Skip to main content

BIER Fast Reroute (BIER-FRR)
draft-ietf-bier-frr-09

Discuss


Yes

Gunter Van de Velde

No Objection

Erik Kline
Jim Guichard

No Record

Andy Newton
Deb Cooley
Mahesh Jethanandani
Orie Steele
Paul Wouters

Ballot deferred by Deb Cooley on 2025-06-05.

Summary: Has 2 DISCUSSes. Has enough positions to pass once DISCUSS positions are resolved.

Roman Danyliw
Discuss
Discuss (2025-06-05 for -08) Sent
** Could the status of this document be explained?  What is the anticipated relationship between the experiment being conducted in RFC8279 and the procedures described in this document?  Practically, what does it mean for an informational status document to provide additional “mechanisms” for an experimental status RFC.  Is it adding or refining the experiment?

I observe that both the INTDIR and RTGDIR reviews asked similar questions. The INTDIR review has no response, but for the response to the RTGDIR review framed this document as a “primer” (https://mailarchive.ietf.org/arch/msg/rtg-dir/utbskA_QdV1GAwulOxKYQydI4pA/)

I reviewed the charter for guidance and the closest I could find is:
“1) Transition Mechanisms and Partial Deployments: The WG will define mechanisms to integrate BIER into existing multicast networks, 
…
(Intended status: Experimental, Informational or Proposed Standard).”

A “primer” doesn’t seem consist with this charter scope.
Comment (2025-06-05 for -08) Sent
** Thank you to Joel Halpern for the GENART review.

** I am not an expert in this topic.  The INTDIR review (https://datatracker.ietf.org/doc/review-ietf-bier-frr-08-intdir-telechat-haberman-2025-06-03/) seemed to pose critical questions for which there was no response.

** Section 10.2.  Can more details be provided for this reference.  Is this a paper or a talk?  
[BrAl17]   Braun, W., Albert, M., Eckert, T., and M. Menth,
             "Performance Comparison of Resilience Mechanisms for
              Stateless Multicast Using BIER", May 2017.

** idnits reports:
  == Unused Reference: 'RFC5880' is defined on line 1178, but no explicit
     reference was found in the text

  == Unused Reference: 'I-D.chen-bier-egress-protect' is defined on line
     1208, but no explicit reference was found in the text

  == The document doesn't use any RFC 2119 keywords, yet seems to have RFC
     2119 boilerplate text.
Éric Vyncke
Discuss
Discuss (2025-06-05 for -08) Sent
# Éric Vyncke, INT AD, comments for draft-ietf-bier-frr-08
CC @evyncke

Thank you for the work put into this document.

Please find below some blocking DISCUSS points, some non-blocking COMMENT points/nits (replies would be appreciated even if only for my own education).

Special thanks to Zheng Zhang for the shepherd's write-up including the WG consensus, the justification of the intended status *BUT* it lacks a real justification for having *SIX* authors.

Other thanks to Brian Haberman, the Internet directorate reviewer (at my request), please consider this int-dir review:
https://datatracker.ietf.org/doc/review-ietf-bier-frr-08-intdir-telechat-haberman-2025-06-03/ (and I have yet to read authors' reply)

I hope that this review helps to improve the document,

Regards,

-éric

## DISCUSS (blocking)

As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a DISCUSS ballot is just a request to have a discussion on the following topics:

### Abstract

It is basically Brian's point 1): s/describes a mechanism/describes *two* mechanisms/

### Informational status ?

Like Brian's point 2), I wonder why this I-D is informational while the basis BIER RFC is experimental. 

### Section 6.1

If traffic goes into a tunnel as a back-up path, then how is path MTU change applied ? There should be some text arount PMTU in this section.
Comment (2025-06-05 for -08) Sent
## COMMENTS (non-blocking)

### Nits tool

Please check https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-bier-frr-08.txt and fix the below points

  == The document doesn't use any RFC 2119 keywords, yet seems to have RFC
     2119 boilerplate text.

  == Unused Reference: 'RFC5880' is defined on line 1178, but no explicit
     reference was found in the text

  == Unused Reference: 'I-D.chen-bier-egress-protect' is defined on line
     1208, but no explicit reference was found in the text

### Section 1

I fail to see the logical link between `Typically, BIER packets are forwarded without an outer IP header.` and the consequence `if a link or node failure occurs, the corresponding BFR Neighbor (BFR-NBR) becomes unreachable`. Strongly suggest adding some explanations.

s/Typically, BIER packets are forwarded without an outer IP header./Typically, BIER packets are not encapsulated in IP./ ?

Please expand LFA at first use (i.e., before section 2)

### Section 3.1

s/link layer technology/link-layer technology/

s/without encapsulation in a tunnel header/without encapsulation in a tunnel/

Should a reference be provide for SR in `If segment routing is employed` ?

The last paragraph does not mention the 'explicit' forwarding action, is it on purpose ? If so, the read will welcome an explanation.
Gunter Van de Velde
Yes
Erik Kline
No Objection
Gorry Fairhurst
No Objection
Comment (2025-06-05 for -08) Sent
Thank you for a readable document. I read this from the perspective of a transport protocol, and have no transport-related comments.
Jim Guichard
No Objection
Ketan Talaulikar
No Objection
Comment (2025-06-02 for -08) Sent
Thanks to the authors and the WG for this document. 

Please find below some comments provided inline in the idnits output of v08 of the document.

122	   derived from a routing underlay or set by a controller.  In case of a
123	   persistent link or node failure, BIER traffic may not be delivered
124	   until the BIFT has been updated based on the reconverged routing
125	   underlay or by the controller.

<minor> Could you clarify what is meant by persistent here? Isn't this the
case for any link failure and especially so for a node failure (even if the
node would just reload)


166	      recalculation of the BIFT.  When the routing underlay utilizes FRR
167	      mechanisms, its forwarding capabilities are restored well before
168	      reconvergence is completed.  To benefit from the rapid restoration

<minor> perhaps s/reconvergence/control plane reconvergence 

172	   *  LFA-based BIER-FRR: This approach reroutes BIER traffic to
173	      alternative neighbors in the event of a failure.  It applies the
174	      principles of IP-FRR, requiring that LFAs are also BFRs.  Normal
175	      BIER-LFAs can be reached without tunneling, remote BIER-LFAs

<major> Please provide a reference or explanation of "normal BIER-LFAs". Did
you mean RFC5286? Same goes for the other types - please provide references

563	   NBR itself.  Consequently, the backup path with link protection
564	   cannot protect against the failure of the primary BFR-NBR..

<nit> Please remove extra "." I saw a few other similar instances in the document

770	   with the backup action applied for that IP-LFA at the IP layer.  A
771	   normal IP-LFA corresponds to the backup action Plain, a remote IP-LFA
772	   to Tunnel, and a TI-IP-LFA to Explicit.

<minor> Is that IP-TI-LFA ? Same Q for TI-BIER-LFA.

840	   *  TI-BIER-LFAs

842	      -  They complement the protection coverage of normal and remote
843	         BIER-LFAs to achieve 100% coverage.

<major> Isn't that 100% theoretical? Practically, there are limits of platform
and implementations. Also, all routers should be BFRs.


875	6.2.5.  Link Protection

877	   In the following, LFA-based BIER-FRR with link protection is

<nit> In the following ? ... perhaps "In this subsection," ?

1056	7.1.  Comparison of LFA-Based Protection for IP-FRR and BIER-FRR

<major> References to respective RFCs related to different types of LFA/FRR
unicast mechanisms would be helpful in this section as well.

<EoRv08>
Mike Bishop
No Objection
Comment (2025-06-04 for -08) Sent
Two minor observations: 

There appear to be a few superfluous references in this document. Please review and see whether there's additional text required or references that can be dropped:

- RFC2119 boilerplate is present and RFC2119 is referenced, but there don't appear to be any of the referenced terms present in the document.
- I-D.chen-bier-egress-protect is in the references, but not used in the text.

In 3.3, a space is missing: "[RFC5880]session" => "[RFC5880] session"
Mohamed Boucadair
No Objection
Comment (2025-05-27 for -08) Sent
Hi Huaimo, Mike, Steffen, Michael, Aijun, and Gyan,

Thank you for the effort put into this specification. 

Please find some comments below:

# Main comments

## Lack of Operations considerations

The analysis can be strengthened by analyzing the deployment/ops implications of the options discussed in the spec. I noted that there are very few deployment pre-requisites (e.g., 6.2.1), though.

Also, some of the analyzed approach have implications on forwarding path stretch that is worth discussed vs. service objectives.

See rfc8279#section-7 for how this is handled for the base BIER spec.

## Leverage existing frameworks/discussions

For example, I was expecting a discussion about which matters from RFC7916 can be leveraged. 

Also, have a discussion whether the proposed approaches are immune against micro loops (or at least call guards, if any); see for example RFC8333. Such discussion is also meant to back early claims in the document such as “minimizing packet loss and service disruption”.

# Misc.

## Routing underly 

Please cite rfc8279#section-4.1 early in the document

## Encap over the routing underlay

Seems to always assume one single underly, while the base spec has this right:

   If multiple routing underlays are used in a single BIER domain, each
   BIER sub-domain MUST be associated with a single routing underlay
   (though multiple sub-domains may be associated with the same routing
   underlay).

## There are many controllers in networks

Please consider s/the controller/a controller, through the doc

## Deployment-specific

OLD:
   that BIER often carries multicast traffic with real-time
             ^^^^^^^^^^^^
   requirements, there is a particular need to protect BIER traffic
   against prolonged outages following failures.

NEW:
   that BIER may carry multicast traffic with real-time
   requirements, there is a particular need to protect BIER traffic
   against prolonged outages following failures.

## IP-FRR/”Normal” BIER-LFA

CURRENT:
      alternative neighbors in the event of a failure.  It applies the
      principles of IP-FRR, requiring that LFAs are also BFRs.  Normal
      BIER-LFAs can be reached without tunneling, remote BIER-LFAs

### Please cite an authoritative reference for I-FRR

### What is meant by “Normal BIER-LFAs”?

## Network layer

CURRENT:
   A BFR-NBR is considered directly connected if it is a next-hop at the
   network layer,

There is no such layer in the base spec. Please use consistent concepts.

## Packets are forwarded

OLD: that the packet is not routed through

NEW: that the packet is not forwarded through

## One or multiple backups

CURRENT:
   *  Backup Forwarding Bit Mask (BF-BM)

   *  Backup BFR Neighbor (BBFR-NBR)

There is only one backup? Or multiple entries can be used for multiple backups? How this is expected to work?

## BEA flag

CURRENT:
  The BEA flag indicates whether the backup forwarding
   entry is currently active.   

How is this set? Can this be managed by a controller such the one mentioned in the introduction?

## Derived? 

CURRENT:
   The primary forwarding action is not explicitly stated in the BIFT as
   it is derived from the BFR-NBR.   

What does that mean?

## Desired level

CURRENT:
   The values
   for the BBFR-NBR and the BFA depend on the desired level of
   protection and the chosen backup strategy.  

How these are supplied to an implementation?

## BFD Extension

CURRENT:
   If
   the primary BFR-NBR is indirectly connected, a Bidirectional
   Forwarding Detection (BFD) [RFC5880] session between the BFR as PLR
   and the BFR-NBR may be used to monitor its reachability.

Do we need draft-ietf-bier-bfd or only the base BFD is sufficient here?

## Figures are actually tables through the doc.

## Not sure what is the value of Section 5? Maybe point to similar discussion in, e.g., Overview and Principles of Internet Traffic Engineering (RFC 9522).

Cheers,
Med
Andy Newton
No Record
Deb Cooley
No Record
Mahesh Jethanandani
No Record
Orie Steele
No Record
Paul Wouters
No Record