The present application concerns communications networks, and more specifically, concerns improvements to the Bit Index Explicit Replication (BIER) protocol.
The Bit Index Explicit Replication (BIER) protocol, and extensions to the BIER protocol, are described in the following Request for Comments (RFCs) published by the Internet Engineering Task Force (IETF):
Although the BIER protocol is well-understood by those having ordinary skill in the art, BIER is introduced here for the reader's convenience. RFC 8279 specifies a new architecture for the forwarding of multicast data packets. The architecture provides optimal forwarding of multicast data packets through a “multicast domain”. However, it does not require the use of a protocol for explicitly building multicast distribution trees, and it does not require intermediate nodes to maintain any per-flow state.
A router that supports BIER is known as a “Bit-Forwarding Router” (BFR). The BIER control-plane protocols run within a “BIER domain”, allowing the BFRs within that domain to exchange the information needed for them to forward packets to each other using BIER.
A multicast data packet enters a BIER domain at a “Bit-Forwarding Ingress Router” (BFIR), and leaves the BIER domain at one or more “Bit-Forwarding Egress Routers” (BFERs). A BFR that receives a multicast data packet from another BFR in the same BIER domain, and forwards the packet to another BFR in the same BIER domain, is known as a “transit BFR” for that packet. A single BFR may be a BFIR for some multicast traffic while also being a BFER for some multicast traffic and a transit BFR for some multicast traffic. In fact, for a given packet, a BFR may be a BFIR and/or a transit BFR and/or (one of) the BFER(s) for that packet.
A BIER domain may contain one or more sub-domains. Each BIER domain contains at least one sub-domain, the “default sub-domain” (also denoted “sub-domain 0”). If a BIER domain contains more than one sub-domain, each BFR in the domain is provisioned to know the set of sub-domains to which it belongs. Each sub-domain is identified by a sub-domain-id in the range [0,255].
For each sub-domain to which a given BFR belongs, if the BFR is capable of acting as a BFIR or a BFER, it is provisioned with a “BFR-ID” that is unique within the sub-domain. A BFR-ID is a small unstructured positive integer. For instance, if a particular BIER sub-domain contains 1,374 BFRs, each one could be given a BFR-ID in the range [1,1374].
If a given BFR belongs to more than one sub-domain, it may (though it need not) have a different BFR-ID for each sub-domain.
When a multicast packet arrives from outside the domain at a BFIR, the BFIR determines the set of BFERs to which the packet will be sent. The BFIR also determines the sub-domain in which the packet will be sent. Determining the sub-domain in which a given packet will be sent is known as “assigning the packet to a sub-domain”. Once a particular packet has been assigned to a particular sub-domain, it remains assigned to that sub-domain until it leaves the BIER domain. That is, the sub-domain to which a packet is assigned is not changed while the packet is in flight through the BIER domain.
Once the BFIR determines the sub-domain and the set of BFERs for a given packet, the BFIR encapsulates the packet in a “BIER header”.
The number of BFERs to which a given packet can be forwarded is limited only by the length of the BitString in the BIER header. Different deployments can use different BitString lengths. The term “BitStringLength” refers to the number of bits in the BitString. To accommodate possible deployments that have more BFERs in a given sub-domain than there are bits in the BitString, the BIER encapsulation includes both the BitString and a “Set Identifier” (SI). It is the BitString and the SI together that determine the set of BFERs to which a given packet will be delivered.
With the forwarding procedure specified in RFC 8279, a multicast data packet can follow an optimal path from its BFIR to each of its BFERs. Further, since the set of BFERs for a given packet is explicitly encoded into the BIER header, the packet is not sent to any BFER that does not need to receive it. This permits optimal forwarding of multicast traffic. This forwarding is achieved without any need for transit BFRs to maintain per-flow state or to run a multicast tree-building protocol. Furthermore, since BIER encodes each BFR-ID as a single bit in a BitString, it can represent up to 128 BFERs in the same number of bits that it would take to carry the IPV6 address of a single BFER. Thus, BIER scales to a much larger number of egress nodes per packet.
BIER does not require that each transit BFR look up the best path to each BFER that is identified in the BIER header. The number of lookups required in the forwarding path for a single packet can be limited to the number of neighboring BFRs. This can be much smaller than the number of BFERs.
Per RFC 8279, each BFR must be assigned a single “BFR-prefix” for each sub-domain to which it belongs. A BFR's BFR-prefix is an IP address (either IPv4 or IPV6) of the BFR. RFC 8279 recommends that the BFR-prefix be a loopback address of the BFR. If a BFR belongs to more than one sub-domain, it may (though it need not) have a different BFR-prefix in each sub-domain. All BFR-prefixes used within a given sub-domain belong to the same address family (either IPv4 or IPv6). Per RFC 8279, the BFR-prefix of a given BFR in a given sub-domain must be routable in that sub-domain. (Whether a particular BFR-prefix is routable in a given sub-domain depends on the “routing underlay” (described below) associated with that sub-domain.)
A “BFR Identifier” (BFR-ID) is a number in the range {1-65535}. Per RFC 8279, within a given sub-domain, every BFR that may need to function as a BFIR or BFER must have a single BFR-ID, which identifies it uniquely within that sub-domain. A BFR that does not need to function as a BFIR or BFER in a given sub-domain does not need to have a BFR-ID in that sub-domain.
Section 3 of RFC 8279 describes encoding a BFR-ID in a BIER data packet by converting the BFR-ID to an SI and a BitString, using the parameter “BitStringLength”.
One may think of the BIER architecture as consisting of three layers: (1) the “routing underlay”, (2) the “BIER layer”, and (3) the “multicast flow overlay”. The “routing underlay” establishes “adjacencies” between pairs of BFRs and determines one or more “best paths” from a given BFR to a given set of BFRs. At a given BFR, say BFR-A, for every IP address that is the address of a BFR in the BIER domain, the routing underlay will map that IP address into a set of one or more “equal-cost” adjacencies. If a BIER data packet has to be forwarded by BFR-A to a given BFER, say BFER-B, the packet will follow the path from BFR-A to BFER-B that is determined by the routing underlay.
In a typical deployment, the routing underlay is often the default topology that the Interior Gateway Protocol (IGP), e.g., open shortest path first (OSPF), uses for unicast routing. In that case, the underlay adjacencies are just the OSPF adjacencies. That is, a BIER data packet traveling from BFR-A to BFER-B will follow the path that OSPF has selected for unicast traffic from BFR-A to BFER-B. If one wants to have multicast traffic from BFR-A to BFER-B travel a path that is different from the path used by the unicast traffic from BFR-A to BFER-B, one can use a different routing underlay.
The BIER layer includes the protocols and procedures that are used in order to transmit a multicast data packet across a BIER domain, from its BFIR to its BFERs. This includes the following components: (1) protocols and procedures that a given BFR uses to advertise, to all other BFRs in the same BIER domain (e.g., its BFR-prefix; its BFR-ID in each sub-domain for which it has been provisioned with a BFR-ID; the set of Disposition BitStringLengths it has been provisioned to use for each sub-domain; optionally, information about the routing underlay associated with each sub-domain); (2) the procedures used by a BFIR to impose a BIER header on a multicast data packet; (3) the procedures for forwarding BIER-encapsulated packets and for modifying the BIER header during transit; and (4) the procedures used by a BFER to decapsulate a BIER packet and properly dispatch it.
Finally, the “multicast flow overlay” includes the set of protocols and procedures that enable (1) a BFIR, when it receives a multicast data packet from outside the BIER domain, to determine the set of BFERs for that packet, and (2) a BFER, when it receives a BIER-encapsulated packet from inside the BIER domain, to determine how to further forward the packet.
As noted above, each BFER is assigned (by provisioning) a BFR-ID (for a given BIER sub-domain). Each BFER advertises these assignments to all the other BFRs in the domain. Similarly, each BFR is assigned (by provisioning) a BFR-prefix (for a given BIER domain) and advertises this assignment to all the other BFRs in the domain. Finally, each BFR has been provisioned to use a certain set of Disposition BitStringLengths for each sub-domain and advertises (e.g., using flooding) these to all other BFRs in the domain.
RFC 8401 and RFC 8444 specify extensions to enable the above advertisements. Importantly, RFC 8279 specifies that each BFR needs to have a unique (in each sub-domain) BFR-ID. Consequently, RFC 8279 specifies that two different BFRs will not advertise ownership of the same <sub-domain-ID, BFR-ID> unless there has been a provisioning error, and notes that if a given BFR determines that two other BFRs have both advertised the same BFR-ID for the same sub-domain, the given BFR must log an error. Similarly, RFC 8279 notes that if a given BFR has been provisioned with a particular BFR-ID for a particular sub-domain but that it has not yet advertised its ownership of that particular BFR-ID for that particular sub-domain, if that particular BFR has received an advertisement from a different BFR that is advertising ownership of same BFR-ID for the same sub-domain, the given BFR-A should log an error and will not advertise its own ownership of particular BFR-ID for that sub-domain (as long as the received advertisement from the other BFR is extant). The present inventor has recognized some limitations caused by these existing requirements of BIER.
More specifically, the present inventor has recognized that the BIER architecture currently does not support anycast (See, e.g., prior Anycast documents, such as, for example, C. Partridge, T. Mendez, W. Milliken, “Host Anycasting Service”, RFC 1546 (IETF, November 1993), available at https://datatracker.ietf.org/doc/html/rfc1546 (Referred to as “RFC 1546” and incorporated herein by reference.), R. Hinden, S. Deering, “IP Version 6 Addressing Architecture”, RFC 4291 (IETF, February 2006), available at https://datatracker.ietf.org/doc/html/rfc4291 (Referred to as “RFC 4291” and incorporated herein by reference), and J. Abley, K. Lindqvist, “Operation of Anycast Service”, RFC 4786 (IETF, December 2006), available at https://www.rfc-editor.org/rfc/rfc4786.txt (Referred to as “RFC 4786” and incorporated herein by reference.).), in that each BIER Forwarding Router (BFR) has its own unique BIER-prefix and BFR-ID. BIER signaling protocols RFC8401 and RFC8444 require the checking for, and logging of, duplicate BFR-IDs in advertisements, and require duplicate BFR-IDs be treated as zero and ignored. That is, under the existing RFCs related to BIER and cited above, those BFRs advertising duplicate BFR-IDs will not be treated as BIER Forwarding Ingress Routers (BFIR) or BIER Forwarding Egress Routers (BFER).
However, anycast is widely used in networks and the present inventor believes that would be useful to support BFERs with anycast addresses as BFR-prefixes, especially for egress protection purposes.
Example embodiments consistent with the present description enable the use of anycast with BIER by providing (e.g., configuring) a BIER sub-domain comprising at least two BIER forwarding routers (BFRs) configured with a common, non-zero, BIER forwarding router (BRF) identifier (BFR-ID) (for the BIER sub-domain) associated with a common BFR-prefix. In some example implementations, one or more of the BFRs is a BIER forwarding egress router (BFER).
Example embodiments consistent with the present description enable the use of anycast with BIER by providing method for use by a BFR in a BIER sub-domain, the computer-implemented method comprising: (a) receiving, by the BFR, at least one advertisement collectively having a common, non-zero, BFR-ID for the BIER sub-domain, associated with a common BRF-prefix shared by at least two different BFRs in the BIER sub-domain; and (b) processing the at least one advertisement in a manner that does not treat the common BFR-ID for the BIER sub-domain, associated with a common BFR-prefix as a duplicate even though it is shared by a least two different BFRs in the BIER sub-domain.
In some such example methods, the act of processing the at least one advertisement in a manner that does not treat the common BFR-ID for the BIER sub-domain, associated with a common BFR-prefix as a duplicate even though it is shared by a least two different BFRs in the BIER sub-domain, includes using, by the BFR, the common, non-zero, BFR-ID and the common BFR-prefix shared by the at least two different BFRs belonging to the BIER sub-domain to calculate BIER routes to the any one of the at least two different BFRs sharing the common, non-zero, BFR-ID and the common BFR-prefix. In some such example methods, the act of processing the at least one advertisement in a manner that does not consider the common BFR-ID associated with a common BFR-prefix as a duplicate even though it is shared by a least two different BFRs in the same sub-domain, further includes generating a bit index forwarding table (BIFT) from the BIRT, and the method further includes: receiving, by the BFR, a packet including a label identifying the sub-domain, a destination bit mask, and a payload, wherein the destination bit mask includes a bit-position corresponding to the BFR-ID set to “1”; and forwarding, by the BFR and using the BIFT, the packet.
Example embodiments consistent with the present description enable the use of anycast with BIER by providing method for use in a BIER sub-domain, the computer-implemented method comprising: (a) generating, by a first BFR in the BIER subdomain, at least one first advertisement collectively having a non-zero BFR-ID for the BIER sub-domain, associated with a BRF-prefix belonging to the BIER sub-domain; (b) transmitting, by the first BFR, the at least one first advertisement to another BFR in the BIER sub-domain; (c) generating, by a second BFR in the BIER subdomain, at least one second advertisement collectively having the non-zero BIER forwarding router (BRF) identifier (BFR-ID) for the BIER sub-domain, associated with the BRF-prefix belonging to the BIER sub-domain; and (d) transmitting, by the second BFR, the at least one second advertisement to another BFR in the BIER sub-domain. In some such example methods, each of the first BFR and the second BFR is an egress BFR (BFER). In some such implementations, the acts of (1) generating, by a first BFR in the BIER subdomain, at least one first advertisement collectively having a non-zero BFR-ID for the BIER sub-domain, associated with a BFR-prefix belonging to the BIER sub-domain, and (2) transmitting, by the first BFR, the at least one first advertisement to another BFR in the BIER sub-domain, are performed regardless of whether or not the first BFR had previously received an advertisement from another BFR in the BFR sub-domain having the non-zero BFR-ID for the BIER sub-domain, associated with the BFR-prefix. In some such example methods, the act of transmitting, by the first BFR, the at least one first advertisement to another BFR in the BIER sub-domain, uses flooding (e.g., using an interior gateway protocol (IGP)).
Any of the example methods described may be implemented on a BFR in a BIER sub-domain, the BFR comprising: (a) a least one processor; and (b) a non-transitory storage device storing processor-executable instructions which, when executed by the at least one processor, cause the at least one processor to perform any of the methods described.
A non-transitory storage device may be provided to store processor-executable instructions which, when executed by at least one processor of a BFR in a BIER sub-domain, cause the at least one processor to perform any of the methods described.
An example BIER subdomain includes first and second BFRs, each including at least one corresponding processor, and (ii) a corresponding non-transitory storage device storing processor-executable instructions. The first BFR: (a) generates at least one first advertisement collectively having a non-zero BFR-ID for the BIER sub-domain, associated with a BRF-prefix belonging to the BIER sub-domain; and (b) transmits the at least one first advertisement to another BFR in the BIER sub-domain. Similarly, the second BFR: (a) generates at least one second advertisement collectively having the non-zero BFR-ID for the BIER sub-domain, associated with the BRF-prefix belonging to the BIER sub-domain; and (b) transmits the at least one second advertisement to another BFR in the BIER sub-domain. In some implementations, each of the first BFR and the second BFR is an egress BFR (BFER). In some implementations, the acts of (1) generating, by a first BFR in the BIER subdomain, at least one first advertisement collectively having a non-zero BFR-ID for the BIER sub-domain, associated with a BFR-prefix belonging to the BIER sub-domain, and (2) transmitting, by the first BFR, the at least one first advertisement to another BFR in the BIER sub-domain, are performed regardless of whether or not the first BFR had previously received an advertisement from another BFR in the BFR sub-domain having the non-zero BFR-ID for the BIER sub-domain, associated with the BFR-prefix. In some implementations, the act of transmitting, by the first BFR, the at least one first advertisement to another BFR in the BIER sub-domain, uses flooding (e.g., using an interior gateway protocol (IGP)).
The present disclosure may involve novel methods, apparatus, message formats, and/or data structures that support anycast in a BIER environment (e.g., a BIER sub-domain). The following description is presented to enable one skilled in the art to make and use the described embodiments, and is provided in the context of particular applications and their requirements. Thus, the following description of example embodiments provides illustration and description, but is not intended to be exhaustive or to limit the present disclosure to the precise form disclosed. Various modifications to the disclosed embodiments will be apparent to those skilled in the art, and the general principles set forth below may be applied to other embodiments and applications. For example, although a series of acts may be described with reference to a flow diagram, the order of acts may differ in other implementations when the performance of one act is not dependent on the completion of another act. Further, non-dependent acts may be performed in parallel. No element, act or instruction used in the description should be construed as critical or essential to the present description unless explicitly described as such. Also, as used herein, the article “a” is intended to include one or more items. Where only one item is intended, the term “one” or similar language is used. Thus, the present disclosure is not intended to be limited to the embodiments shown and the inventor regards his invention as any patentable subject matter described.
The present description updates (relaxes or removes requirements in) RFC 8279, RFC 8401, and/or RFC 8444 to allow BFERs advertise anycast addresses as BFR-prefixes, and to allow such advertisements to be appropriately processed and used in routing and forwarding operations.
It is expected that in the most common implementation of the BIER sub-domain 300, both BFR1 310 and BFR2 320 will be BIER forwarding egress routers (BFERs). However, this is not required. BFR1 310 and BFR2 320 can be any combination of BFIRs and/or BFERs. Indeed, BFR1 310 and/or BFR2 320 can serve as both a BFIR and a BFER.
Note that although only two BFRs 310 and 320 are illustrated as having a common BFR-ID and a common BFR-prefix, the example BIER sub-domain 300 can have more than such BFRs.
Since BFR1 310 and BFR2 320 share a common BFR-prefix, the common BFR-prefix can be considered to be an Anycast address.
In a simple egress protection scenario 400 illustrated in
In a more complicated scenario 500 illustrated in
Since each unique BFR-prefix needs a unique BFR-ID that takes one bit position in the BitString, a network designer should minimize the use of anycast BFR-prefixes. Limiting egress protection to the first scenario 400 of
In both examples, there is no need for the BFERs to advertise a non-anycast BFR-prefix(es). However, there may be scenarios where both anycast and non-anycast BFR-prefixes are advertised.
Referring first to the left branch of example method 600, when one or more condition(s) for advertising BIER information is met, the example method 600 generates at least one advertisement collectively having a non-zero BIER forwarding router (BRF) identifier (BFR-ID) associated with a BFR-prefix belonging to the BIER sub-domain (Block 620), and transmits (e.g., via flooding, per RFC 8401 as modified by the present application, per RFC 8444 as modified by the present application, etc.) the at least one advertisement to another BFR in the BIER sub-domain (Block 830). These acts 620 and 630 are performed regardless of whether or not the BFR performing the example method 600 had previously received an advertisement from another BFR in the BFR sub-domain having the same non-zero BFR-ID associated with the same BFR-prefix.
Referring next to the right branch of example method 600, when a BIER advertisement(s) is received having a common, non-zero, BIER forwarding router (BRF) identifier (BFR-ID) associated with a common BRF-prefix shared by at least two different BFRs, the BFR running the example method 600 receives the advertisement(s) (Block 640) and processes the advertisement(s) in a manner that does not treat the common BFR-ID associated with a common BFR-prefix as a duplicate even though it is shared by a least two different BFRs (Block 650).
Referring back to block 650, in some example implementations of the example method 600, the act of processing the at least one advertisement in a manner that does not treat the common BFR-ID associated with a common BFR-prefix as a duplicate even though it is shared by a least two different BFRs includes using, by the BFR, the common, non-zero, BFR-ID and the common BFR-prefix shared by the at least two different BFRs belonging to the BIER sub-domain to calculate BIER routes to the any one of the at least two different BFRs sharing the common, non-zero, BFR-ID and the common BFR-prefix. In at least some such implementations, the act of processing the at least one advertisement in a manner that does not consider the common BFR-ID associated with a common BFR-prefix as a duplicate even though it is shared by a least two different BFRs further includes: generating a bit index forwarding table (BIFT) from the BIRT. Later, when the BFR receives a packet including a label identifying the sub-domain, a destination bit mask, and a payload, wherein the destination bit mask includes a bit-position corresponding to the BFR-ID set to “1”, it forwards the packet using the BIFT.
Referring to both
Referring to both
As should be appreciated by the foregoing, the example method 600 allows anycast in BIER sub-domains.
The data communications network nodes may be forwarding devices, such as routers for example.
As just discussed above, and referring to
The control component 810 may include an operating system (OS) kernel 820, routing protocol process(es) 830, label-based forwarding protocol process(es) 840, interface process(es) 850, user interface (e.g., command line interface) process(es) 860, and chassis process(es) 870, and may store routing table(s) 839, label forwarding information 845, and forwarding (e.g., route-based and/or label-based) table(s) 880. As shown, the routing protocol process(es) 830 may support routing protocols such as the routing information protocol (“RIP”) 831, the intermediate system-to-intermediate system protocol (“IS-IS”) 832, the open shortest path first protocol (“OSPF”) 833, the enhanced interior gateway routing protocol (“EIGRP”) 834 and the border gateway protocol (“BGP”) 835, and the label-based forwarding protocol process(es) 840 may support protocols such as BGP 835, the label distribution protocol (“LDP”) 836, the resource reservation protocol (“RSVP”) 837, EVPN 838 and L2VPN 839. One or more components (not shown) may permit a user 865 to interact with the user interface process(es) 860. Similarly, one or more components (not shown) may permit an outside device to interact with one or more of the router protocol process(es) 830, the label-based forwarding protocol process(es) 840, the interface process(es) 850, and the chassis process(es) 870, via SNMP 885, and such processes may send information to an outside device via SNMP 885.
The packet forwarding component 890 may include a microkernel 892 over hardware components (e.g., ASICs, switch fabric, optics, etc.) 891, interface process(es) 893, ASIC drivers 894, chassis process(es) 895 and forwarding (e.g., route-based and/or label-based) table(s) 896.
In the example router 800 of
Still referring to
Referring to the routing protocol process(es) 830 of
Still referring to
The example control component 810 may provide several ways to manage the router. For example, it 810 may provide a user interface process(es) 860 which allows a system operator 865 to interact with the system through configuration, modifications, and monitoring. The SNMP 885 allows SNMP-capable systems to communicate with the router platform. This also allows the platform to provide necessary SNMP information to external agents. For example, the SNMP 885 may permit management of the system from a network management station running software, such as Hewlett-Packard's Network Node Manager (“HP-NNM”), through a framework, such as Hewlett-Packard's Open View. Accounting of packets (generally referred to as traffic statistics) may be performed by the control component 810, thereby avoiding slowing traffic forwarding by the packet forwarding component 890.
Although not shown, the example router 800 may provide for out-of-band management, RS-232 DB9 ports for serial console and remote management access, and tertiary storage using a removable PC card. Further, although not shown, a craft interface positioned on the front of the chassis provides an external view into the internal workings of the router. It can be used as a troubleshooting tool, a monitoring tool, or both. The craft interface may include LED indicators, alarm indicators, control component ports, and/or a display screen. Finally, the craft interface may provide interaction with a command line interface (“CLI”) 860 via a console port, an auxiliary port, and/or a management Ethernet port.
The packet forwarding component 890 is responsible for properly outputting received packets as quickly as possible. If there is no entry in the forwarding table for a given destination or a given label and the packet forwarding component 890 cannot perform forwarding by itself, it 890 may send the packets bound for that unknown destination off to the control component 810 for processing. The example packet forwarding component 890 is designed to perform Layer 2 and Layer 3 switching, route lookups, and rapid packet forwarding.
As shown in
Still referring to
An FPC 920 can contain one or more PICs 910, and may carry the signals from the PICS 910 to the midplane/backplane 930 as shown in
The midplane/backplane 930 holds the line cards. The line cards may connect into the midplane/backplane 930 when inserted into the example router's chassis from the front. The control component (e.g., routing engine) 810 may plug into the rear of the midplane/backplane 930 from the rear of the chassis. The midplane/backplane 930 may carry electrical (or optical) signals and power to each line card and to the control component 810.
The system control board 940 may perform forwarding lookup. It 940 may also communicate errors to the routing engine. Further, it 940 may also monitor the condition of the router based on information it receives from sensors. If an abnormal condition is detected, the system control board 940 may immediately notify the control component 810.
Referring to
The I/O manager ASIC 922 on the egress FPC 920/920′ may perform some value-added services. In addition to incrementing time to live (“TTL”) values and re-encapsulating the packet for handling by the PIC 910, it can also apply class-of-service (CoS) rules. To do this, it may queue a pointer to the packet in one of the available queues, each having a share of link bandwidth, before applying the rules to the packet. Queuing can be based on various rules. Thus, the I/O manager ASIC 922 on the egress FPC 920/920′ may be responsible for receiving the blocks from the second DBM ASIC 935/935′, incrementing TTL values, queuing a pointer to the packet, if necessary, before applying CoS rules, re-encapsulating the blocks, and sending the encapsulated packets to the PIC I/O manager ASIC 915.
Referring back to block 1170, the packet may be queued. Actually, as stated earlier with reference to
Referring back to block 1180 of
Although example embodiments consistent with the present description may be implemented on the example routers of
In some embodiments consistent with the present description, the processors 1210 may be one or more microprocessors and/or ASICs. The bus 1240 may include a system bus. The storage devices 1220 may include system memory, such as read only memory (ROM) and/or random access memory (RAM). The storage devices 1220 may also include a hard disk drive for reading from and writing to a hard disk, a magnetic disk drive for reading from or writing to a (e.g., removable) magnetic disk, an optical disk drive for reading from or writing to a removable (magneto-) optical disk such as a compact disk or other (magneto-) optical media, or solid-state non-volatile storage.
Some example embodiments consistent with the present description may also be provided as a machine-readable medium for storing the machine-executable instructions. The machine-readable medium may be non-transitory and may include, but is not limited to, flash memory, optical disks, CD-ROMs, DVD ROMs, RAMs, EPROMS, EEPROMs, magnetic or optical cards or any other type of machine-readable media suitable for storing electronic instructions. For example, example embodiments consistent with the present description may be downloaded as a computer program which may be transferred from a remote computer (e.g., a server) to a requesting computer (e.g., a client) by way of a communication link (e.g., a modem or network connection) and stored on a non-transitory storage medium. The machine-readable medium may also be referred to as a processor-readable medium.
Example embodiments consistent with the present description (or components or modules thereof) might be implemented in hardware, such as one or more field programmable gate arrays (“FPGA”s), one or more integrated circuits such as ASICs, one or more network processors, etc. Alternatively, or in addition, embodiments consistent with the present description (or components or modules thereof) might be implemented as stored program instructions executed by a processor. Such hardware and/or software might be provided in an addressed data (e.g., packet, cell, etc.) forwarding device (e.g., a switch, a router, etc.), a laptop computer, desktop computer, a tablet computer, a mobile phone, or any device that has computing and networking capabilities.
Each BFR-prefix in a BIER sub-domain has a unique BFR-ID.
When a BIER signaling protocol checks for and logs duplicated BFR-IDs in routing advertisements, only the same BFR-ID advertised with different BFR-prefixes is considered as “duplicate.” The same BFR-prefix may be advertised by different BFRs, but they all advertise the same BFR-ID.
It is recommended that only BFERs advertise anycast BFR-prefixes. A transit BFR (with BFR-ID set to 0) should not advertise anycast BFR-prefixes, though the only consequence of doing so is additional useless advertisement.
A BFER may advertise one non-anycast BIER-prefix and may advertise one or more anycast BFR-prefixes. Multiple BFERs may advertise the same anycast BFR-prefix. The same BFR-prefixes are advertised with the same BFR-ID.
As noted in the background section above, a BFER may be a BFIR at the same time. If a BFIR advertises one or more anycast BFR-prefixes, it uses the BFD-ID associated with its non-anycast BFR-prefix in the BIER header that it imposes.
The inventor regards the invention as any patentable subject matter described in this application. The invention is not intended to be limited to any specific embodiments described.
Example embodiments consistent with the present description allow BIER sub-domains to support anycast.
This application claims the benefit of U.S. Provisional Application No. 63/434,855 (referred to as “the '855 provisional” and incorporated herein by reference), titled “BIER with Anycast,” filed on Dec. 22, 2022, and listing Zhaohui ZHANG as the inventor. The scope of the invention is not limited to any requirements of the specific embodiments in the '855 provisional.
Number | Date | Country | |
---|---|---|---|
63434855 | Dec 2022 | US |