<?xml version="1.0" encoding="UTF-8"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude"
     version="3"
     submissionType="independent"
     category="info"
     ipr="trust200902"
     xml:lang="en"
     docName="draft-spera-btoe-00">


  <front>
    <title>Bitstream Transport over Ethernet (BToE)</title>
    <seriesInfo name="Internet-Draft" value="draft-spera-btoe-00"/>
<author fullname="Adam Spera" initials="A." surname="Spera">
  <organization>Cisco Systems</organization>
  <address>
    <postal>
      <street>170 West Tasman Drive</street>
      <city>San Jose</city>
      <region>CA</region>
      <code>95134</code>
      <country>USA</country>
    </postal>
    <email>adamspera@hotmail.com</email>
  </address>
</author>

<author fullname="Paul Broccardi" initials="P." surname="Broccardi">
  <organization>Cisco Systems</organization>
  <address>
    <postal>
      <street>170 West Tasman Drive</street>
      <city>San Jose</city>
      <region>CA</region>
      <code>95134</code>
      <country>USA</country>
    </postal>
    <email>paulbroccardi@gmail.com</email>
  </address>
</author>

    <date day="19" month="July" year="2025"/>
    <abstract>
      <t>
        This document defines Bitstream Transport over Ethernet (BToE), a
        method for capturing and transporting raw Layer 1 bitstream data
        across Ethernet Layer 2 networks. Unlike traditional frame-based
        transport mechanisms, BToE enables fully transparent transmission
        of physical layer signals, allowing for cable fault isolation,
        ASIC/FPGA debugging, and transceiver validation by preserving the
        integrity of all bits, including those outside valid Ethernet frames.
      </t>
    </abstract>
  </front>

  <middle>
    <section anchor="intro" numbered="true">
      <name>Introduction</name>
      <t>
        Traditional Layer 2 tunneling and encapsulation mechanisms rely on the
        presence of syntactically valid Ethernet frames. Technologies such as
        SPAN, RSPAN, ERSPAN, and L2VPN XConnect are valuable for forwarding
        frame-aligned data but fail to address scenarios that require
        examination of physical-layer signals or invalid bit-level sequences.
        BToE (Bitstream Transport over Ethernet) addresses this gap by defining
        a method to transport raw bitstreams, prior to frame recognition or
        protocol validation.
      </t>
    </section>

    <section anchor="conventions" numbered="true">
      <name>Conventions Used in This Document</name>
      <t>
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
        "OPTIONAL" in this document are to be interpreted as described in
        BCP 14 <xref target="RFC2119" format="default">RFC 2119</xref> and
        <xref target="RFC8174" format="default">RFC 8174</xref>.
      </t>
    </section>

    <section anchor="problem" numbered="true">
      <name>Problem Statement</name>

      <section anchor="frame-limitations" numbered="true">
        <name>Frame-Centric Limitations</name>
        <t>
          Existing frame-based mechanisms for traffic capture and transport
          require valid Ethernet framing. Protocols that are not supported or
          frames that are malformed cannot be reliably captured, resulting in
          diagnostic blind spots. Even Layer 2 protocol tunneling mechanisms
          cannot address physical-layer abnormalities that prevent frame
          construction.
        </t>
      </section>

      <section anchor="bit-visibility" numbered="true">
        <name>Lack of Bit-Level Visibility</name>
        <t>
          Faults at the physical layer — including bit-level corruption,
          alignment errors, clock mismatches, and FCS violations — often occur
          prior to or during frame construction. These are undetectable by
          tools that rely on frame interpretation.
        </t>
      </section>

      <section anchor="diag" numbered="true">
        <name>ASIC/FPGA and Cable Diagnostics</name>
        <t>
          In ASIC, FPGA, and transceiver validation workflows, engineers
          require access to the raw serialized line signal, including symbols
          and bits that never result in valid Ethernet frames. No standard
          mechanism exists today to extract and transport this data for
          remote analysis.
        </t>
      </section>
    </section>

    <section anchor="architecture" numbered="true">
      <name>BToE Architecture</name>

      <section anchor="overview" numbered="true">
        <name>Overview</name>
        <t>
          BToE defines a mechanism for capturing raw bitstreams on an ingress
          interface at the physical layer and encapsulating those bits into
          Ethernet payloads that can be delivered across a Layer 2 infrastructure.
          This allows transparent inspection and transport of all data on a link,
          including error sequences, idle characters, and malformed transmissions.
        </t>
      </section>

      <section anchor="buffering" numbered="true">
        <name>Buffering and Transport</name>
        <t>
          A buffer is allocated per ingress port to collect bitstream data.
          The size of this buffer is configurable and defines how many bits
          should be collected prior to encapsulation. Optionally, a timeout
          may be defined to ensure data is not delayed indefinitely in the
          absence of new input.
        </t>
        <t>
          Once the buffer threshold or timeout condition is met, the bits
          are encapsulated into a BToE frame and forwarded to a designated
          receiver.
        </t>
      </section>

      <section anchor="frame-format" numbered="true">
        <name>Frame Format</name>
        <t>
          The encapsulating Ethernet frame is structured as follows:
        </t>
        <artwork type="ascii-art"><![CDATA[
+------------------------+
| Ethernet Header        |
+------------------------+
| 802.1Q VLAN Tag        |
+------------------------+
| Raw Bitstream Payload  |
+------------------------+
| Frame Check Sequence   |
+------------------------+
]]></artwork>
        <t>
          The payload carries the raw bitstream exactly as captured at the
          ingress PHY interface, without any framing, alignment, or
          protocol-awareness applied. There is no protocol-specific BToE
          header within the payload.
        </t>
      </section>
    </section>

    <section anchor="encapsulation" numbered="true">
      <name>Encapsulation and VLAN Tagging</name>
      <t>
        The BToE payload is transported inside a VLAN-tagged Ethernet frame
        using 802.1Q. VLAN IDs may be pre-negotiated between sender and
        receiver to define dedicated transport paths for BToE traffic.
        No new EtherType is introduced; instead, existing encapsulation
        practices are reused with reserved VLANs or destination MAC addresses
        to identify BToE frames.
      </t>
    </section>

    <section anchor="impl" numbered="true">
      <name>Conceptual Implementation Considerations</name>
      <t>
        BToE-capable ingress interfaces must be able to extract the serialized
        bitstream from the physical layer and feed it into a buffer.
      </t>
      <t>
        The buffer should support configurable size (in bits) and flush timeout.
      </t>
      <t>
        At the transmission boundary, the system encapsulates buffered bits
        directly into Ethernet frames with VLAN tagging.
      </t>
      <t>
        On the receiving side, the payload is decapsulated, and bitstream data
        is reconstructed for analysis, replay, or validation.
      </t>
      <t>
        Transport domains should logically isolate BToE traffic to prevent
        interference with operational data.
      </t>
    </section>

    <section anchor="security" numbered="true">
      <name>Security Considerations</name>
      <t>
        Transporting raw bitstreams introduces new privacy and integrity risks.
        BToE bypasses higher-layer protocol parsing and may transmit sensitive
        or malformed data without inspection. Deployments should ensure:
      </t>
      <t>
        - Logical and physical isolation of BToE VLANs
        - Transport-layer encryption when traversing untrusted domains
        - Rate limiting or filtering to prevent replay or injection of invalid
          BToE frames
      </t>
    </section>

    <section anchor="iana" numbered="true">
      <name>IANA Considerations</name>
      <t>This document makes no request of IANA.</t>
    </section>
  </middle>

  <back>
    <references title="References">
      <name>Normative References</name>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author initials="S." surname="Bradner" fullname="Scott Bradner"/>
          <date month="March" year="1997"/>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
      </reference>

      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author initials="B." surname="Leiba" fullname="Barry Leiba"/>
          <date month="May" year="2017"/>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
      </reference>
    </references>
  </back>
</rfc>
