Skip to main content

Multicast Using Bit Index Explicit Replication (BIER)
draft-ietf-bier-architecture-08

Revision differences

Document history

Date Rev. By Action
2017-11-14
08 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2017-11-07
08 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2017-10-26
08 (System) RFC Editor state changed to RFC-EDITOR from AUTH
2017-10-26
08 (System) RFC Editor state changed to AUTH from EDIT
2017-10-05
08 Tero Kivinen Closed request for Telechat review by SECDIR with state 'No Response'
2017-10-02
08 (System) IANA Action state changed to No IC from In Progress
2017-10-02
08 (System) IANA Action state changed to In Progress
2017-10-02
08 (System) RFC Editor state changed to EDIT
2017-10-02
08 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2017-10-02
08 (System) Announcement was received by RFC Editor
2017-10-02
08 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2017-10-02
08 Amy Vezza IESG has approved the document
2017-10-02
08 Amy Vezza Closed "Approve" ballot
2017-10-02
08 Amy Vezza Ballot writeup was changed
2017-10-02
08 Amy Vezza Ballot approval text was generated
2017-09-28
08 Cindy Morgan IESG state changed to Approved-announcement to be sent from IESG Evaluation
2017-09-27
08 Ben Campbell [Ballot comment]
I agree with other comments that the architecture document should describe the experiment.
2017-09-27
08 Ben Campbell Ballot comment text updated for Ben Campbell
2017-09-27
08 Adam Roach
[Ballot comment]
Not wishing to re-litigate any of the previous discussions (for which I was not available), I have reviewed only the deltas between -07 …
[Ballot comment]
Not wishing to re-litigate any of the previous discussions (for which I was not available), I have reviewed only the deltas between -07 and -08. I have no objection to the changed and new material.
2017-09-27
08 Adam Roach [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach
2017-09-27
08 Mirja Kühlewind
[Ballot comment]
Update:
While it is now clearer why this doc is not informational, I agree with the gen-art review (Thanks Dan!) that is could …
[Ballot comment]
Update:
While it is now clearer why this doc is not informational, I agree with the gen-art review (Thanks Dan!) that is could be made even clearer what the experiment is/why this is experimental and not PS.

Old ballot text:
I also initially expected that this document should be informational because it specifies an architecture, however, while reading I realized that is rather specifies abstract mechanisms and a data model. So it's basically an abstract protocol spec without defining the on the wire format. Maybe it would be helpful to describe the content of this document this way, rather than speaking of an architecture. However, I guess the word architecture is rather board though.

Thanks for a well-written doc; especially the ECMP part is very clear!
2017-09-27
08 Mirja Kühlewind Ballot comment text updated for Mirja Kühlewind
2017-09-27
08 Mirja Kühlewind
[Ballot comment]
I also initially expected that this document should be informational because it specifies an architecture, however, while reading I realized that is rather …
[Ballot comment]
I also initially expected that this document should be informational because it specifies an architecture, however, while reading I realized that is rather specifies abstract mechanisms and a data model. So it's basically an abstract protocol spec without defining the on the wire format. Maybe it would be helpful to describe the content of this document this way, rather than speaking of an architecture. However, I guess the word architecture is rather board though.

Thanks for a well-written doc; especially the ECMP part is very clear!
2017-09-27
08 Mirja Kühlewind Ballot comment text updated for Mirja Kühlewind
2017-09-25
08 Spencer Dawkins
[Ballot comment]
Just asking for my own understanding ...

In this text,

  If, at some time, the routing underlay is not providing a loop …
[Ballot comment]
Just asking for my own understanding ...

In this text,

  If, at some time, the routing underlay is not providing a loop free
  path between BFIR-A and BFER-B, then BIER encapsulated packets may
  loop while traveling from BFIR-A to BFER-B.  However, such loops will
  never result in delivery of duplicate packets to BFER-B.

I'm assuming that these loops could result in out of order delivery of packets to BFER-B?

No document change requested, of course. And either answer is fine.
2017-09-25
08 Spencer Dawkins Ballot comment text updated for Spencer Dawkins
2017-09-25
08 Spencer Dawkins
[Ballot comment]
Not asking except for my own understanding ...

In this text,

  If, at some time, the routing underlay is not providing a …
[Ballot comment]
Not asking except for my own understanding ...

In this text,

  If, at some time, the routing underlay is not providing a loop free
  path between BFIR-A and BFER-B, then BIER encapsulated packets may
  loop while traveling from BFIR-A to BFER-B.  However, such loops will
  never result in delivery of duplicate packets to BFER-B.

I'm assuming that these loops could result in out of order delivery of packets to BFER-B?

No document change requested, of course. And either answer is fine.
2017-09-25
08 Spencer Dawkins Ballot comment text updated for Spencer Dawkins
2017-09-25
08 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2017-09-20
08 Tero Kivinen Request for Telechat review by SECDIR is assigned to Klaas Wierenga
2017-09-20
08 Tero Kivinen Request for Telechat review by SECDIR is assigned to Klaas Wierenga
2017-09-20
08 (System) IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2017-09-20
08 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Services Operator has reviewed draft-ietf-bier-architecture-08, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Services Operator has reviewed draft-ietf-bier-architecture-08, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
IANA Services Specialist
2017-09-20
08 Alia Atlas IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead
2017-09-20
08 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2017-09-19
08 Dan Romascanu Request for Last Call review by GENART Completed: Ready. Reviewer: Dan Romascanu. Sent review to list.
2017-09-14
08 Jean Mahoney Request for Last Call review by GENART is assigned to Dan Romascanu
2017-09-14
08 Jean Mahoney Request for Last Call review by GENART is assigned to Dan Romascanu
2017-09-13
08 Cindy Morgan
The following Last Call announcement was sent out (ends 2017-09-20):

From: The IESG
To: IETF-Announce
CC: Greg Shepherd , gjshep@gmail.com, bier@ietf.org, draft-ietf-bier-architecture@ietf.org, …
The following Last Call announcement was sent out (ends 2017-09-20):

From: The IESG
To: IETF-Announce
CC: Greg Shepherd , gjshep@gmail.com, bier@ietf.org, draft-ietf-bier-architecture@ietf.org, akatlas@gmail.com, bier-chairs@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (Multicast using Bit Index Explicit Replication) to Experimental RFC


The IESG has received a request from the Bit Indexed Explicit Replication WG
(bier) to consider the following document: - 'Multicast using Bit Index
Explicit Replication'
  as Experimental RFC

This Last Call is on the technical changes between draft-ietf-bier-architecture-07
and draft-ietf-bier-architecture-08.  Specifically, this is specifying that each
encapsulation should specify its own default bitStringLength.

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2017-09-20. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


  This document specifies a new architecture for the forwarding of
  multicast data packets.  It provides optimal forwarding of multicast
  packets through a "multicast domain".  However, it does not require a
  protocol for explicitly building multicast distribution trees, nor
  does it require intermediate nodes to maintain any per-flow state.
  This architecture is known as "Bit Index Explicit Replication"
  (BIER).  When a multicast data packet enters the domain, the ingress
  router determines the set of egress routers to which the packet needs
  to be sent.  The ingress router then encapsulates the packet in a
  BIER header.  The BIER header contains a bitstring in which each bit
  represents exactly one egress router in the domain; to forward the
  packet to a given set of egress routers, the bits corresponding to
  those routers are set in the BIER header.  The procedures for
  forwarding a packet based on its BIER header are specified in this
  document.  Elimination of the per-flow state and the explicit tree-
  building protocols results in a considerable simplification.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-bier-architecture/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-bier-architecture/ballot/

The following IPR Declarations may be related to this I-D:

  https://datatracker.ietf.org/ipr/2624/
  https://datatracker.ietf.org/ipr/2439/
  https://datatracker.ietf.org/ipr/2986/
  https://datatracker.ietf.org/ipr/2987/
  https://datatracker.ietf.org/ipr/2447/
  https://datatracker.ietf.org/ipr/2512/





2017-09-13
08 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2017-09-13
08 Alia Atlas Last call was requested
2017-09-13
08 Alia Atlas IESG state changed to Last Call Requested from IESG Evaluation::AD Followup
2017-09-13
08 Alia Atlas Last call announcement was changed
2017-09-13
08 Alia Atlas Last call announcement was generated
2017-09-13
08 Alia Atlas Ballot has been issued
2017-09-13
08 Alia Atlas Ballot writeup was changed
2017-09-13
08 Alia Atlas Telechat date has been changed to 2017-09-28 from 2017-07-06
2017-09-13
08 Benoît Claise
[Ballot comment]
Next point moved from DISCUSS to COMMENT after the IESG telechat:
1. I want to come back to the experimental status.

I have …
[Ballot comment]
Next point moved from DISCUSS to COMMENT after the IESG telechat:
1. I want to come back to the experimental status.

I have seen Alia's reply:

    In the BIER Charter, work item 9 describes a document based on deployment
    experience that can justify moving the BIER work from Experimental to Standards
    Track.  When I chartered the WG, it wasn't clear whether it was merely a good idea
    or a good idea with enough motivations towards deployment that it is worth complicating
    the architecture at the narrow point of the IP hourglass.

From the writeup, it seems that the experiment is successful already:

    The vendors are being quite tight lipped about current implementations.
    Operator feedback indicates there are at least two implementations currently, with others in the works.
    There are currently five vendors collaborating on the work in the IETF.

However, I've not been following the specifications development and implementation to provide a definitive answer.

At the minimum, the document needs to describe what the criteria are for a successful experiment.
    Implementations (RFC7942?)?
    two interop implementations?
    hardware implementation?
    "deployment experience" (to cite the charter text)?
    impact analysis?
    something else?

The ideal BIER document for this explanation is this architecture doc.
A reference to the charter Item 9 would be a good start.

Examples:
https://tools.ietf.org/html/rfc7360#section-1.3
https://tools.ietf.org/html/rfc7499#section-2



-  Each BFR MUST be assigned a single "BFR-Prefix" for each sub-domain
  to which it belongs.  A BFR's BFR-Prefix MUST be an IP address
  (either IPv4 or IPv6) of the BFR.  It is RECOMMENDED that the
  BFR-prefix be a loopback address of the BFR.

Just one observation. Was thinking, so it's like an (OSPF) routerId, except that it's called a prefix.
Then I understood, reading further. It's not called a routerId because this address/prefix must be routable

- Was wondering. Is this mechanism only for multicast packets? What about anycast/unicast?
Some multicast packets would take BIER encap, while others packets would take a different encap
From a troubleshooting point of view, does it make sense (is it even allowed) to send non multicast traffic over BIER.
2017-09-13
08 Benoît Claise [Ballot Position Update] Position for Benoit Claise has been changed to No Objection from Discuss
2017-09-13
08 (System) Sub state has been changed to AD Followup from Revised ID Needed
2017-09-13
08 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2017-09-13
08 Eric Rosen New version available: draft-ietf-bier-architecture-08.txt
2017-09-13
08 (System) New version approved
2017-09-13
08 (System) Request for posting confirmation emailed to previous authors: Sam Aldrin , Andrew Dolganow , IJsbrand Wijnands , Tony Przygienda , Eric Rosen
2017-09-13
08 Eric Rosen Uploaded new revision
2017-07-22
07 Victor Kuarsingh Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Victor Kuarsingh.
2017-07-13
07 Tero Kivinen Closed request for Last Call review by SECDIR with state 'No Response'
2017-07-06
07 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2017-07-06
07 Benoît Claise
[Ballot discuss]
1. operations and management section
I'm sure there are such considerations:
    - configuration
    - sub-domain management
    - …
[Ballot discuss]
1. operations and management section
I'm sure there are such considerations:
    - configuration
    - sub-domain management
    - BFR-id management
    - adding new BFIR/BFER device to the domain
    - logging
    - troubleshooting
    - OAM
    - etc.

There are also two other management documents that should be referenced: chartered item 6 and 7.
There are some management sentences, from time to time, in the doc.
Ex: avoiding a second copy is an important from an operational point of view

  It is generally advantageous to assign the BFR-ids of a given sub-
  domain so that as many BFERs as possible can be represented in a
  single bit string.

  ...

  In order to minimize the number of copies that must be made of a
  given multicast packet, it is RECOMMENDED that the BFR-ids be
  assigned "densely" (see Section 2) from the numbering space...

    Btw, I guess you meant: assigned densely per subdomain, right?

What this "operations and management section" should contain is the points that operators, who will deploy this technology, have to pay attention to.
An architecture document is typically the first document people will read. RFC 5706 appendix A provide typical questions from an OPS point of view.
I understand that this is an experiment and you might not have all the answers at this point in time.
2017-07-06
07 Benoît Claise
[Ballot comment]
Next point moved from DISCUSS to COMMENT after the IESG telechat:
1. I want to come back to the experimental status.

I have …
[Ballot comment]
Next point moved from DISCUSS to COMMENT after the IESG telechat:
1. I want to come back to the experimental status.

I have seen Alia's reply:

    In the BIER Charter, work item 9 describes a document based on deployment
    experience that can justify moving the BIER work from Experimental to Standards
    Track.  When I chartered the WG, it wasn't clear whether it was merely a good idea
    or a good idea with enough motivations towards deployment that it is worth complicating
    the architecture at the narrow point of the IP hourglass.

From the writeup, it seems that the experiment is successful already:

    The vendors are being quite tight lipped about current implementations.
    Operator feedback indicates there are at least two implementations currently, with others in the works.
    There are currently five vendors collaborating on the work in the IETF.

However, I've not been following the specifications development and implementation to provide a definitive answer.

At the minimum, the document needs to describe what the criteria are for a successful experiment.
    Implementations (RFC7942?)?
    two interop implementations?
    hardware implementation?
    "deployment experience" (to cite the charter text)?
    impact analysis?
    something else?

The ideal BIER document for this explanation is this architecture doc.
A reference to the charter Item 9 would be a good start.

Examples:
https://tools.ietf.org/html/rfc7360#section-1.3
https://tools.ietf.org/html/rfc7499#section-2



-  Each BFR MUST be assigned a single "BFR-Prefix" for each sub-domain
  to which it belongs.  A BFR's BFR-Prefix MUST be an IP address
  (either IPv4 or IPv6) of the BFR.  It is RECOMMENDED that the
  BFR-prefix be a loopback address of the BFR.

Just one observation. Was thinking, so it's like an (OSPF) routerId, except that it's called a prefix.
Then I understood, reading further. It's not called a routerId because this address/prefix must be routable

- Was wondering. Is this mechanism only for multicast packets? What about anycast/unicast?
End of section 4 you have an example about MVPN over ingress/egress PEs.
Some multicast packets would take BIER encap, while others packets would take a different encap
From a troubleshooting point of view, does it make sense (is it even allowed) to send non multicast traffic over BIER.

Victor Kuarsing performed the OPS-DIR review, copied below. Discussion is ongoing.

First, there were no textual changes recommended as part of this
review.  The document seems to be well written and had undergone
previous review/updates.  Given the nature of this document, there are
limited operational specific points made as part of this review
however three points are noted for follow-up with the actors.


(1). Security Considerations


It was not 100% clear to the reviewer (me) if the use case of how the
BIER architecture (or guidance for future implementation) may avoid
certain DoS like activity from illegitimate neighbors (BFR-NBRs).  I
may have missed specific text which addresses the point made herein
(if so, please disregard my first point and please make reference
where it is addressed).  The concern is if a packet is introduced into
the system by a host (compromised perhaps) which fabricates packets
(may or may not have valid payload inside the BIER encapsulation) that
attempts to starve resources in the system.  One way of doing this
(which may require control plane access - maybe) would be to
set/create packets which forces additional replication at BFRs (i.e.
set a single  - or all bits -  for all SIs).  This would then create
the maximum amount of replication within the system.  Perhaps this use
case is addressed as noted.


I was no able to find specific operations/functions which scrutinized
incoming packets and/or guard for bad NBRs.  Could this be an issue
from the authors standpoint?  In more traditional networks, there are
methods operators use to ensure that illegitimate traffic is not
introduced into the system.  I wanted to make sure there was thoughts
on how to do this with BIER.


(2). SPF assumed.


I agree most places where the BIER architecture would likely live (say
in Enterprises and SP networks) the network would operate a standard
IGP.  However, in some use cases, like modern DCs, some are designing
fabrics which don’t use a traditional IGP.  These networks use all BGP
(eBGP) with full sets of neighbor relationships.  This helps reduce
the amount of running protocols within the underlay, but may (or may
not) cause issues with BIER in relation distribution of system
information.  Do the authors consider this use case one that can be
address with BIER as it’s currently outlined, or would additional
considerations be needed?


I reviewed the “draft-ietf-bier-use-cases” document and did not see
text that specifically help or hinder the operational mode I described
above.


(3) Broadcast Video Operation. (more of a question then a point of note)


I did noticed in the use case document (as noted above in point 2),
that considers more traditional broadcast video networks was
described.  So my question is, would an operational model which
required two simultaneous M/C flows from separate sources (normally
two packagers/encryptors etc) be supported by the BIER architecture as
described?  My best estimate would be that the operator would use two
sub-domains that would allow each BFER to potentially get two of each
packet (which are sourced by two different injection points / BIFRs).
This mode of operation is common in some places to allow the M/C
broadcast feed to be “pinned” to the egress router/device to allow for
fast switchover in case of network failure (where normal network level
detection and re-routing is not sufficient).
2017-07-06
07 Benoît Claise Ballot comment and discuss text updated for Benoit Claise
2017-07-06
07 Benoît Claise
[Ballot discuss]
1. I want to come back to the experimental status.

I have seen Alia's reply:

    In the BIER Charter, work item …
[Ballot discuss]
1. I want to come back to the experimental status.

I have seen Alia's reply:

    In the BIER Charter, work item 9 describes a document based on deployment
    experience that can justify moving the BIER work from Experimental to Standards
    Track.  When I chartered the WG, it wasn't clear whether it was merely a good idea
    or a good idea with enough motivations towards deployment that it is worth complicating
    the architecture at the narrow point of the IP hourglass.

From the writeup, it seems that the experiment is successful already:

    The vendors are being quite tight lipped about current implementations.
    Operator feedback indicates there are at least two implementations currently, with others in the works.
    There are currently five vendors collaborating on the work in the IETF.

However, I've not been following the specifications development and implementation to provide a definitive answer.

At the minimum, the document needs to describe what the criteria are for a successful experiment.
    Implementations (RFC7942?)?
    two interop implementations?
    hardware implementation?
    "deployment experience" (to cite the charter text)?
    impact analysis?
    something else?

The ideal BIER document for this explanation is this architecture doc.
A reference to the charter Item 9 would be a good start.

Examples:
https://tools.ietf.org/html/rfc7360#section-1.3
https://tools.ietf.org/html/rfc7499#section-2

2. operations and management section
I'm sure there are such considerations:
    - configuration
    - sub-domain management
    - BFR-id management
    - adding new BFIR/BFER device to the domain
    - logging
    - troubleshooting
    - OAM
    - etc.

There are also two other management documents that should be referenced: chartered item 6 and 7.
There are some management sentences, from time to time, in the doc.
Ex: avoiding a second copy is an important from an operational point of view

  It is generally advantageous to assign the BFR-ids of a given sub-
  domain so that as many BFERs as possible can be represented in a
  single bit string.

  ...

  In order to minimize the number of copies that must be made of a
  given multicast packet, it is RECOMMENDED that the BFR-ids be
  assigned "densely" (see Section 2) from the numbering space...

    Btw, I guess you meant: assigned densely per subdomain, right?

What this "operations and management section" should contain is the points that operators, who will deploy this technology, have to pay attention to.
An architecture document is typically the first document people will read. RFC 5706 appendix A provide typical questions from an OPS point of view.
I understand that this is an experiment and you might not have all the answers at this point in time.
2017-07-06
07 Benoît Claise
[Ballot comment]
-  Each BFR MUST be assigned a single "BFR-Prefix" for each sub-domain
  to which it belongs.  A BFR's BFR-Prefix MUST be an …
[Ballot comment]
-  Each BFR MUST be assigned a single "BFR-Prefix" for each sub-domain
  to which it belongs.  A BFR's BFR-Prefix MUST be an IP address
  (either IPv4 or IPv6) of the BFR.  It is RECOMMENDED that the
  BFR-prefix be a loopback address of the BFR.

Just one observation. Was thinking, so it's like an (OSPF) routerId, except that it's called a prefix.
Then I understood, reading further. It's not called a routerId because this address/prefix must be routable

- Was wondering. Is this mechanism only for multicast packets? What about anycast/unicast?
End of section 4 you have an example about MVPN over ingress/egress PEs.
Some multicast packets would take BIER encap, while others packets would take a different encap
From a troubleshooting point of view, does it make sense (is it even allowed) to send non multicast traffic over BIER.

Victor Kuarsing performed the OPS-DIR review, copied below. Discussion is ongoing.

First, there were no textual changes recommended as part of this
review.  The document seems to be well written and had undergone
previous review/updates.  Given the nature of this document, there are
limited operational specific points made as part of this review
however three points are noted for follow-up with the actors.


(1). Security Considerations


It was not 100% clear to the reviewer (me) if the use case of how the
BIER architecture (or guidance for future implementation) may avoid
certain DoS like activity from illegitimate neighbors (BFR-NBRs).  I
may have missed specific text which addresses the point made herein
(if so, please disregard my first point and please make reference
where it is addressed).  The concern is if a packet is introduced into
the system by a host (compromised perhaps) which fabricates packets
(may or may not have valid payload inside the BIER encapsulation) that
attempts to starve resources in the system.  One way of doing this
(which may require control plane access - maybe) would be to
set/create packets which forces additional replication at BFRs (i.e.
set a single  - or all bits -  for all SIs).  This would then create
the maximum amount of replication within the system.  Perhaps this use
case is addressed as noted.


I was no able to find specific operations/functions which scrutinized
incoming packets and/or guard for bad NBRs.  Could this be an issue
from the authors standpoint?  In more traditional networks, there are
methods operators use to ensure that illegitimate traffic is not
introduced into the system.  I wanted to make sure there was thoughts
on how to do this with BIER.


(2). SPF assumed.


I agree most places where the BIER architecture would likely live (say
in Enterprises and SP networks) the network would operate a standard
IGP.  However, in some use cases, like modern DCs, some are designing
fabrics which don’t use a traditional IGP.  These networks use all BGP
(eBGP) with full sets of neighbor relationships.  This helps reduce
the amount of running protocols within the underlay, but may (or may
not) cause issues with BIER in relation distribution of system
information.  Do the authors consider this use case one that can be
address with BIER as it’s currently outlined, or would additional
considerations be needed?


I reviewed the “draft-ietf-bier-use-cases” document and did not see
text that specifically help or hinder the operational mode I described
above.


(3) Broadcast Video Operation. (more of a question then a point of note)


I did noticed in the use case document (as noted above in point 2),
that considers more traditional broadcast video networks was
described.  So my question is, would an operational model which
required two simultaneous M/C flows from separate sources (normally
two packagers/encryptors etc) be supported by the BIER architecture as
described?  My best estimate would be that the operator would use two
sub-domains that would allow each BFER to potentially get two of each
packet (which are sourced by two different injection points / BIFRs).
This mode of operation is common in some places to allow the M/C
broadcast feed to be “pinned” to the egress router/device to allow for
fast switchover in case of network failure (where normal network level
detection and re-routing is not sufficient).
2017-07-06
07 Benoît Claise [Ballot Position Update] New position, Discuss, has been recorded for Benoit Claise
2017-07-06
07 Suresh Krishnan [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan
2017-07-06
07 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2017-07-06
07 Mirja Kühlewind
[Ballot comment]
I also initially expected that this document should be informational because it specifies an architecture, however, will reading I realized that is rather …
[Ballot comment]
I also initially expected that this document should be informational because it specifies an architecture, however, will reading I realized that is rather specifies abstract mechanisms and a data model. So it's basically an abstract protocol spec without defining the on the wire format. Maybe it would be helpful to describe the content of this document this way, rather than speaking of an architecture. However, I guess the word architecture is rather board though.

Thanks for a well-written doc; especially the ECMP part is very clear!
2017-07-06
07 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2017-07-05
07 Terry Manderson [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson
2017-07-05
07 Warren Kumari
[Ballot comment]
[ After response from Alia I'm clearing my discuss. I still somewhat feel that an Architecture document which discusses an experimental protocol / …
[Ballot comment]
[ After response from Alia I'm clearing my discuss. I still somewhat feel that an Architecture document which discusses an experimental protocol / idea doesn't need to be Experimental itself, but a: I don't feel it very strongly / could be wrong, and b: her "I did discuss with the BIER WG that it is possible to do a status update to move a
document from Experimental to Proposed Standard without needing to update the RFC." makes me happy.  I'm copying my original discuss comment below for hysterical raisins. ] 


Notes:
Section 1:
"If the packet also needs to be sent to a BFER whose BFR-id is 257, the BFIR would have to create a second copy of the packet, and the BIER encapsulation would specify an SI of 1, and a BitString with bit 1 set and all the other bits clear." - while reading this it seemed to me that it would be much simpler to do away with the SI completely and just make the BitString N bits longer (instead of having e.g a one octet SI and 2 octet BitString, concatenate this and have a 3 octet BitString). It was only when I got down to Section 3 that I discovered that this is (kinda) discussed, and that each SI can have a different BitString length. I'd suggest adding a refernce (like: "and a BitString with bit 1 set and all the other bits clear (see Section 3 for more details)."

Section 4.1.  The Routing Underlay:
"Alternatively, one could deploy a routing underlay that creates a multicast-specific tree of some sort, perhaps a Steiner tree."
A reference for Steiner trees would be nice -- best I could find was probably the WA page at: Weisstein, Eric W. "Steiner Tree." From MathWorld--A Wolfram Web Resource. http://mathworld.wolfram.com/SteinerTree.html
Please note: I'd pay good money for a router doing Steiner optimizations using the soap and surface tension trick.

Nits and notes:
1: " A router that supports BIER is known as a "Bit-Forwarding Router" (BFR)." -- this makes me sad; the BFR acronym was already in use, and had interesting history behind it (Big er... Fast Router) - http://photos.kumari.net/Technology/Networking/i-k4vCdwv/A

2: "MVPN signaling also has several components that depend on the
  type of "tunneling technology" used to carry multicast data though
  the network." -- though the network what?! I suspect you meant "through" :-)
3: Section 6.1.  Overview
"If a BFR receives a BIER-encapsulated packet whose sub-domain, SI and BitString identify that BFR itself, ..." -- identifies.

O: "When BIER on a BFER is to pass a packet to the multicast flow overlay, it of course decapsulates..."
P: "When BIER on a BFER is to pass a packet to the multicast flow overlay, it, of course decapsulates"
C: Missing a comma. I suspect: "When BIER on a BFER is to pass a packet to the multicast flow overlay, it decapsulates..." would be even better.

Section 6.9.  When Some Nodes do not Support BIER
"In this section, we assume that the routing underlay is an SPF-based IGP that computes a shortest path tree from each node to all other nodes in the domain."
C: I *think* that this should actually be "the shortest path", but I'm not sure; everything talks about e.g Dijkstra's algorithm finding the shortest path, but what if there are multiple equal cost paths? But, this is a singular tree, but may not be unique, so any SP tree will... erk... Good this this is a nit and I can move on :-)


Section 6.10.3.  Transitioning from One BitStringLength to Another
Typo:  Dispostion ->  Disposition



------ ORIGINAL DISCUSS TEXT ----
I agree with Ben, but feel more strongly than him - why is this Experimental? Where is the experiment / how do you determine if it is successful? The shepherd writeup says: "(1) Experimental, as per charter. The document title page header indicates experimental. ", but this doesn't really answer the question; the charter says:
"BIER is initially chartered to do experimental work on this new
multicast forwarding mechanism as follows:

1) BIER architecture: The WG will publish an architecture, based
upon draft-wijnands-bier-architecture-04...."

I really think that this document should be Informational or PS, or something.
I can understand the *work* to be experimental in nature, but the document *itself* seems like it shouldn't be - it doesn't (really) explain how to implement.

I'm making this a DISCUSS, but am more than happy to clear if the chairs / AD says that the've considered this and Experimental really is best.
2017-07-05
07 Warren Kumari [Ballot Position Update] Position for Warren Kumari has been changed to No Objection from Discuss
2017-07-05
07 Warren Kumari
[Ballot discuss]
I agree with Ben, but feel more strongly than him - why is this Experimental? Where is the experiment / how do you …
[Ballot discuss]
I agree with Ben, but feel more strongly than him - why is this Experimental? Where is the experiment / how do you determine if it is successful? The shepherd writeup says: "(1) Experimental, as per charter. The document title page header indicates experimental. ", but this doesn't really answer the question; the charter says:
"BIER is initially chartered to do experimental work on this new
multicast forwarding mechanism as follows:

1) BIER architecture: The WG will publish an architecture, based
upon draft-wijnands-bier-architecture-04...."

I really think that this document should be Informational or PS, or something.
I can understand the *work* to be experimental in nature, but the document *itself* seems like it shouldn't be - it doesn't (really) explain how to implement.

I'm making this a DISCUSS, but am more than happy to clear if the chairs / AD says that the've considered this and Experimental really is best.
2017-07-05
07 Warren Kumari
[Ballot comment]
Notes:
Section 1:
"If the packet also needs to be sent to a BFER whose BFR-id is 257, the BFIR would have to …
[Ballot comment]
Notes:
Section 1:
"If the packet also needs to be sent to a BFER whose BFR-id is 257, the BFIR would have to create a second copy of the packet, and the BIER encapsulation would specify an SI of 1, and a BitString with bit 1 set and all the other bits clear." - while reading this it seemed to me that it would be much simpler to do away with the SI completely and just make the BitString N bits longer (instead of having e.g a one octet SI and 2 octet BitString, concatenate this and have a 3 octet BitString). It was only when I got down to Section 3 that I discovered that this is (kinda) discussed, and that each SI can have a different BitString length. I'd suggest adding a refernce (like: "and a BitString with bit 1 set and all the other bits clear (see Section 3 for more details)."

Section 4.1.  The Routing Underlay:
"Alternatively, one could deploy a routing underlay that creates a multicast-specific tree of some sort, perhaps a Steiner tree."
A reference for Steiner trees would be nice -- best I could find was probably the WA page at: Weisstein, Eric W. "Steiner Tree." From MathWorld--A Wolfram Web Resource. http://mathworld.wolfram.com/SteinerTree.html
Please note: I'd pay good money for a router doing Steiner optimizations using the soap and surface tension trick.

Nits and notes:
1: " A router that supports BIER is known as a "Bit-Forwarding Router" (BFR)." -- this makes me sad; the BFR acronym was already in use, and had interesting history behind it (Big er... Fast Router) - http://photos.kumari.net/Technology/Networking/i-k4vCdwv/A

2: "MVPN signaling also has several components that depend on the
  type of "tunneling technology" used to carry multicast data though
  the network." -- though the network what?! I suspect you meant "through" :-)
3: Section 6.1.  Overview
"If a BFR receives a BIER-encapsulated packet whose sub-domain, SI and BitString identify that BFR itself, ..." -- identifies.

O: "When BIER on a BFER is to pass a packet to the multicast flow overlay, it of course decapsulates..."
P: "When BIER on a BFER is to pass a packet to the multicast flow overlay, it, of course decapsulates"
C: Missing a comma. I suspect: "When BIER on a BFER is to pass a packet to the multicast flow overlay, it decapsulates..." would be even better.

Section 6.9.  When Some Nodes do not Support BIER
"In this section, we assume that the routing underlay is an SPF-based IGP that computes a shortest path tree from each node to all other nodes in the domain."
C: I *think* that this should actually be "the shortest path", but I'm not sure; everything talks about e.g Dijkstra's algorithm finding the shortest path, but what if there are multiple equal cost paths? But, this is a singular tree, but may not be unique, so any SP tree will... erk... Good this this is a nit and I can move on :-)


Section 6.10.3.  Transitioning from One BitStringLength to Another
Typo:  Dispostion ->  Disposition
2017-07-05
07 Warren Kumari [Ballot Position Update] New position, Discuss, has been recorded for Warren Kumari
2017-07-05
07 Alissa Cooper
[Ballot comment]
I'm a bit confused about the experimental status of this document as well, given that the other WG drafts that define protocol extensions …
[Ballot comment]
I'm a bit confused about the experimental status of this document as well, given that the other WG drafts that define protocol extensions to support BIER seem to be headed for the standards track. If what is documented here really is the only experimental part, this seems like the place to document the experiment.
2017-07-05
07 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2017-07-05
07 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2017-07-03
07 Ben Campbell
[Ballot comment]
It's not clear why this is experimental. What is the purpose or nature of the experiment? What does one hope to learn from …
[Ballot comment]
It's not clear why this is experimental. What is the purpose or nature of the experiment? What does one hope to learn from the results?

The document seems to go well beyond what I think of as architecture. Please consider clarifying that in the title and intro.
2017-07-03
07 Ben Campbell [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell
2017-07-03
07 Jonathan Hardwick Request for Last Call review by RTGDIR Completed: Has Nits. Reviewer: Susan Hares.
2017-07-01
07 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov
2017-06-29
07 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2017-06-29
07 Alia Atlas IESG state changed to IESG Evaluation from Waiting for Writeup
2017-06-29
07 Alia Atlas Ballot has been issued
2017-06-29
07 Alia Atlas [Ballot Position Update] New position, Yes, has been recorded for Alia Atlas
2017-06-29
07 Alia Atlas Created "Approve" ballot
2017-06-29
07 Alia Atlas Ballot writeup was changed
2017-06-29
07 (System) IESG state changed to Waiting for Writeup from In Last Call
2017-06-26
07 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2017-06-26
07 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Services Operator has reviewed draft-ietf-bier-architecture-06.txt, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Services Operator has reviewed draft-ietf-bier-architecture-06.txt, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
IANA Services Specialist
PTI
2017-06-25
07 Dan Romascanu Request for Last Call review by GENART Completed: Ready with Issues. Reviewer: Dan Romascanu. Sent review to list.
2017-06-24
07 Tero Kivinen Request for Last Call review by SECDIR is assigned to David Waltermire
2017-06-24
07 Tero Kivinen Request for Last Call review by SECDIR is assigned to David Waltermire
2017-06-22
07 Jean Mahoney Request for Last Call review by GENART is assigned to Dan Romascanu
2017-06-22
07 Jean Mahoney Request for Last Call review by GENART is assigned to Dan Romascanu
2017-06-21
07 Eric Rosen New version available: draft-ietf-bier-architecture-07.txt
2017-06-21
07 (System) New version approved
2017-06-21
07 (System) Request for posting confirmation emailed to previous authors: Sam Aldrin , Andrew Dolganow , IJsbrand Wijnands , Tony Przygienda , Eric Rosen
2017-06-21
07 Eric Rosen Uploaded new revision
2017-06-21
06 Min Ye Request for Last Call review by RTGDIR is assigned to Susan Hares
2017-06-21
06 Min Ye Request for Last Call review by RTGDIR is assigned to Susan Hares
2017-06-19
06 Min Ye Request for Last Call review by RTGDIR is assigned to Hannes Gredler
2017-06-19
06 Min Ye Request for Last Call review by RTGDIR is assigned to Hannes Gredler
2017-06-19
06 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Victor Kuarsingh
2017-06-19
06 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Victor Kuarsingh
2017-06-15
06 Cindy Morgan IANA Review state changed to IANA - Review Needed
2017-06-15
06 Cindy Morgan
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC: Greg Shepherd , gjshep@gmail.com, bier@ietf.org, draft-ietf-bier-architecture@ietf.org, akatlas@gmail.com, …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC: Greg Shepherd , gjshep@gmail.com, bier@ietf.org, draft-ietf-bier-architecture@ietf.org, akatlas@gmail.com, bier-chairs@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (Multicast using Bit Index Explicit Replication) to Experimental RFC


The IESG has received a request from the Bit Indexed Explicit Replication WG
(bier) to consider the following document: - 'Multicast using Bit Index
Explicit Replication'
  as Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2017-06-29. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


  This document specifies a new architecture for the forwarding of
  multicast data packets.  It provides optimal forwarding of multicast
  packets through a "multicast domain".  However, it does not require a
  protocol for explicitly building multicast distribution trees, nor
  does it require intermediate nodes to maintain any per-flow state.
  This architecture is known as "Bit Index Explicit Replication"
  (BIER).  When a multicast data packet enters the domain, the ingress
  router determines the set of egress routers to which the packet needs
  to be sent.  The ingress router then encapsulates the packet in a
  BIER header.  The BIER header contains a bitstring in which each bit
  represents exactly one egress router in the domain; to forward the
  packet to a given set of egress routers, the bits corresponding to
  those routers are set in the BIER header.  Elimination of the per-
  flow state and the explicit tree-building protocols results in a
  considerable simplification.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-bier-architecture/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-bier-architecture/ballot/

The following IPR Declarations may be related to this I-D:

  https://datatracker.ietf.org/ipr/2624/
  https://datatracker.ietf.org/ipr/2439/
  https://datatracker.ietf.org/ipr/2986/
  https://datatracker.ietf.org/ipr/2987/
  https://datatracker.ietf.org/ipr/2447/
  https://datatracker.ietf.org/ipr/2512/





2017-06-15
06 Cindy Morgan IESG state changed to In Last Call from Last Call Requested::Revised I-D Needed
2017-06-15
06 Alia Atlas Last call was requested
2017-06-15
06 Alia Atlas IESG state changed to Last Call Requested::Revised I-D Needed from Last Call Requested
2017-06-15
06 Alia Atlas Last call was requested
2017-06-15
06 Alia Atlas Last call announcement was generated
2017-06-15
06 Alia Atlas Ballot approval text was generated
2017-06-15
06 Alia Atlas Ballot writeup was generated
2017-06-15
06 Alia Atlas
First, I would like to thank the authors - Ice, Eric, Andrew, Tony, and Sam - for an excellently written and very clear document which …
First, I would like to thank the authors - Ice, Eric, Andrew, Tony, and Sam - for an excellently written and very clear document which forms the foundation for this technology. I wish I saw many more drafts with this level of clarity, thought, and details.  I would also like to thank the BIER WG for the reviews and discussions that have led to this quality.

As is customary, I have done my AD review.  I do have a few minor issues that need to be resolved, but I am comfortable requesting that the IETF Last Call start immediately, with the assumption that the excellent & responsive authors will resolve these issues and issue an updated draft quite rapidly.

My goal is to have this document on the IESG telechat of July 7 so that it will either be in the RFC Editor queue or the WG will be aware of any issues before IETF 99.

Minor:

1) Sec 4.1: "its BFR prefix"  Is it possible to have multiple BFR prefixes for the same BFR?  I am thinking about renumbering cases (for acquisitions) as well as migrations from IPv4 to IPv4 + IPv6 and then to IPv6.  Conceptually, I see no reason that there couldn't be multiple BFR prefixes for the same BFR as long as they really are that BFR's prefixes. 

2) Sec 4.2: This is missing the procedures for removing the BIER header for the payload - which would presumably include potential details such as TTL inheritance and DSCP/EXP handling....

3) Sec 6.5:  This has a block of "pseudocode", but it isn't surrounded by the  and  indications.  Those are useful because there are different copyright terms for code in RFCs versus the text of RFCs.  It would be worth taking a look at the difference and deciding whether using  and  would be useful.

4) Sec 6.6.1:"At BFER-D, the BIFT entry (not pictured) for BFR-id 1 will specify an
  F-BM of 0000 and a BFR-NBR of BFR-D itself."
Sec 6.6.2: "At BFER-D, the BIFT entry (not pictured) for BFR-id 1 will specify an
  F-BM of 0000 and a BFR-NBR of BFR-D itself."  and "At BFER-E, the BIFT entry (not pictured) for BFR-id 3 will specify an F-BM of 0000 and a BFR-NBR of BFR-E itself."
I don't understand why the F-BM would be 0000 and not 0001 nor how the packet's BitString would end up cleared if the F-BM were 0000.  I suspect a typo, but it is repeated thrice...  I will note that in Sec 6.5 after the pseudocode, it says " It also assumes that the corresponding F-BM has only one bit set, the bit representing the BFER itself."  which appears to contradict the two examples.

5) Sec 6.9:"This may be as simple as finding the IGP unicast next hop to the child node, and pushing on (above the BIER-MPLS label advertised by the child) the MPLS label that the IGP next hop has bound to an address of the child node.  (If
  for some reason the unicast tunnel cannot be an MPLS tunnel, any
  other kind of tunnel can be used, as long as it is possible to
  encapsulate MPLS within that kind of tunnel.)"
Given the generalization of the BIER encapsulation & possibility of IPv6 encapsulations & that a BIER-MPLS label hasn't been introduced,  could this be rephrased a bit more generally?  The concept, obviously, is fine.
The same applies to "That way, the TTL of the BIER-MPLS label constrains only the number of BFRs that the packet may traverse, not the total number of hops."
which could easily be rewritten as "...the TTL of the BIER header constrains..."

6) Sec 10.2.1: "This fallback procedure will work best if the value of F is
  established by the architecture, rather than by provisioning."  Since this is the
architecture and it does specify that all BFRs must support a BitStringLength of 256 - surely this is exactly the point to establish the value of F and there isn't a better time. :-)

Nit:

a) End of Section 3:"An encapsulation for use in MPLS networks is described in
  [MPLS_BIER_ENCAPS]"
Given that encap is also now a generic encapsulation that will work for Ethernet, this statement could be expanded to be more complete.

b) Sec 4.3: "Since BIER is, in effect, a new type of "tunneling
  technology", some extensions to the MVPN signaling are needed in
  order to properly interface the multicast flow overlay with the BIER
  layer.  These will be specified in a companion document."
I think that this is draft-ietf-bier-mvpn, so it'd be helpful to have an informative reference to it.
2017-06-15
06 Alia Atlas IESG state changed to Last Call Requested from Publication Requested
2017-06-15
06 Alia Atlas Placed on agenda for telechat - 2017-07-06
2017-06-15
06 Alia Atlas Requested Last Call review by RTGDIR
2017-06-14
06 Greg Shepherd
(1) Experimental, as per charter. The document title page header indicates experimental.
(2)
Technical Summary:
This document specifies a new architecture for the forwarding of …
(1) Experimental, as per charter. The document title page header indicates experimental.
(2)
Technical Summary:
This document specifies a new architecture for the forwarding of multicast data packets.  It provides optimal forwarding of multicast data packets through a "multicast domain".  However, it does not require the use of a protocol for explicitly building multicast distribution trees, and it does not require intermediate nodes to maintain any per-flow state.  This architecture is known as "Bit Index Explicit Replication" (BIER).
Working Group Summary:
Working group showed solid consensus for this document. The relevant point of contention was only around the charter?s current direction for this work to be submitted on the Experimental track. Feedback from the AD indicated that there is a path to transition from Experimental to Standards track if there in consensus to do so in the future. When a multicast data packet enters the domain, the ingress router determines the set of egress routers to which the packet needs to be sent.  The ingress router then encapsulates the packet in a BIER header.  The BIER header contains a bitstring in which each bit represents exactly one egress router in the domain; to forward the packet to a given set of egress routers, the bits corresponding to those routers are set in the BIER header.  Elimination of the per-flow state and the explicit tree-building protocols results in a considerable simplification.
Document Quality:
The vendors are being quite tight lipped about current implementations. Operator feedback indicates there are at least two implementations currently, with others in the works. There are currently five vendors collaborating on the work in the IETF. There is no MIB doctor or other expert review outside of the active working group members
Personnel:
Document Shepherd: Greg Shepherd gjshep@gmail.com
Area Director: Alia Atlas akatlas@gmail.com
(3) This document reached consensus in Working Group Last Call to progress to the IESG.
(4) No concerns
(5) This work is viewed as being considerably valuable. It does however describe a new forwarding plane, and therefore has drawn the necessary attention to vet the proposed solution as part of the Internet Architecture.
(6) No concerns
(7) All authors have confirmed IPR disclosures.
(8) All authors confirmed on the email list that any relevant IPR disclosures have been filed in reference to this docmument.
(9) The WG as a whole understands and agrees.
(10) No appeals.
(11) No nits.
(12) No formal review required.
(13) All references correctly documented.
(14) All normative references are existing RFCs.
(15) No downward normative references.
(16) This document does not change the status of any existing RFCs
(17) This document contains no actions for IANA.
(18) This document contains no actions for IANA.
(19) XML nit tool returns with no errors.

2017-06-14
06 Greg Shepherd Responsible AD changed to Alia Atlas
2017-06-14
06 Greg Shepherd IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2017-06-14
06 Greg Shepherd IESG state changed to Publication Requested
2017-06-14
06 Greg Shepherd IESG process started in state Publication Requested
2017-06-14
06 Greg Shepherd Changed consensus to Yes from Unknown
2017-06-14
06 Greg Shepherd Changed document writeup
2017-06-14
06 Greg Shepherd Notification list changed to Greg Shepherd <gjshep@gmail.com>
2017-06-14
06 Greg Shepherd Document shepherd changed to Greg Shepherd
2017-06-14
06 Greg Shepherd Shepherd document complete. Undergoing WG/AD review before submission.
2017-06-14
06 Greg Shepherd Tag Doc Shepherd Follow-up Underway set.
2017-06-14
06 Greg Shepherd IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document
2017-06-14
06 Greg Shepherd Intended Status changed to Experimental from None
2017-04-24
06 Eric Rosen New version available: draft-ietf-bier-architecture-06.txt
2017-04-24
06 (System) New version approved
2017-04-24
06 (System) Request for posting confirmation emailed to previous authors: Sam Aldrin , Andrew Dolganow , IJsbrand Wijnands , Eric Rosen , Tony Przygienda , bier-chairs@ietf.org
2017-04-24
06 Eric Rosen Uploaded new revision
2017-04-21
Jasmine Magallanes Posted related IPR disclosure: Cisco's Statement about IPR related to draft-ietf-bier-architecture
2017-04-21
Jasmine Magallanes Posted related IPR disclosure: Cisco's Statement about IPR related to draft-ietf-bier-architecture
2016-10-28
05 Eric Rosen New version available: draft-ietf-bier-architecture-05.txt
2016-10-28
05 (System) New version approved
2016-10-28
04 (System) Request for posting confirmation emailed to previous authors: "Andrew Dolganow" , "Eric Rosen" , "Tony Przygienda" , "IJsbrand Wijnands" , "Sam Aldrin" , bier-chairs@ietf.org
2016-10-28
04 Eric Rosen Uploaded new revision
2016-07-18
04 Eric Rosen New version available: draft-ietf-bier-architecture-04.txt
2016-01-19
03 Eric Rosen New version available: draft-ietf-bier-architecture-03.txt
2015-07-29
02 Eric Rosen New version available: draft-ietf-bier-architecture-02.txt
2015-07-07
Naveen Khan Posted related IPR disclosure: Juniper Networks, Inc.'s Statement about IPR related to draft-ietf-bier-architecture
2015-06-25
01 Eric Rosen New version available: draft-ietf-bier-architecture-01.txt
2015-04-27
00 Greg Shepherd This document now replaces draft-wijnands-bier-architecture instead of None
2015-04-27
00 Eric Rosen New version available: draft-ietf-bier-architecture-00.txt