<?xml version="1.0" encoding="utf-8"?>
<?xml-model href="urn:ietf:params:xml:ns:yang:rfc7950"?>
<rfc version="3" ipr="trust200902"
     docName="draft-li-bier-scalable-data-plane-00"
     submissionType="IETF" category="info" consensus="true"
     xml:lang="en"
     xmlns:xi="http://www.w3.org/2001/XInclude">
  <front>
    <title abbrev="BIER Scalable Data Plane">Scalable Data Plane
    Architecture for Bit Index Explicit Replication (BIER)</title>

    <author fullname="Zhiqiang Li" initials="Z." surname="Li">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <street>32 Xuanwumen West Street</street>
          <city>Beijing</city>
          <code>100053</code>
          <country>China</country>
        </postal>
        <email>lizhiqiangyjy@chinamobile.com</email>
      </address>
    </author>
    <author fullname="Zongpeng Du" initials="Z." surname="Du">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <street>32 Xuanwumen West Street</street>
          <city>Beijing</city>
          <code>100053</code>
          <country>China</country>
        </postal>
        <email>duzongpeng@chinamobile.com</email>
      </address>
    </author>
    <author fullname="Wei Cheng" initials="W." surname="Cheng">
      <organization>Centec Networks</organization>
      <address>
        <postal>
          <city>Suzhou</city>
          <code>215000</code>
          <country>China</country>
        </postal>
        <email>chengw@centec.com</email>
      </address>
    </author>
    <author fullname="Junjie Wang" initials="J." surname="Wang">
      <organization>Centec Networks</organization>
      <address>
        <postal>
          <city>Suzhou</city>
          <code>215000</code>
          <country>China</country>
        </postal>
        <email>wangjj@centec.com</email>
      </address>
    </author>
    <author fullname="Guoying Zhang" initials="G." surname="Zhang">
      <organization>Centec Networks</organization>
      <address>
        <postal>
          <city>Suzhou</city>
          <code>215000</code>
          <country>China</country>
        </postal>
        <email>zhanggy@centec.com</email>
      </address>
    </author>

<date year="2026" month="February" day="28"/>

    <area>Routing</area>
    <workgroup>BIER</workgroup>
    <keyword>BIER</keyword>
    <keyword>Multicast</keyword>
    <keyword>Scalability</keyword>
    <keyword>Data Plane</keyword>
    <keyword>Hardware Forwarding</keyword>

    <abstract>
      <t>This document describes an optimized data plane forwarding
      architecture for Bit Index Explicit Replication (BIER). The
      standard BIER forwarding procedures, as conceptually described
      in RFC 8279, imply a per-bit evaluation of the BitString
      against the Bit Index Forwarding Table (BIFT) on each Bit
      Forwarding Router (BFR). When the BitStringLength is large
      (e.g., 256 bits or more), this conceptual model presents
      implementation challenges for high-speed ASIC/NPU forwarding
      engines in terms of processing latency and hardware table
      resources.</t>
      <t>This document defines two conceptual data structures -- a
      Replication Member Table and an Interface BitMask Table -- that
      decouple the multicast replication decision from per-bit
      BitString parsing. The resulting forwarding pipeline operates
      in time proportional to the number of egress interfaces rather
      than the BitString length, enabling deterministic and scalable
      hardware processing. This mechanism is semantically equivalent
      to the forwarding procedures of RFC 8279 and does not modify
      the BIER encapsulation or introduce new protocol signaling.</t>
    </abstract>
  </front>

  <middle>
    <section anchor="intro" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Bit Index Explicit Replication (BIER) <xref target="RFC8279"
      format="default"/> provides a stateless multicast forwarding
      architecture that eliminates the need for per-flow state in
      transit routers and for explicit multicast tree-building
      protocols. In BIER, the ingress router (BFIR) encapsulates
      multicast data packets with a BIER header
      <xref target="RFC8296" format="default"/> that contains a
      BitString indicating the set of destination Bit-Forwarding
      Egress Routers (BFERs).</t>

      <t>As BIER deployments scale to larger domains, multi-tenant
      data centers, and AI/ML cluster environments, the required
      BitStringLength (BSL) increases significantly.
      <xref target="RFC8279" format="default"/> Section 6.5 provides
      a conceptual forwarding pseudocode that iterates over each set
      bit in the BitString to determine the forwarding next-hop
      (BFR-NBR) and the per-neighbor Forwarding BitMask (F-BM).
      While RFC 8279 explicitly notes that this is a conceptual
      description and implementations may optimize the process, no
      standardized optimized architecture has been defined to guide
      hardware implementors.</t>

      <t>This document fills this gap by defining a decoupled
      forwarding pipeline architecture that separates "determining
      which egress interfaces need packet copies" from "filtering the
      BitString for each copy." The key insight is that the number of
      distinct egress interfaces on a BFR is typically much smaller
      than the BitStringLength (e.g., 4-16 interfaces vs. 256+ bits),
      making interface-centric processing significantly more efficient
      for hardware implementation.</t>

      <t>The mechanism described herein is semantically equivalent to
      the standard BIER forwarding procedures of RFC 8279 -- for any
      given input BitString, both approaches produce identical
      forwarding outcomes (same set of egress interfaces with the
      same per-interface BitStrings). This document does not modify
      the BIER encapsulation format defined in
      <xref target="RFC8296" format="default"/> and does not
      introduce any new protocol signaling.</t>
    </section>

    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
      "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED",
      "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are
      to be interpreted as described in BCP 14
      <xref target="RFC2119" format="default"/>
      <xref target="RFC8174" format="default"/> when, and only when,
      they appear in all capitals, as shown here.</t>
      <t>This document uses the following terms as defined in
      <xref target="RFC8279" format="default"/> and
      <xref target="RFC8296" format="default"/>:</t>
      <dl>
        <dt>BFR:</dt>
        <dd>Bit Forwarding Router.</dd>
        <dt>BFIR:</dt>
        <dd>Bit-Forwarding Ingress Router.</dd>
        <dt>BFER:</dt>
        <dd>Bit-Forwarding Egress Router.</dd>
        <dt>BFR-NBR:</dt>
        <dd>A BFR that is a neighbor of the current BFR in the
        BIER forwarding topology.</dd>
        <dt>BIFT:</dt>
        <dd>Bit Index Forwarding Table, as defined in
        <xref target="RFC8279" format="default"/>.</dd>
        <dt>BIFT-id:</dt>
        <dd>An identifier for a BIFT entry as defined in
        <xref target="RFC8296" format="default"/>. In MPLS
        encapsulation, this corresponds to an MPLS label value
        that implicitly encodes the &lt;SD, SI, BSL&gt; tuple.</dd>
        <dt>BitString (BS):</dt>
        <dd>A string of bits in the BIER header indicating the set
        of destination BFERs.</dd>
        <dt>F-BM (Forwarding BitMask):</dt>
        <dd>A bitmask associated with an egress interface,
        representing the logical OR of all BFR-id bit positions of
        downstream BFERs reachable via that interface.</dd>
      </dl>
      <t>This document introduces the following new terms:</t>
      <dl>
        <dt>Replication Group Identifier:</dt>
        <dd>A conceptual identifier derived from the BIER packet
        header's BIFT-id, used to index the Replication Member
        Table. In practice, it MAY be identical to the BIFT-id.</dd>
        <dt>Replication Member Table (RMT):</dt>
        <dd>A conceptual data structure that maps a Replication Group
        Identifier to a list of egress interface identifiers.</dd>
        <dt>Interface BitMask Table (IBMT):</dt>
        <dd>A conceptual data structure that maps an egress interface
        identifier to the corresponding F-BM for that
        interface.</dd>
      </dl>
    </section>

    <section anchor="problem-statement" numbered="true" toc="default">
      <name>Problem Statement</name>
      <t>The conceptual forwarding pseudocode in
      <xref target="RFC8279" format="default"/> Section 6.5 describes
      a process where each set bit in the incoming BitString is
      evaluated individually to determine the appropriate BFR-NBR
      and the associated F-BM. While this provides a clear and
      correct algorithmic specification, direct hardware
      implementation of this per-bit iteration model presents the
      following challenges in large-scale deployments:</t>

      <t>First, processing latency scales with BitString length. When
      BSL is 256 or larger, scanning each bit position -- whether
      sequentially or in parallel -- imposes a processing cost that
      grows linearly with BSL. For line-rate forwarding of
      high-throughput multicast flows on 100GE or 400GE interfaces,
      this can become a significant constraint on forwarding engine
      design.</t>

      <t>Second, hardware table resources scale with BitString length.
      A standard BIFT maintains one entry per BFR-id (i.e., per bit
      position), each containing a BFR-NBR identifier and a
      full-length F-BM. For BSL=256 and a single &lt;SD, SI&gt;
      combination, this requires 256 table entries, each storing a
      256-bit F-BM, consuming substantial TCAM or SRAM resources.
      In resource-constrained edge routers or densely populated data
      center environments supporting multiple Sub-Domains and Set
      Identifiers, the aggregate table size can become
      prohibitive.</t>
    </section>

    <section anchor="arch-overview" numbered="true" toc="default">
      <name>Architecture Overview</name>
      <t>The optimized forwarding architecture decomposes BIER
      packet processing into two decoupled phases, each served by
      an independent conceptual lookup table. The following diagram
      illustrates the high-level forwarding pipeline:</t>
      <artwork name="forwarding-pipeline" type="ascii-art"><![CDATA[
                   BIER Packet Received
                          |
                          v
                +-------------------+
                | Extract BIFT-id   |
                | from BIER Header  |
                +--------+----------+
                         |
                         v
          +------------------------------+
          | Phase 1: Replication Lookup  |
          | RMT[BIFT-id] -> {IF1,..,IFn} |
          +------------------------------+
                         |
            +------------+------------+
            |            |            |
            v            v            v
       +--------+   +--------+   +--------+
       | Copy 1 |   | Copy 2 |   | Copy N |
       | -> IF1 |   | -> IF2 |   | -> IFN |
       +---+----+   +---+----+   +---+----+
           |            |            |
           v            v            v
    +-----------+ +-----------+ +-----------+
    | Phase 2:  | | Phase 2:  | | Phase 2:  |
    | BS AND    | | BS AND    | | BS AND    |
    | IBMT[IF1] | | IBMT[IF2] | | IBMT[IFN] |
    +-----------+ +-----------+ +-----------+
           |            |            |
           v            v            v
    +------------+ +------------+ +------------+
    | !=0: Fwd   | | !=0: Fwd   | | !=0: Fwd   |
    | ==0: Drop  | | ==0: Drop  | | ==0: Drop  |
    +------------+ +------------+ +------------+
]]></artwork>

      <t>Phase 1 (Replication Lookup) determines which egress
      interfaces require a copy of the packet, based solely on the
      BIFT-id. This is independent of the specific BitString content
      in the received packet.</t>

      <t>Phase 2 (BitString Isolation) performs a single bitwise AND
      operation per egress interface to compute the filtered
      BitString for each copy. Copies with a resulting zero BitString
      are discarded.</t>

      <t>The processing complexity of this pipeline is
      O(NumEgressInterfaces) for both phases combined, compared to
      O(BitStringLength) for the per-bit iteration model. In typical
      network topologies, a BFR has 2 to 16 egress interfaces, while
      BSL may be 256, 512, or larger.</t>
    </section>

    <section anchor="data-structures" numbered="true" toc="default">
      <name>Conceptual Data Structures</name>

      <section anchor="rmt" numbered="true" toc="default">
        <name>Replication Member Table (RMT)</name>
        <t>A compliant BFR MUST maintain a conceptual Replication
        Member Table that maps each Replication Group Identifier
        to the set of egress interfaces that have at least one
        downstream BFER reachable through them.</t>

        <artwork name="rmt-structure" type="ascii-art"><![CDATA[
+---------------------------+-------------------------------+
| Replication Group ID      | Egress Interface List         |
| (derived from BIFT-id)    |                               |
+===========================+===============================+
| RG_1                      | { IF_a, IF_b }                |
+---------------------------+-------------------------------+
| RG_2                      | { IF_a, IF_c, IF_d }          |
+---------------------------+-------------------------------+
| ...                       | ...                           |
+---------------------------+-------------------------------+
]]></artwork>

        <t>The RMT is populated by the BIER control plane based on
        the network topology and BIFT computation results. The
        control plane MUST derive the egress interface list by
        identifying all unique BFR-NBRs present in the BIFT
        entries for the corresponding &lt;SD, SI, BSL&gt; and
        mapping each BFR-NBR to its associated egress interface.</t>

        <t>The size of the RMT is O(N_groups), where N_groups is
        the number of distinct Replication Group Identifiers (i.e.,
        distinct &lt;SD, SI, BSL&gt; tuples in use). Each entry
        contains a list of at most O(N_interfaces) egress interface
        identifiers.</t>
      </section>

      <section anchor="ibmt" numbered="true" toc="default">
        <name>Interface BitMask Table (IBMT)</name>
        <t>A compliant BFR MUST maintain a conceptual Interface
        BitMask Table that maps each egress interface to the
        Forwarding BitMask (F-BM) representing all downstream BFERs
        reachable via that interface.</t>

        <artwork name="ibmt-structure" type="ascii-art"><![CDATA[
+-----------+-------------------------------------------+
| Egress    | Forwarding BitMask (F-BM)                 |
| Interface |                                           |
| ID        |                                           |
+===========+===========================================+
| IF_a      | 0b11000000...00  (BFR-ids 1,2 reachable) |
+-----------+-------------------------------------------+
| IF_b      | 0b00110000...00  (BFR-ids 3,4 reachable) |
+-----------+-------------------------------------------+
| IF_c      | 0b00001100...00  (BFR-ids 5,6 reachable) |
+-----------+-------------------------------------------+
]]></artwork>

        <t>For each egress interface IF_k, the F-BM is computed as
        the bitwise OR of all bit positions corresponding to BFERs
        whose shortest path (or engineered path, in the case of
        BIER-TE) from this BFR traverses IF_k. Formally:</t>

        <t>F-BM(IF_k) = OR of { bit(BFR-id_j) } for all BFER_j
        where BIFT[BFR-id_j].BFR-NBR is reachable via IF_k.</t>

        <t>The IBMT MUST be updated by the control plane whenever
        the BIER topology or BIFT entries change. The size of the
        IBMT is O(N_interfaces), where each entry stores one F-BM
        of BitStringLength bits.</t>

        <t>Note: When the BFR participates in multiple Sub-Domains
        or supports multiple &lt;SI, BSL&gt; combinations, the IBMT
        entries MAY be scoped per &lt;SD, BSL&gt; or may use a
        single aggregate F-BM if the interface-to-downstream-BFER
        mapping is consistent across all applicable contexts. The
        specific scoping strategy is an implementation choice.</t>
      </section>
    </section>

    <section anchor="forwarding" numbered="true" toc="default">
      <name>Forwarding Procedures</name>
      <t>Upon receiving a valid BIER packet, a compliant BFR
      implementing this architecture MUST execute the following
      deterministic procedures in its data plane:</t>

      <section anchor="fwd-step1" numbered="true" toc="default">
        <name>Step 1: Replication Group Resolution</name>
        <t>The BFR extracts the BIFT-id from the received BIER
        packet header as specified in <xref target="RFC8296"
        format="default"/>. The BFR derives the Replication Group
        Identifier from the BIFT-id and queries the RMT to obtain
        the associated list of egress interface identifiers
        {IF_1, IF_2, ..., IF_n}.</t>
        <t>If no matching entry exists in the RMT, the BFR MUST
        discard the packet and SHOULD log an error.</t>
      </section>

      <section anchor="fwd-step2" numbered="true" toc="default">
        <name>Step 2: Interface-Level Replication</name>
        <t>The BFR generates an independent packet replica for each
        egress interface in the list obtained in Step 1. At this
        stage, the BFR MUST NOT modify the BitString in any of the
        replicas. All replicas carry the original BitString from the
        received packet.</t>
      </section>

      <section anchor="fwd-step3" numbered="true" toc="default">
        <name>Step 3: Egress BitString Isolation</name>
        <t>For each packet replica destined to egress interface
        IF_k, the BFR queries the IBMT to retrieve the F-BM
        associated with IF_k. The BFR MUST compute:</t>

        <t>BitString_new = BitString_original AND F-BM(IF_k)</t>
      </section>

      <section anchor="fwd-step4" numbered="true" toc="default">
        <name>Step 4: Forwarding Decision</name>
        <t>For each replica:</t>
        <ul>
          <li>If BitString_new is zero (all bits clear), the BFR
          MUST discard the replica. This prevents forwarding packets
          to interfaces that have no relevant downstream BFERs for
          the current packet, avoiding unnecessary bandwidth
          consumption and potential forwarding anomalies.</li>
          <li>If BitString_new is non-zero, the BFR MUST overwrite
          the BIER header's BitString field with BitString_new and
          transmit the replica via egress interface IF_k. The
          remaining BIER header fields (including BIFT-id) are
          updated according to the standard procedures of
          <xref target="RFC8279" format="default"/> and
          <xref target="RFC8296" format="default"/> (e.g., BIFT-id
          label swap in MPLS encapsulation, TTL decrement).</li>
        </ul>
      </section>

      <section anchor="fwd-example" numbered="true" toc="default">
        <name>Forwarding Example</name>
        <t>Consider BFR-A with three egress interfaces in a BIER
        domain using BSL=8 for simplicity of illustration:</t>
        <artwork name="example-topology" type="ascii-art"><![CDATA[
                +---------+
                |  BFR-A  |
                +---------+
               /     |      \
            IF1     IF2     IF3
             |       |       |
          BFR-B   BFR-C   BFR-D
       (BFR-ids  (BFR-ids  (BFR-ids
         1, 2)    3, 4)     5, 6)
]]></artwork>

        <t>BFR-A's RMT (for the relevant Replication Group):</t>
        <artwork type="ascii-art"><![CDATA[
+-------------------+-------------------------+
| Replication Group | Egress Interface List   |
+===================+=========================+
| RG_X              | { IF1, IF2, IF3 }       |
+-------------------+-------------------------+
]]></artwork>

        <t>BFR-A's IBMT:</t>
        <artwork type="ascii-art"><![CDATA[
+-----------+-----------+
| Interface | F-BM      |
+===========+===========+
| IF1       | 00000011  |
+-----------+-----------+
| IF2       | 00001100  |
+-----------+-----------+
| IF3       | 00110000  |
+-----------+-----------+
]]></artwork>

        <t>Scenario: BFR-A receives a BIER packet with
        BitString = 00101010 (destinations: BFR-ids 2, 4, 6).</t>
        <artwork type="ascii-art"><![CDATA[
Step 1: RMT[RG_X] -> {IF1, IF2, IF3}
Step 2: Create 3 replicas

Step 3 and 4:
  Replica 1 (IF1): 00101010 AND 00000011 = 00000010
                    Non-zero -> Forward with BS=00000010
  Replica 2 (IF2): 00101010 AND 00001100 = 00001000
                    Non-zero -> Forward with BS=00001000
  Replica 3 (IF3): 00101010 AND 00110000 = 00100000
                    Non-zero -> Forward with BS=00100000
]]></artwork>

        <t>Now consider BitString = 00101000 (destinations: BFR-ids
        4, 6 only):</t>
        <artwork type="ascii-art"><![CDATA[
  Replica 1 (IF1): 00101000 AND 00000011 = 00000000
                    Zero -> DISCARD (no BFERs via IF1)
  Replica 2 (IF2): 00101000 AND 00001100 = 00001000
                    Non-zero -> Forward with BS=00001000
  Replica 3 (IF3): 00101000 AND 00110000 = 00100000
                    Non-zero -> Forward with BS=00100000
]]></artwork>
        <t>In the second scenario, the replica for IF1 is correctly
        discarded since no destination BFERs are reachable via
        IF1, demonstrating the isolation property of the
        architecture.</t>
      </section>
    </section>

    <section anchor="equivalence" numbered="true" toc="default">
      <name>Relationship to RFC 8279 Forwarding Procedures</name>
      <t>The forwarding mechanism described in this document is
      semantically equivalent to the conceptual forwarding procedures
      defined in <xref target="RFC8279" format="default"/>
      Section 6.5. Both approaches produce identical forwarding
      results for any given input BitString: the same set of egress
      interfaces receive packet copies, and each copy carries the
      same filtered BitString.</t>

      <t>The difference lies in the iteration strategy.
      <xref target="RFC8279" format="default"/> iterates over bit
      positions (BFR-ids), grouping bits by their associated BFR-NBR.
      This document's approach pre-computes the bit-to-interface
      grouping into the RMT and IBMT, and iterates over egress
      interfaces instead. Since the number of egress interfaces
      (typically 2-16) is much smaller than the BitStringLength
      (typically 64-1024), this approach reduces the per-packet
      processing complexity from O(BSL) to O(N_interfaces).</t>

      <t>A BFR implementing the architecture described in this
      document MUST produce forwarding results that are bit-for-bit
      identical to those produced by a correct implementation of
      <xref target="RFC8279" format="default"/> Section 6.5. Any
      deviation constitutes a forwarding error.</t>
    </section>

    <section anchor="security" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>This document does not introduce new security considerations
      beyond those already discussed in <xref target="RFC8279"
      format="default"/> and <xref target="RFC8296" format="default"/>.
      The forwarding architecture described herein is semantically
      equivalent to the standard BIER forwarding procedures and
      processes the same BIER header fields. No new protocol
      signaling or encapsulation formats are introduced.</t>

      <t>The RMT and IBMT are populated by the BIER control plane
      and are subject to the same security considerations as the
      BIFT. Unauthorized modification of RMT or IBMT entries could
      result in incorrect packet replication or delivery to
      unintended interfaces. Implementations SHOULD protect these
      data structures with the same access control mechanisms used
      for BIFT entries.</t>
    </section>

    <section anchor="iana" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>

      <t>The mechanism defined in this document is a local
      implementation optimization for BIER forwarding. It does not
      define new protocol fields, encapsulation formats, or registry
      entries. The Replication Member Table and Interface BitMask
      Table are conceptual data structures internal to a BFR and do
      not require any protocol-level identifier allocation.</t>
    </section>
  </middle>

  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119"
                   target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement
            Levels</title>
            <author initials="S." surname="Bradner"
                    fullname="S. Bradner"/>
            <date year="2026" month="February" day="28"/>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174"
                   target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119
            Key Words</title>
            <author initials="B." surname="Leiba"
                    fullname="B. Leiba"/>
            <date year="2026" month="February" day="28"/>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8279"
                   target="https://www.rfc-editor.org/info/rfc8279">
          <front>
            <title>Multicast Using Bit Index Explicit Replication
            (BIER)</title>
            <author initials="IJ." surname="Wijnands"
                    fullname="IJ. Wijnands" role="editor"/>
            <author initials="E." surname="Rosen"
                    fullname="E. Rosen" role="editor"/>
            <author initials="A." surname="Dolganow"
                    fullname="A. Dolganow"/>
            <author initials="T." surname="Przygienda"
                    fullname="T. Przygienda"/>
            <author initials="S." surname="Aldrin"
                    fullname="S. Aldrin"/>
            <date year="2026" month="February" day="28"/>
          </front>
          <seriesInfo name="RFC" value="8279"/>
          <seriesInfo name="DOI" value="10.17487/RFC8279"/>
        </reference>
        <reference anchor="RFC8296"
                   target="https://www.rfc-editor.org/info/rfc8296">
          <front>
            <title>Encapsulation for Bit Index Explicit Replication
            (BIER) in MPLS and Non-MPLS Networks</title>
            <author initials="IJ." surname="Wijnands"
                    fullname="IJ. Wijnands" role="editor"/>
            <author initials="E." surname="Rosen"
                    fullname="E. Rosen" role="editor"/>
            <author initials="A." surname="Dolganow"
                    fullname="A. Dolganow"/>
            <author initials="J." surname="Tantsura"
                    fullname="J. Tantsura"/>
            <author initials="S." surname="Aldrin"
                    fullname="S. Aldrin"/>
            <author initials="I." surname="Meilik"
                    fullname="I. Meilik"/>
            <date year="2026" month="February" day="28"/>
          </front>
          <seriesInfo name="RFC" value="8296"/>
          <seriesInfo name="DOI" value="10.17487/RFC8296"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC9262"
                   target="https://www.rfc-editor.org/info/rfc9262">
          <front>
            <title>Tree Engineering for Bit Index Explicit
            Replication (BIER-TE)</title>
            <author initials="T." surname="Eckert"
                    fullname="T. Eckert" role="editor"/>
            <author initials="M." surname="Menth"
                    fullname="M. Menth"/>
            <author initials="G." surname="Cauchie"
                    fullname="G. Cauchie"/>
            <date year="2026" month="February" day="28"/>
          </front>
          <seriesInfo name="RFC" value="9262"/>
          <seriesInfo name="DOI" value="10.17487/RFC9262"/>
        </reference>
      </references>
    </references>

    <section anchor="acknowledgements" numbered="false"
             toc="default">
      <name>Acknowledgements</name>
      <t>The authors would like to thank the members of the BIER
      Working Group for their ongoing work on BIER scalability and
      deployment.</t>
    </section>
  </back>
</rfc>