESG member
No Objection
No Objection (for -00-01) Unknown

                            
Spencer Dawkins Former IESG member
No Objection
No Objection (2015-02-18 for -00-01) Unknown
One question. This text

   9) Deployment Experience: Once there is deployment experience, the
   WG will produce a document describing the benefits, problems, and
   trade-offs for using BIER instead of traditional multicast
   forwarding mechanisms.  Ideally, this should also contain an
   analysis of the impact and benefit of the new BIER data-plane to
   the overall Internet architecture.  This document is intended to be
   used to evaluate whether to recharter BIER to produce Standards
   Track RFCs.
   
seems like a lot of words to say "once there is deployment experience, BIER may be rechartered to produce Standards Track RFCs". Do you need to define the gates they must pass through now? (What if you think of something else later?)

"produce a document" sounds like we're likely to be having the usual discussion about whether to publish a working paper as an RFC when that happens. If they sent the ADs an e-mail, would that be wrong?
Stephen Farrell Former IESG member
No Objection
No Objection (2015-02-19 for -00-01) Unknown
I'm fine with this going for external review.

I would like to see the security properties of Bier called out more
as something that the proposed WG will address, e.g. does the
work to date include any integrity mechanisms so that one could
check if a bit-flip is causing packets to be sent to the "wrong"
places? Is there some (usable) security mechanism in place 
for establishing the bit-mask value to use at ingress? Etc.
Ted Lemon Former IESG member
No Objection
No Objection (for -00-01) Unknown