< draft-pfister-bier-mld-02.txt   draft-pfister-bier-mld-03.txt >
Network Working Group P. Pfister Network Working Group P. Pfister
Internet-Draft IJ. Wijnands Internet-Draft IJ. Wijnands
Intended status: Standards Track S. Venaas Intended status: Standards Track S. Venaas
Expires: May 4, 2017 Cisco Systems Expires: September 10, 2017 Cisco Systems
C. Wang
Z. Zhang
ZTE Corporation
M. Stenberg M. Stenberg
October 31, 2016 March 9, 2017
BIER Ingress Multicast Flow Overlay using Multicast Listener Discovery BIER Ingress Multicast Flow Overlay using Multicast Listener Discovery
Protocols Protocols
draft-pfister-bier-mld-02 draft-pfister-bier-mld-03
Abstract Abstract
This document specifies the ingress part of a multicast flow overlay This document specifies the ingress part of a multicast flow overlay
for BIER networks. Using existing multicast listener discovery for BIER networks. Using existing multicast listener discovery
protocols, it enables multicast membership information sharing from protocols, it enables multicast membership information sharing from
egress routers, acting as listeners, toward ingress routers, acting egress routers, acting as listeners, toward ingress routers, acting
as queriers. Ingress routers keep per-egress-router state, used to as queriers. Ingress routers keep per-egress-router state, used to
construct the BIER bit mask associated with IP multicast packets construct the BIER bit mask associated with IP multicast packets
entering the BIER domain. entering the BIER domain.
skipping to change at page 1, line 39 skipping to change at page 1, line 42
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 4, 2017. This Internet-Draft will expire on September 10, 2017.
Copyright Notice Copyright Notice
Copyright (c) 2016 IETF Trust and the persons identified as the Copyright (c) 2017 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . 3
4. Applicability Statement . . . . . . . . . . . . . . . . . . . 4 4. Applicability Statement . . . . . . . . . . . . . . . . . . . 4
5. Querier and Listener Specifications . . . . . . . . . . . . . 4 5. Querier and Listener Specifications . . . . . . . . . . . . . 4
5.1. Configuration Parameters . . . . . . . . . . . . . . . . 4 5.1. Configuration Parameters . . . . . . . . . . . . . . . . 5
5.2. MLDv2 instances. . . . . . . . . . . . . . . . . . . . . 5 5.2. MLDv2 instances. . . . . . . . . . . . . . . . . . . . . 5
5.2.1. Sending Queries . . . . . . . . . . . . . . . . . . . 5 5.2.1. Sending Queries . . . . . . . . . . . . . . . . . . . 6
5.2.2. Sending Reports . . . . . . . . . . . . . . . . . . . 6 5.2.2. Sending Reports . . . . . . . . . . . . . . . . . . . 6
5.2.3. Receiving Queries . . . . . . . . . . . . . . . . . . 6 5.2.3. Receiving Queries . . . . . . . . . . . . . . . . . . 6
5.2.4. Receiving Reports . . . . . . . . . . . . . . . . . . 7 5.2.4. Receiving Reports . . . . . . . . . . . . . . . . . . 7
5.3. Packet Forwarding . . . . . . . . . . . . . . . . . . . . 7 5.3. Packet Forwarding . . . . . . . . . . . . . . . . . . . . 7
6. Security Considerations . . . . . . . . . . . . . . . . . . . 7 6. Security Considerations . . . . . . . . . . . . . . . . . . . 7
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 8 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 8
8.1. Normative References . . . . . . . . . . . . . . . . . . 8 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 8
8.2. Informative References . . . . . . . . . . . . . . . . . 8 9.1. Normative References . . . . . . . . . . . . . . . . . . 8
Appendix A. Acknowledgements . . . . . . . . . . . . . . . . . . 9 9.2. Informative References . . . . . . . . . . . . . . . . . 9
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 Appendix A. BIER Use Case in Data Centers . . . . . . . . . . . 9
A.1. Convention and Terminology . . . . . . . . . . . . . . . 11
A.2. BIER in data centers . . . . . . . . . . . . . . . . . . 11
A.3. A BIER MLD solution for Virtual Network information . . . 12
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 13
1. Introduction 1. Introduction
The Bit Index Explicit Replication (BIER - The Bit Index Explicit Replication (BIER -
[I-D.ietf-bier-architecture]) forwarding technique enables IP [I-D.ietf-bier-architecture]) forwarding technique enables IP
multicast transport across a BIER domain. When receiving or multicast transport across a BIER domain. When receiving or
originating a packet, ingress routers have to construct a bit mask originating a packet, ingress routers have to construct a bit mask
indicating which BIER egress routers located within the same BIER indicating which BIER egress routers located within the same BIER
domain will receive the packet. A stateless approach would consist domain will receive the packet. A stateless approach would consist
in forwarding all incoming packets toward all egress routers, which in forwarding all incoming packets toward all egress routers, which
skipping to change at page 8, line 9 skipping to change at page 8, line 20
o Redirect undesired traffic toward the spoofed router by o Redirect undesired traffic toward the spoofed router by
subscribing to undesired multicast traffic. subscribing to undesired multicast traffic.
o Prevent desired multicast traffic from reaching the spoofed router o Prevent desired multicast traffic from reaching the spoofed router
by unsubscribing to some desired multicast traffic. by unsubscribing to some desired multicast traffic.
7. IANA Considerations 7. IANA Considerations
This specification does not require any action from IANA. This specification does not require any action from IANA.
8. References 8. Acknowledgements
8.1. Normative References Comments concerning this document are very welcome.
9. References
9.1. Normative References
[RFC2113] Katz, D., "IP Router Alert Option", RFC 2113, [RFC2113] Katz, D., "IP Router Alert Option", RFC 2113,
DOI 10.17487/RFC2113, February 1997, DOI 10.17487/RFC2113, February 1997,
<http://www.rfc-editor.org/info/rfc2113>. <http://www.rfc-editor.org/info/rfc2113>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997, DOI 10.17487/RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>. <http://www.rfc-editor.org/info/rfc2119>.
skipping to change at page 8, line 38 skipping to change at page 9, line 5
Discovery Version 2 (MLDv2) for IPv6", RFC 3810, Discovery Version 2 (MLDv2) for IPv6", RFC 3810,
DOI 10.17487/RFC3810, June 2004, DOI 10.17487/RFC3810, June 2004,
<http://www.rfc-editor.org/info/rfc3810>. <http://www.rfc-editor.org/info/rfc3810>.
[I-D.ietf-bier-architecture] [I-D.ietf-bier-architecture]
Wijnands, I., Rosen, E., Dolganow, A., Przygienda, T., and Wijnands, I., Rosen, E., Dolganow, A., Przygienda, T., and
S. Aldrin, "Multicast using Bit Index Explicit S. Aldrin, "Multicast using Bit Index Explicit
Replication", draft-ietf-bier-architecture-05 (work in Replication", draft-ietf-bier-architecture-05 (work in
progress), October 2016. progress), October 2016.
8.2. Informative References 9.2. Informative References
[RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6
(IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460, (IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460,
December 1998, <http://www.rfc-editor.org/info/rfc2460>. December 1998, <http://www.rfc-editor.org/info/rfc2460>.
[RFC2711] Partridge, C. and A. Jackson, "IPv6 Router Alert Option", [RFC2711] Partridge, C. and A. Jackson, "IPv6 Router Alert Option",
RFC 2711, DOI 10.17487/RFC2711, October 1999, RFC 2711, DOI 10.17487/RFC2711, October 1999,
<http://www.rfc-editor.org/info/rfc2711>. <http://www.rfc-editor.org/info/rfc2711>.
[RFC3306] Haberman, B. and D. Thaler, "Unicast-Prefix-based IPv6 [RFC3306] Haberman, B. and D. Thaler, "Unicast-Prefix-based IPv6
Multicast Addresses", RFC 3306, DOI 10.17487/RFC3306, Multicast Addresses", RFC 3306, DOI 10.17487/RFC3306,
August 2002, <http://www.rfc-editor.org/info/rfc3306>. August 2002, <http://www.rfc-editor.org/info/rfc3306>.
[RFC4301] Kent, S. and K. Seo, "Security Architecture for the [RFC4301] Kent, S. and K. Seo, "Security Architecture for the
Internet Protocol", RFC 4301, DOI 10.17487/RFC4301, Internet Protocol", RFC 4301, DOI 10.17487/RFC4301,
December 2005, <http://www.rfc-editor.org/info/rfc4301>. December 2005, <http://www.rfc-editor.org/info/rfc4301>.
[RFC5015] Handley, M., Kouvelas, I., Speakman, T., and L. Vicisano,
"Bidirectional Protocol Independent Multicast (BIDIR-
PIM)", RFC 5015, DOI 10.17487/RFC5015, October 2007,
<http://www.rfc-editor.org/info/rfc5015>.
[RFC7348] Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger,
L., Sridhar, T., Bursell, M., and C. Wright, "Virtual
eXtensible Local Area Network (VXLAN): A Framework for
Overlaying Virtualized Layer 2 Networks over Layer 3
Networks", RFC 7348, DOI 10.17487/RFC7348, August 2014,
<http://www.rfc-editor.org/info/rfc7348>.
[RFC7365] Lasserre, M., Balus, F., Morin, T., Bitar, N., and Y.
Rekhter, "Framework for Data Center (DC) Network
Virtualization", RFC 7365, DOI 10.17487/RFC7365, October
2014, <http://www.rfc-editor.org/info/rfc7365>.
[RFC7761] Fenner, B., Handley, M., Holbrook, H., Kouvelas, I., [RFC7761] Fenner, B., Handley, M., Holbrook, H., Kouvelas, I.,
Parekh, R., Zhang, Z., and L. Zheng, "Protocol Independent Parekh, R., Zhang, Z., and L. Zheng, "Protocol Independent
Multicast - Sparse Mode (PIM-SM): Protocol Specification Multicast - Sparse Mode (PIM-SM): Protocol Specification
(Revised)", STD 83, RFC 7761, DOI 10.17487/RFC7761, March (Revised)", STD 83, RFC 7761, DOI 10.17487/RFC7761, March
2016, <http://www.rfc-editor.org/info/rfc7761>. 2016, <http://www.rfc-editor.org/info/rfc7761>.
Appendix A. Acknowledgements Appendix A. BIER Use Case in Data Centers
Comments concerning this document are very welcome. In current data center virtualization, virtual eXtensible Local Area
Network (VXLAN) [RFC7348] is a kind of network virtualization overlay
technology which is overlaid between NVEs and is intended for multi-
tenancy data center networks, whose reference architecture is
illustrated as per Figure 1.
+--------+ +--------+
| Tenant +--+ +----| Tenant |
| System | | (') | System |
+--------+ | ................ ( ) +--------+
| +-+--+ . . +--+-+ (_)
| | NVE|--. .--| NVE| |
+--| | . . | |---+
+-+--+ . . +--+-+
/ . .
/ . L3 Overlay . +--+-++--------+
+--------+ / . Network . | NVE|| Tenant |
| Tenant +--+ . .--| || System |
| System | . . +--+-++--------+
+--------+ ................
Figure 1: NVO3 Architecture
And there are two kinds of most common methods about how to forward
BUM packets in this virtualization overlay network. One is using PIM
as underlay multicast routing protocol to build explicit multicast
distribution tree, such as PIM-SM [RFC7761] or PIM-BIDIR [RFC5015]
multicast routing protocol. Then, when BUM packets arrive at NVE, it
requires NVE to have a mapping between the VXLAN Network Identifier
and the IP multicast group. According to the mapping, NVE can
encapsulate BUM packets in a multicast packet which group address is
the mapping IP multicast group address and steer them through
explicit multicast distribution tree to the destination NVEs. This
method has two serious drawbacks. It need the underlay network
supports complicated multicast routing protocol and maintains
multicast related per-flow state in every transit nodes. What is
more, how to configure the ratio of the mapping between VNI and IP
multicast group is also an issue. If the ratio is 1:1, there should
be 16M multicast groups in the underlay network at maximum to map to
the 16M VNIs, which is really a significant challenge for the data
center devices. If the ratio is n:1, it would result in inefficiency
bandwidth utilization which is not optimal in data center networks.
The other method is using ingress replication to require each NVE to
create a mapping between the VXLAN Network Identifier and the remote
addresses of NVEs which belong to the same virtual network. When NVE
receives BUM traffic from the attached tenant, NVE can encapsulate
these BUM packets in unicast packets and replicate them and tunnel
them to different remote NVEs respectively. Although this method can
eliminate the burden of running multicast protocol in the underlay
network, it has a significant disadvantage: large waste of bandwidth,
especially in big-sized data center where there are many receivers.
BIER [I-D.ietf-bier-architecture] is an architecture that provides
optimal multicast forwarding through a "BIER domain" without
requiring intermediate routers to maintain any multicast related per-
flow state. BIER also does not require any explicit tree-building
protocol for its operation. A multicast data packet enters a BIER
domain at a "Bit-Forwarding Ingress Router" (BFIR), and leaves the
BIER domain at one or more "Bit-Forwarding Egress Routers" (BFERs).
The BFIR router adds a BIER header to the packet. The BIER header
contains a bit-string in which each bit represents exactly one BFER
to forward the packet to. The set of BFERs to which the multicast
packet needs to be forwarded is expressed by setting the bits that
correspond to those routers in the BIER header. Specifically, for
BIER-TE, the BIER header may also contain a bit-string in which each
bit indicates the link the flow passes through.
The following sub-sections try to propose how to take full advantage
of overlay multicast protocol to carry virtual network information,
and create a mapping between the virtual network information and the
bit-string to implement BUM services in data centers.
A.1. Convention and Terminology
The terms about NVO3 are defined in [RFC7365]. The most common
terminology used in this appendix is listed below.
NVE: Network Virtualization Edge, which is the entity that
implements the overlay functionality. An NVE resides at the
boundary between a Tenant System and the overlay network.
VXLAN: Virtual eXtensible Local Area Network
VNI: VXLAN Network Identifier
Virtal Network Context Identifier: Field in an overlay encapsulation
header that identifies the specific VN the packet belongs to.
A.2. BIER in data centers
This section tries to describe how to use BIER as an optimal scheme
to forward the broadcast, unknown and multicast (BUM) packets when
they arrive at the ingress NVE in data centers.
The principle of using BIER to forward BUM traffic is that: firstly,
it requires each ingress NVE to have a mapping between the Virtual
Network Context Identifier and the bit-string in which each bit
represents exactly one egress NVE to forward the packet to. And
then, when receiving the BUM traffic, the BFIR/Ingree NVE maps the
receiving BUM traffic to the mapping bit-string, encapsulates the
BIER header, and forwards the encapsulated BUM traffic into the BIER
domain to the other BFERs/Egress NVEs indicated by the bit-string.
Furthermore, as for how each ingress NVE knows the other egress NVEs
that belong to the same virtual network and creates the mapping is
the main issue discussed below. Basically, BIER Multicast Listener
Discovery is an overlay solution to support ingress routers to keep
per-egress-router state to construct the BIER bit-string associated
with IP multicast packets entering the BIER domain. The following
section tries to extend BIER MLD to carry virtual network
information(such as Virtual Network Context identifier), and
advertise them between NVEs. When each NVE receive these
information, they create the mapping between the virtual network
information and the bit-string representing the other NVEs belonged
to the same virtual network.
A.3. A BIER MLD solution for Virtual Network information
The BIER MLD solution allows having multiple MLD instances by having
unique pairs of BMLD Nodes and BMLD Querier addresses for each
instance. Assume for now that we have a unique instance per VNI and
that all BMLD routers are using the same mapping between VNIs and
BMLD address pairs. Also for each VNI there is a multicast group
used for encapsulation of BUM traffic over BIER. This group may
potentially be shared by some or all of the VNIs.
Each NVE acquires the Virtual Network information, and advertises
this Virtual Network information to other NVEs through the MLD
messages. For a given VNI it sends BMLD reports to the BMLD nodes
address used for that VNI, for the group used for delivering BUM
traffic for that VNI. This allows all NVE routers to know which
other NVE routers have interest in BUM traffic for a particular VNI.
If one attached virtual network is migrated, the NVE will withdraw
the Virtual Network information by sending an unsolicited BMLD
report. Note that NVEs also respond to periodic queries to BMLD
Nodes addresses corresponding to VNIs for which they have interest.
When ingress NVE receives the Virtual Network information
advertisement message, it builds a mapping between the receiving
Virtual Network Context Identifier in this message and the bit-string
in which each bit represents one egress NVE who sends the same
Virtual Network information. Subsequently, once this ingress NVE
receives some other MLD advertisements which include the same Virtual
Network information from some other NVEs , it updates the bit-string
in the mapping and adds the corresponding sending NVE to the updated
bit-string. Once the ingress NVE removes one virtual network, it
will delete the mapping corresponding to this virtual network as well
as send withdraw message to other NVEs.
After finishing the above interaction of MLD messages, each ingress
NVE knows where the other egress NVEs are in the same virtual
network. When receiving BUM traffic from the attached virtual
network, each ingress NVE knows exactly how to encapsulate this
traffic and where to forward them to.
This can be used in both IPv4 network and IPv6 network. In IPv4,
IGMP protocol does the similar extension for carrying Virtual Network
information TLV in Version 2 membership report message.
Note that it is possible to have multiple VNIs map to the same pair
of BMLD addresses. Provided VNIs that map to the same BMLD address
uses different multicast groups for encapsulation, this is not a
problem, because each instance is tracking interest for each
multicast group separately. If multiple VNIs map to the same pair
and the multicast group used is not unique, some NVEs may receive BUM
traffic for which they are not interested. An NVE would drop packets
for an unknown VNI, but it means wasting some bandwidth and
processing. This is similar to the non-BIER case where there is not
a unique multicast group for encapsulation. The improvement offered
by using BMLD is by using multiple instance, hence reducing the
problems caused by using the same transport group for multiple VNIs.
Authors' Addresses Authors' Addresses
Pierre Pfister Pierre Pfister
Cisco Systems Cisco Systems
Paris Paris
France France
Email: pierre.pfister@darou.fr Email: pierre.pfister@darou.fr
skipping to change at page 9, line 35 skipping to change at page 14, line 4
Email: pierre.pfister@darou.fr Email: pierre.pfister@darou.fr
IJsbrand Wijnands IJsbrand Wijnands
Cisco Systems Cisco Systems
De Kleetlaan 6a De Kleetlaan 6a
Diegem 1831 Diegem 1831
Belgium Belgium
Email: ice@cisco.com Email: ice@cisco.com
Stig Venaas Stig Venaas
Cisco Systems Cisco Systems
Tasman Drive Tasman Drive
San Jose, CA 95134 San Jose, CA 95134
USA USA
Email: stig@cisco.com Email: stig@cisco.com
Cui(Linda) Wang
ZTE Corporation
No.50 Software Avenue, Yuhuatai District
Nanjing, CA
China
Email: wang.cui1@zte.com.cn
Zheng(Sandy) Zhang
ZTE Corporation
No.50 Software Avenue, Yuhuatai District
Nanjing, CA
China
Email: zhang.zheng@zte.com.cn
Markus Stenberg Markus Stenberg
Helsinki 00930 Helsinki 00930
Finland Finland
Email: markus.stenberg@iki.fi Email: markus.stenberg@iki.fi
 End of changes. 16 change blocks. 
18 lines changed or deleted 232 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/