forked from mmcbride7/bier-v6-requirements
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathdraft-ietf-bier-ipv6-requirements-04.xml
606 lines (512 loc) · 29.1 KB
/
draft-ietf-bier-ipv6-requirements-04.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="std" docName="draft-ietf-bier-ipv6-requirements-03"
ipr="trust200902">
<front>
<title abbrev="BIER IPv6 Requirements">BIER IPv6 Requirements</title>
<author fullname="Mike McBride" initials="M" surname="McBride">
<organization>Futurewei</organization>
<address>
<email>michael.mcbride@futurewei.com</email>
</address>
</author>
<author fullname="Jingrong Xie" initials="J" surname="Xie">
<organization>Huawei</organization>
<address>
<email>xiejingrong@huawei.com</email>
</address>
</author>
<author fullname="Senthil Dhanaraj" initials="S" surname="Dhanaraj">
<organization>Huawei</organization>
<address>
<email>senthil.dhanaraj@huawei.com</email>
</address>
</author>
<author fullname="Rajiv Asati" initials="R" surname="Asati">
<organization>Cisco</organization>
<address>
<email>rajiva@cisco.com</email>
</address>
</author>
<author fullname="Yongqing Zhu" initials="Y" surname="Zhu">
<organization>China Telecom</organization>
<address>
<email>zhuyq8@chinatelecom.cn</email>
</address>
</author>
<date day="7" month="January" year="2020"/>
<abstract>
<t>The BIER WG includes, in its charter, work on developing mechanisms
to transport BIER natively in IPv6. This document is intended to help the WG with this
effort by specifying requirements for transporting packets, with Bit
Index Explicit Replication (BIER) headers, in an IPv6 environment. There
will be a need to send IPv6 payloads, to multiple IPv6 destinations,
using BIER. There have been several proposed solutions in this area. But
there hasn't been a document which describes the problem and lists the
requirements. The goal of this document is to describe the BIER IPv6
requirements, summarize the proposed solutions, and guide the working group in
understanding the benefits, and drawbacks, of the various solutions and
to help in the development of acceptable solutions.</t>
</abstract>
</front>
<middle>
<section title="Introduction">
<t>Bit Index Explicit Replication (BIER) <xref target="RFC8279"/> is an
architecture that provides optimal multicast forwarding, without
requiring intermediate routers to maintain per-flow state, through the
use of a multicast-specific BIER header. <xref target="RFC8296"/>
defines two types of BIER encapsulation to run on physical links: one is
BIER MPLS encapsulation to run on various physical links that support
MPLS, the other is non-MPLS BIER Ethernet encapsulation to run on
ethernet links, with an ethertype 0xAB37. This document describes using
BIER in non-MPLS IPv6 environments. We explain the requirements of
transporting IPv4/IPv6 multicast payloads, from an IPv6 router (BFIR) to
multicast IPv6 destinations (BFERs), using BIER. This can include native
IPv6 encapsulation and generic tunneling. Native IPv6, in this document,
is defined as BIER not encapsulated in mpls or ethernet. The goal of this document is
to help the BIER WG evaluate the BIER v6 requirements and solutions in order
to begin adopting solution drafts.</t>
<section anchor="requirements-language" title="Requirements Language">
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref
target="RFC2119">RFC 2119</xref>.</t>
</section>
<section anchor="terminology" title="Terminology">
<t><list style="symbols">
<t>BIER: Bit Index Explicit Replication. Provides optimal
multicast forwarding through adding a BIER header and removing
state in intermediate routers.</t>
<t>BUM: Broadcast, Unknown Unicast, Multicast. Term used to
describe the three types of Ethernet modes that will be forwarded
to multiple destinations</t>
</list></t>
</section>
</section>
<section title="Problem Statement">
<t>The problem is the ability of the network to transport BUM packets,
with BIER headers, in an IPv6 environment. In IPv6 networks, many
deployments use non-MPLS encapsulation for unicast as the
data-plane. In such case, it may be expected to have a BIER IPv6
encapsulation which is compliant with various kinds of physical links,
perhaps in a hop-by-hop manner, and maintain the benefit of "fast
reroute" of an IPv6 tunnel. Evaluating the BIER IPv6 requirements will
help determine the best solutions to address these problems.</t>
</section>
<section title="BIER IPv6 Scenario's">
<t><figure align="center">
<artwork><![CDATA[
+--------------------------------------------+
| |
| +------+
| | BFER |
+------+ IPv6 +------+
| BFIR | |
+------+ Network +------+
| | BFER |
| +------+
| |
+--------------------------------------------+
]]></artwork>
</figure></t>
<t>This basic scenario depicts the need to replicate bier packets from a
BFIR to BFERs across an IPv6 core. The IPv6 environment may include a
variety of link types, may be entirely IPv6, may be dual stack or any
type of combination which includes IPv6. Regardless of the environment,
there are times when a BIER header, including the BIER bitstring used to
determine the set of BIER forwarding egress routers, will need to
traverse a IPv6 domain. The ways in which BIER will function in an IPv6
environment is the problem that needs to be solved. <xref
target="RFC8354"/> lists some good IPv6 related use cases which we will
similarly reference in this document.</t>
<section title="BIERv6 for Access Network">
<t>Access networks deliver a variety of types of multicast video
traffic from the service provider's network to the home (or
Enterprise) environment and from the home towards the service
provider's network.</t>
<t>There will be a need to send traffic from the IPv4 access towards
the service provider's IPv6 network and vice versa. A packet could be
mapped into a providers IPv6 network through the use of a BIERv6
header. The access devices would not need to know specific details
about the packet to perform this mapping; instead the access device
would only need to know how to process a BIER header unless there is
end to end IPv6.</t>
</section>
<section title="BIERv6 for Data Center">
<t>Some Data Center operators are transitioning their Data Center
infrastructure from IPv4 to native IPv6 only, in order to cope with
IPv4 address depletion and to achieve larger scale. In such
environment, BIERv6, can be used to natively steer multicast data
across an IPv6 data center. </t>
</section>
<section title="BIERv6 for Core Networks">
<t>While the overall amount of traffic offered to the network
continues to grow and considering that multiple types of traffic with
different characteristics and requirements are quickly converging over
single network architecture, the network operators are starting to
face new challenges.</t>
<t>Some operators are currently building, or plan to build in the near
future, an IPv6 only native infrastructure for their core network.
Having a native BIERv6 infrastructure will help maintain simplicity of
the network and reduce state versus traditional IP Multicast.</t>
</section>
</section>
<section title="Requirements">
<t>There have been several suggested requirements, on the BIER email
list and in meetings, which have been used to form BIER IPv6 requirements
used to help the wg evaluate against the proposed solutions:</t>
<section title="L2 Agnostic">
<t>The solution should be agnostic to the underlying L2 data link
type.</t>
</section>
<section title="Hop by hop SA or DA modification">
<t>The solution should not require hop-by-hop modification of the IP
source address field.</t>
<t>Solutions that do not require Hop-by-hop SA modification are preferred.
Solutions which maintain the SA will help fast-path forwarding (req 4.9 in this doc), are
beneficial for receiving notices from the BFIR for functions like BIER PING, TRACE and
MTU notification, are beneficial for identifying an MVPN instance to help remove more
encapsulation such as Service Label, are beneficial for SA filtering (req 4.6 in this doc),
and are beneficial for data origin authentication if IPSEC is desired (req 4.12 in this doc).</t>
<t>The solution should use a IPv6 unicast address in the DA to satisfy the BIER architecture
without introducing additional tunnel encapsulation, and thus may require DA
modification by each BFR hop.</t>
<t>It is commonly thought that BIERv6 could use a multicast
address, as BIER is one-hop replication on each BFR in normal
cases. However, as described in section 6.9 of [RFC8279], it is useful
to support non-BIER routers within a BIER domain. From the wg discussion
about this document, focus is on the advantages of using
unicast addresses that otherwise could not be possible by using a multicast
address or anycast address for two cases: replication from a BFR
to other BFR(s) connected by Layer-3 Non-BFR router(s) without using
tunneling techniques, and replication from a BFR to other BFR(s)
connected by Layer-2 switch(es) without broadcasting or snooping on
Layer-2 switch(es) in between. Based on the natural reachability of an
IPv6 unicast address, it can support the multi-hop replication cases
as well as the one-hop replication case using one encapsulation.</t>
</section>
<section title="L4 Inspection">
<t>The solution should not require the BFRs to inspect layer 4 or
require any changes to layer 4. </t>
<t>The proposals requiring BIER header encapsulated as part of the payload may conflict
with the layers of IP protocol stack. On the one hand, fast-path BIER forwarding has to be based
on the L4 inspection of the BIER header within the payload, and on the other hand, the BIER
forwarding needs to change the BitString in the BIER header of the payload, which in turn conflicts
with other L3 functions. Following are some examples.</t>
<t>One example is in IP fragmentation case, where a packet may need to be fragmented by a BFIR,
according to the BIER-MTU defined in RFC8296, into one packet with BIER header and 1500 bytes of
payload, and another packet with the remaining 500 bytes of payload. When BFR B receives the second
fragmentation packet from BFR A, BFR B can't forward this packet because BFR B doesn't have the
BIER header in the second fragmentation packet. Section 4.11 describes the fragmentation requirements.</t>
<t>The second example is in IPSEC case, where the BIER header is part of the payload for confidentiality
or integrity. The need to change the BitString in the BIER Header, when forwarding BIER packets, makes
it incompatible with IPSEC. Section 4.12 describes the IPSEC requirements.</t>
</section>
<section title="Multicast address in SA field">
<t>The solution should not allow a multicast address to be put in the
IP source address field. According to <xref target="RFC1112"/> "A host group address
must never be placed in the source address field or anywhere in a source route or record
route option of an outgoing IP datagram."
</t>
</section>
<section title="Incorrect bits">
<t>The solution should not assume that bits never get set incorrectly.</t>
<t>If a packet with incorrect bits is set, it should not damage BIERv6 functionality or any
other functions such as Unicast Reverse Path Forwarding (URPF), nor should it cause loops
or duplicates as described in section 6.8 of [RFC8279].</t>
</section>
<section title="SA filtering">
<t>The solution should not require changes in source address filtering
procedures. For instance if a host uses a "BIER address" as its source address in a given packet, and
the packet doesn't get dropped according to existing SA filtering procedures, the packet may elicit responses
that put the BIER address in their destination address fields. This could be a security issue, as it creates an attack vector
that can create 64 responses to a single probe. </t>
</section>
<section title="BIER architecture support">
<t>It should be possible to use the solution to support the entire BIER architecture. The ability to
bypass Non-BIER routers and L2 switches is part of the BIER architecture and
having this ability is a mandatory requirement.</t>
<t>Multiple sub-domains bound to one or many topologies or algorithms,
multiple sets for more BFERs, multiple Bit String Length for different forwarding capability, and
multiple BIFTs for ECMP should be supported.</t>
</section>
<section title="Simple Encapsulation">
<t>The solution should avoid requiring different encapsulation
types, or complex tunneling techniques, to support BIER as an E2E
multicast transport.</t>
<t>A single encapsulation should support Layer-2 switches within BFRs,
or non-BFR within a BIER domain, or inter-domain deployment of
BIER.</t>
</section>
<section title="Hardware fast path">
<t>The solution should enable the processing and forwarding of BIER
packets in hardware fast path.</t>
</section>
<section title="Conform to existing IPv6 Spec">
<t>The proposed encapsulation must conform to the IPv6 specification and
guidelines as described in RFC8200. It should not require any new modifications
to the IPv6 specification aside from extensions to existing mechanisms such as
IPv6 Options.</t>
</section>
<section title="Support Fragmentation">
<t>The proposed encapsulation must support fragmentation. It shouldn't require
fragmentation and re-assembly at each hop.</t>
</section>
<section title="Support IPv6 Security">
<t>The proposed encapsulation should support IPv6 security including AH/ESP
extension headers. It shouldn't require hop-by-hop encryption/decryption.</t>
</section>
</section>
<section title="Solutions Evaluation">
<t>The following are solutions that have been proposed to solve BIER in
IPv6 environments. Some solutions propose encoding while others propose
encapsulation. It is recommended for the wg to evaluate these solutions against
the requirements listed previously in order to make informed decisions on solution
readiness.</t>
<t>As illustrated in these examples, the BIER header, or the BitString,
may appear in the IPv6 Header, IPv6 Extension Header, IPv6 Payload, or
IPv6 Tunnel Packet:</t>
<section title="BIER-ETH encapsulation in IPv6 networks">
<t><figure>
<artwork align="left"><![CDATA[
+---------------+-----------------+-------------------
| Ethernet | BIER header | payload
| (ethType = | (BIFT-id, ...) |
| 0xAB37) | |
| | Next Header |
+---------------+-----------------+-------------------
]]></artwork>
</figure></t>
<t>BIER-ETH encapsulation (BIER header for Non-MPLS networks as
defined in <xref target="RFC8296"/>) can be used to transport the
multicast data in the IPv6 network by encapsulating the multicast user
data payload within the BIER-ETH header. However, using BIER-ETH in
IPv6 networks is not considered to be a native IPv6 solution which
utilizes the IPv6 header to forward the packet. Below listed are some
of the properties of BIER-ETH encapsulation which could be seen as the
reasons for the same,</t>
<t><list style="symbols">
<t>BIER-ETH is not agnostic to the underlying (L2) data link type.
It can be deployed only in the networks with Ethernet data link
and cannot be deployed in an network which deploys any other data
link types. Use of BIER-ETH in IPv6 networks might also result in
using different BIER encapsulations, when BIER is used as a E2E
multicast transport across a larger heterogeneous IPv6 networks
with different data link types used in different layers of the
network.</t>
<t>BIER-ETH in IPv6 networks is considered similar to 6PE solution
where-in the multicast user data packet is encapsulated with-in
the BIER-MPLS header. <list style="symbols">
<t>It is worth noting that the only major difference between
BIER-MPLS and BIER-Non-MPLS header is that BIER-MPLS uses
downstream assigned MPLS label while BIER-Non-MPLS header uses
a domain-wide-unique BIFT-id. While the use of
domain-wide-unique BIFT-id in BIER-ETH header takes away the
complexity of allocation and state maintenance from the
network, it still requires some sort of ID (similar to label)
to identify the application context after the decapsulation of
BIER header (example: MVPN VRF Label). Encoding of such an
ID/LABEL before encapsulating the multicast user data payload
with BIER-ETH header cannot be avoided.</t>
<t>The absence of an IPv6 header, and the optional IPv6
extension headers, deprives BIER of some of the useful cases
(ex: Use of IPv6 address for identification of network
function or service mapping) that is otherwise possible in
native IPv6 encapsulation which utilizes a IPv6 header.</t>
<t>Tunneling of BIER packets is one common technique used for
FRR, to tunnel over BIER incapable nodes etc. While it is
possible for the BIER-ETH encapsulated packet to be further
encapsulated within a GRE6, etc tunnel, it might not
be possible to parse and decapsulate different types of tunnel
headers and forward the BIER packet completely in hardware
fast path similar to the label stack processing in BIER-MPLS
networks. It would be useful to select an encapsulation which
could help in processing the tunnel and BIER header and make
the forwarding decision completely in hardware fast path,
which is lacking in BIER-ETH encapsulation if chosen to be
deployed in pure IPv6 networks.</t>
</list></t>
</list></t>
<t/>
</section>
<section title="Encode Bitstring in IPv6 destination address">
<t><figure>
<artwork align="left"><![CDATA[
+---------------+-------------------
| IPv6 header | payload
| (BitString in |
| DA lower bits)|
| Next Header |
+---------------+-------------------
]]></artwork>
</figure></t>
<t>As described in <xref target="I-D.pfister-bier-over-ipv6"/>, The
information required by BIER is stored in the destination IPv6
address. The BIER BitString is encoded in the low-order bits of the
IPv6 destination address of each packet. The high-order bits of the
IPv6 destination address are used by intermediate routers for unicast
forwarding, deciding whether a packet is a BIER packet, and if so, to
identify the BIER Sub-Domain, Set Identifier and BitString length. No
additional extension or encapsulation header is required. Instead of
encapsulating the packet in IPv6, the payload is attached to the BIER
IPv6 header and the IPv6 protocol number is set to the type of the
payload. If the payload is UDP, the UDP checksum needs to change when
the BitString in the IPv6 destination address changes.</t>
<t/>
</section>
<section title="Add BIER header into IPv6 Extension Header ">
<t><figure>
<artwork align="left"><![CDATA[
+---------------+-----------------+-------------------
| IPv6 header | IPv6 Ext header | payload
| | (BIER header in |
| | TLV Type = X) |
| Next Header | Next Header |
+---------------+-----------------+-------------------
]]></artwork>
</figure></t>
<t>According to <xref target="RFC8200"/> In IPv6, optional
internet-layer information is encoded in separate headers that may be
placed between the IPv6 header and the upper- layer header in a
packet. There is a small number of such extension headers, each one
identified by a distinct Next Header value. An IPv6 packet may carry
zero, one, or more extension headers, each identified by the Next
Header field of the preceding header. Extension headers (except for
the Hop-by-Hop Options header) are not processed, inserted, or deleted
by any node along a packet's delivery path, until the packet reaches
the node (or each of the set of nodes, in the case of multicast)
identified in the Destination Address field of the IPv6 header. The
Hop-by-Hop Options header is not inserted or deleted, but may be
examined or processed by any node along a packet's delivery path,
until the packet reaches the node (or each of the set of nodes, in the
case of multicast) identified in the Destination Address field of the
IPv6 header. The Hop-by-Hop Options header, when present, must
immediately follow the IPv6 header. Its presence is indicated by the
value zero in the Next Header field of the IPv6 header.</t>
<t>Two of the currently-defined extension headers are the Hop-by-Hop
Options header and the Destination Options header which carry a
variable number of type-length-value (TLV) encoded "options".</t>
<t/>
<t>In <xref target="I-D.xie-bier-ipv6-encapsulation"/> an IPv6 BIER
Destination Option is carried by the IPv6 Destination Option Header
(indicated by a Next Header value 60). It is initialized in a packet
sent by an IPv6 BFIR router to inform the following BFR routers in an
IPv6 BIER domain to replicate to destination BFER routers hop-by-hop.
BIER is generally a hop-by-hop and one-to-many architecture and it is
required for a BIER IPv6 encapsulation to include the BIER Header
([RFC8296]) as an IPv6 Extension Header, to pilot the hop-by-hop BIER
replication.</t>
<t>Hop by hop Options Headers may be considered. The Hop-by-Hop
Options header is used to carry optional information that may be
examined and processed by every node along a packet's delivery path.
The Hop-by-Hop Options header is identified by a Next Header value of
0 in the IPv6 header.</t>
<t>Defining New Extension Headers and Options may also be considered,
if the IPv6 Destination Option Header is not good enough and new
extension headers can solve the problem better.</t>
<t>Such proposals may include requests to IANA to allocate a "BIER
Option" code from "Destination Options and Hop-by-Hop Options", and/or
a "BIER Option Header" code from "IPv6 Extension Header Types".</t>
<t/>
</section>
<section title="Transport BIER as IPv6 payload">
<t><figure>
<artwork align="left"><![CDATA[
+---------------+-----------------+-------------------
| IPv6 header | IPv6 Ext header | BIER Hdr + payload
| | (optional) | as IPv6 payload
| | |
| Next Header | Next Header = X |
+---------------+-----------------+-------------------
]]></artwork>
</figure></t>
<t>There is a proposal for a transport-independent BIER encapsulation
header which is applicable regardless of the underlying transport
technology. As described in <xref target="I-D.xu-bier-encapsulation"/>
and <xref target="I-D.zhang-bier-bierin6"/>, the BIER header, and the
payload following it, can be combined as an IPv6 payload, and be
indicated by a new Upper-layer IPv6 Next-Header value. A unicast IPv6
destination address is used for the replication and changes when
replicating a packet out to a neighbor.</t>
<t>Such proposals may include a request to IANA to allocate an IPv6
Next-Header code from "Assigned Internet Protocol Numbers".</t>
<t/>
</section>
<section title="Tunneling BIER in a IPv6 tunnel">
<t><figure>
<artwork align="left"><![CDATA[
+---------------+-----------------+------------+----------------
| IPv6 header | IPv6 Ext header | GRE header |
| | (optional) | | BIER Hdr +
| | | | payload as GRE
| Next Header | Next Header | Proto = X | Payload
+---------------+-----------------+------------+----------------
]]></artwork>
</figure></t>
<t>A generic IPv6 Tunnel could be used to encapsulate the bier packet
within an IPv6 domain.</t>
<t>GRE is a mechanism by which any ethernet payload can be carried by
an IP GRE tunnel due to the 16-bits 'Protocol Type' field. Both IPv4
and IPv6 can be used to carry GRE. The Ethernet type codepoint 0xAB37,
defined for BIER, can be used in a GRE header to indicate the
subsequent BIER header and payload in an IPv6 network.</t>
<t><figure>
<artwork align="left"><![CDATA[
+---------------+-----------------+------------+----------------
| IPv6 header | IPv6 Ext header | UDP header |
| | (optional) | | BIER Hdr +
| | | | payload as UDP
| Next Header | Next Header | DPort = X | Payload
+---------------+-----------------+------------+----------------
]]></artwork>
</figure></t>
<t>UDP-based tunneling is another mechanism which uses a specific UDP
port to indicate a UDP payload format. Both IPv4 and IPv6 can support
UDP. Such UDP-based tunnels can be used for BIER in a IPv6 network by
defining a new UDP port to indicate the BIER header and payload.</t>
<t/>
</section>
</section>
<section title="IANA Considerations">
<t>Some BIERv6 encapsulation proposals do not require any action from
IANA while other proposals require new BIER Destination Option
codepoints from IPv6 sub-registries, new "Next header" values, or
require new IP Protocol codes. This document, however, does not require
anything from IANA.</t>
</section>
<section title="Security Considerations">
<t/>
<t>There are no security issues introduced by this draft.</t>
</section>
<section title="Acknowledgement">
<t/>
<t>Thank you to Eric Rosen for his listed set of requirements on the
bier wg list.</t>
</section>
</middle>
<back>
<references title="Normative References">
<?rfc include="reference.RFC.2119"?>
<?rfc include='reference.RFC.8279'?>
<?rfc include='reference.RFC.8296'?>
<?rfc include='reference.RFC.2473'?>
<?rfc include='reference.RFC.8200'?>
<?rfc include='reference.RFC.8354'?>
<?rfc include='reference.RFC.1112'?>
<?rfc include='reference.I-D.pfister-bier-over-ipv6'?>
<?rfc include='reference.I-D.xu-bier-encapsulation'?>
<?rfc include='reference.I-D.zhang-bier-bierin6'?>
<?rfc include='reference.I-D.xie-bier-ipv6-encapsulation'?>
</references>
</back>
</rfc>