summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9386.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc9386.txt')
-rw-r--r--doc/rfc/rfc9386.txt2119
1 files changed, 2119 insertions, 0 deletions
diff --git a/doc/rfc/rfc9386.txt b/doc/rfc/rfc9386.txt
new file mode 100644
index 0000000..a6e6ef3
--- /dev/null
+++ b/doc/rfc/rfc9386.txt
@@ -0,0 +1,2119 @@
+
+
+
+
+Internet Engineering Task Force (IETF) G. Fioccola
+Request for Comments: 9386 P. Volpato
+Obsoletes: 6036 Huawei Technologies
+Category: Informational J. Palet Martinez
+ISSN: 2070-1721 The IPv6 Company
+ G. Mishra
+ Verizon Inc.
+ C. Xie
+ China Telecom
+ April 2023
+
+
+ IPv6 Deployment Status
+
+Abstract
+
+ This document provides an overview of the status of IPv6 deployment
+ in 2022. Specifically, it looks at the degree of adoption of IPv6 in
+ the industry, analyzes the remaining challenges, and proposes further
+ investigations in areas where the industry has not yet taken a clear
+ and unified approach in the transition to IPv6. It obsoletes RFC
+ 6036.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are candidates for any level of Internet
+ Standard; see Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc9386.
+
+Copyright Notice
+
+ Copyright (c) 2023 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Revised BSD License text as described in Section 4.e of the
+ Trust Legal Provisions and are provided without warranty as described
+ in the Revised BSD License.
+
+Table of Contents
+
+ 1. Introduction
+ 1.1. Terminology
+ 2. IPv6: The Global Picture
+ 2.1. IPv4 Address Exhaustion
+ 2.1.1. IPv4 Addresses per Capita and IPv6 Status
+ 2.2. IPv6 Users
+ 2.3. IPv6 Web Content
+ 2.4. IPv6 Public Actions and Policies
+ 3. A Survey on IPv6 Deployments
+ 3.1. IPv6 Allocations
+ 3.2. IPv6 among Internet Service Providers
+ 3.3. IPv6 among Enterprises
+ 3.3.1. Government and Universities
+ 4. IPv6 Deployment Scenarios
+ 4.1. Dual-Stack
+ 4.2. IPv6-Only Overlay
+ 4.3. IPv6-Only Underlay
+ 4.4. IPv4-as-a-Service
+ 4.5. IPv6-Only
+ 5. Common IPv6 Challenges
+ 5.1. Transition Choices
+ 5.1.1. Service Providers: Fixed and Mobile Operators
+ 5.1.2. Enterprises
+ 5.1.3. Industrial Internet
+ 5.1.4. Content and Cloud Service Providers
+ 5.1.5. CPEs and User Devices
+ 5.1.6. Software Applications
+ 5.2. Network Management and Operations
+ 5.3. Performance
+ 5.3.1. IPv6 Packet Loss and Latency
+ 5.3.2. Customer Experience
+ 5.4. IPv6 Security and Privacy
+ 5.4.1. Protocols' Security Issues
+ 6. IANA Considerations
+ 7. Security Considerations
+ 8. References
+ 8.1. Normative References
+ 8.2. Informative References
+ Appendix A. Summary of Questionnaire and Replies for Network
+ Operators
+ Appendix B. Summary of Questionnaire and Replies for Enterprises
+ Acknowledgements
+ Contributors
+ Authors' Addresses
+
+1. Introduction
+
+ [RFC6036] describes IPv6 deployment scenarios that were adopted or
+ foreseen by a number of Internet Service Providers (ISPs) who
+ responded to a technical questionnaire in early 2010, and [RFC6036]
+ also provides practices and plans that were expected to take place in
+ the following years. Since the publication of [RFC6036], several
+ other documents have contributed to the IPv6 transition discussion in
+ operational environments. To name a few:
+
+ * [RFC6180] discusses IPv6 deployment models and transition
+ mechanisms, recommending those proven to be effective in
+ operational networks.
+
+ * [RFC6883] provides guidance and suggestions for Internet content
+ providers and Application Service Providers (ASPs).
+
+ * [RFC7381] introduces the guidelines of IPv6 deployment for
+ enterprises.
+
+ [RFC6540] recommends the support of IPv6 to all IP-capable nodes. It
+ was referenced in the IAB statement on IPv6 [IAB], which represented
+ a major step in driving the IETF and other Standards Development
+ Organizations (SDOs) towards using IPv6 in their works.
+
+ In more recent times, organizations, such as ETSI, provided more
+ contributions to the use of IPv6 in operational environments,
+ targeting IPv6 in different industry segments. As a result,
+ [ETSI-IP6-WhitePaper] was published to provide an updated view on the
+ IPv6 best practices adopted so far, in particular, in the ISP domain.
+
+ Considering all of the above, and after more than ten years since the
+ publication of [RFC6036], it is useful to assess the status of the
+ transition to IPv6. Some reasons include:
+
+ * In some areas, the lack of IPv4 addresses forced both carriers and
+ content providers to shift to IPv6 to support the introduction of
+ new applications, in particular, in wireless networks.
+
+ * Some governmental actions took place to encourage or even enforce
+ the adoption of IPv6 in certain countries.
+
+ * Looking at the global adoption of IPv6, this seems to have reached
+ a threshold that justifies speaking of end-to-end IPv6
+ connectivity, at least at the IPv6 service layer.
+
+ This document aims to provide a survey of the status of IPv6
+ deployment and highlight both the achievements and remaining
+ obstacles in the transition to IPv6 networks (and its coexistence
+ with continued IPv4 services). The target is to give an updated view
+ of the practices and plans already described in [RFC6036] to
+ encourage further actions and more investigations in those areas that
+ are still under discussion and to present the main incentives for the
+ adoption of IPv6.
+
+ This document is intended for a general audience interested in
+ understanding the status of IPv6 in different industries and network
+ domains. People who provide or use network services may find it
+ useful for the transition to IPv6. Also, people developing plans for
+ IPv6 adoption in an organization or in an industry may find
+ information and references for their analysis. Attention is given to
+ the different stages of the transition to IPv6 networks and services.
+ In particular, terminology on the use of "IPv6-only" is provided,
+ considering IPv6-only networks and services as the final stage of
+ such transition.
+
+ The topics discussed in this document are organized into four main
+ chapters.
+
+ * Section 2 reports data and analytics about the status of IPv6.
+
+ * Section 3 provides a survey of IPv6 deployments in different
+ environments, including ISPs, enterprises, and universities.
+
+ * Section 4 describes the IPv6 deployment approaches for Mobile
+ Broadband (MBB), Fixed Broadband (FBB), and enterprises.
+
+ * Section 5 analyzes the general challenges to be solved in the IPv6
+ transition. Specific attention is given to operations,
+ performance, and security issues.
+
+1.1. Terminology
+
+ This section defines the terminology regarding the usage of IPv6-only
+ expressions within this document. The term IPv6-only is defined in
+ relation to the specific scope it is referring to. In this regard,
+ it may happen that only part of a service, a network, or even a node
+ is in an IPv6-only scope, and the rest is not. The most used terms
+ in relation to the different scopes are listed below:
+
+ IPv6-only interface:
+ The interface of a node is configured to forward only IPv6. This
+ denotes that just part of the node can be IPv6-only since the rest
+ of the interfaces of the same node may work with IPv4 as well. A
+ Dual-Stack interface is not an IPv6-only interface.
+
+ IPv6-only node:
+ The node uses only IPv6. All interfaces of the host only have
+ IPv6 addresses.
+
+ IPv6-only service:
+ It is used if, between the host's interface and the interface of
+ the content server, all packet headers of the service session are
+ IPv6.
+
+ IPv6-only overlay:
+ It is used if, between the end points of the tunnels, all inner
+ packet headers of the tunnels are IPv6. For example, IPv6-only
+ overlay in a fixed network means that the encapsulation is only
+ IPv6 between the interfaces of the Provider Edge (PE) nodes or
+ between the Customer Provider Edge (CPE) node and the Broadband
+ Network Gateway (BNG).
+
+ IPv6-only underlay:
+ It is used if the data plane and control plane are IPv6, but this
+ is not necessarily true for the management plane. For example,
+ IPv6-only underlay in a fixed network means that the underlay
+ network protocol is only IPv6 between any PE nodes, but they can
+ be Dual-Stack in overlay. Segment Routing over IPv6 (SRv6) is an
+ example of IPv6-only underlay.
+
+ IPv6-only network:
+ It is used if every node in this network is IPv6-only. IPv4
+ should not exist in an IPv6-only network. In particular, an
+ IPv6-only network's data plane, control plane, and management
+ plane must be IPv6. All PEs must be IPv6-only. Therefore, if
+ tunnels exist among PEs, both inner and outer headers must be
+ IPv6. For example, an IPv6-only access network means that every
+ node in this access network must be IPv6-only, and similarly, an
+ IPv6-only backbone network means that every node in this backbone
+ network must be IPv6-only.
+
+ IPv4-as-a-Service (IPv4aaS):
+ IPv4 service support is provided by means of a transition
+ mechanism; therefore, there is a combination of encapsulation/
+ translation + IPv6-only underlay + decapsulation/translation. For
+ an IPv6-only network, connectivity to legacy IPv4 is either non-
+ existent or provided by IPv4aaS mechanisms.
+
+ Note that IPv6-only definitions are also discussed in
+ [IPv6-ONLY-DEF].
+
+2. IPv6: The Global Picture
+
+ This section deals with some key questions related to IPv6, namely:
+ (1) the status of IPv4 exhaustion, often considered as one of the
+ triggers to switch to IPv6, (2) the number of IPv6 end users, a
+ primary measure to sense IPv6 adoption, (3) the percentage of
+ websites reachable over IPv6, and (4) a report on IPv6 public actions
+ and policies.
+
+ These parameters are monitored by the Regional Internet Registries
+ (RIRs) and other institutions worldwide, as they provide a first-
+ order indication on the adoption of IPv6.
+
+2.1. IPv4 Address Exhaustion
+
+ According to [CAIR], there will be 29.3 billion networked devices by
+ 2023, up from 18.4 billion in 2018. This poses the question about
+ whether the IPv4 address space can sustain such a number of
+ allocations and, consequently, if this may affect the process of its
+ exhaustion. The answer is not straightforward, as many aspects have
+ to be considered.
+
+ On one hand, the RIRs are reporting scarcity of available and still-
+ reserved addresses. Table 3 of [POTAROO1] (January 2022) shows that
+ the available pool of the five RIRs at the end of 2021 counted 5.2
+ million IPv4 addresses, while the reserved pool included another 12.1
+ million, for a total of 17.3 million IPv4 addresses (-5.5% year over
+ year, comparing 2021 against 2020). Table 1 of [POTAROO1] shows that
+ the total IPv4 allocated pool equaled 3.685 billion addresses
+ (+0.027% year over year). The ratio between the available addresses
+ and the total allocated was brought to 0.469% of the remaining IPv4
+ address space (from 0.474% at the end of 2020).
+
+ On the other hand, [POTAROO1] again highlights the role of both
+ address transfer and Network Address Translation (NAT) to counter the
+ IPv4 exhaustion. The transfer of IPv4 addresses can be done under
+ the control or registration of an RIR or on the so-called grey
+ market, where third parties operate to enable the buying/selling of
+ IPv4 addresses. In all cases, a set of IPv4 addresses is
+ "transferred" to a different holder that has the need to expand their
+ address range. As an example, [IGP-GT] and [NRO] show the amount of
+ transfers to recipient organizations in the different regions. Cloud
+ Service Providers (CSPs) appear to be the most active in buying IPv4
+ addresses to satisfy their need of providing IPv4 connectivity to
+ their tenants. NAT systems provide a means to absorb at least a
+ portion of the demand of public IPv4 addresses, as they enable the
+ use of private addressing in internal networks while limiting the use
+ of public addresses on their WAN-facing side. In the case of NAT,
+ architectural and operational issues remain. Private address space
+ cannot provide an adequate address span, especially for large
+ organizations, and the reuse of addresses may make the network more
+ complex. In addition, multiple levels of address translation may
+ coexist in a network, e.g., Carrier-Grade NAT (CGN) [RFC6264], based
+ on two stages of translation. This comes with an economic and
+ operational burden, as discussed later in this document.
+
+2.1.1. IPv4 Addresses per Capita and IPv6 Status
+
+ The IPv4 addresses per capita ratio measures the quantity of IPv4
+ addresses allocated to a given country divided by the population of
+ that country. It provides an indication of the imbalanced
+ distribution of the IPv4 addresses worldwide. It clearly derives
+ from the allocation of addresses made in the early days of the
+ Internet.
+
+ The sources for measuring the IPv4 addresses per capita ratio are the
+ allocations done by the RIRs and the statistics about the world
+ population. In this regard, [POTAROO2] provides distribution files.
+ The next tables compare the number of IPv4 addresses available per
+ person in a certain country (IPv4 address per capita) against the
+ relative adoption of IPv6 in the same country (expressed as the
+ number of IPv6-capable users in the considered country). The table
+ shows just a subset of the data available from [POTAROO2]. In
+ particular, the following table provides the data for the 25 most
+ populated countries in the world. The table is ordered based on the
+ IPv4 addresses per capita ratio, and the data refer to 1 January
+ 2022.
+
+ +==============================+=================+=================+
+ | Country | IPv4 per Capita | IPv6 Deployment |
+ +==============================+=================+=================+
+ | United States of America | 4.89 | 47.1% |
+ +------------------------------+-----------------+-----------------+
+ | United Kingdom | 1.65 | 33.2% |
+ +------------------------------+-----------------+-----------------+
+ | Japan | 1.50 | 36.7% |
+ +------------------------------+-----------------+-----------------+
+ | Germany | 1.48 | 53.0% |
+ +------------------------------+-----------------+-----------------+
+ | France | 1.27 | 42.1% |
+ +------------------------------+-----------------+-----------------+
+ | Italy | 0.91 | 4.7% |
+ +------------------------------+-----------------+-----------------+
+ | South Africa | 0.46 | 2.4% |
+ +------------------------------+-----------------+-----------------+
+ | Brazil | 0.41 | 38.7% |
+ +------------------------------+-----------------+-----------------+
+ | Russian Federation | 0.31 | 9.7% |
+ +------------------------------+-----------------+-----------------+
+ | China | 0.24 | 60.1%(*) |
+ +------------------------------+-----------------+-----------------+
+ | Egypt | 0.24 | 4.3% |
+ +------------------------------+-----------------+-----------------+
+ | Mexico | 0.23 | 41.8% |
+ +------------------------------+-----------------+-----------------+
+ | Turkey | 0.20 | 0.2% |
+ +------------------------------+-----------------+-----------------+
+ | Vietnam | 0.17 | 48.0% |
+ +------------------------------+-----------------+-----------------+
+ | Iran (Islamic Republic) | 0.15 | 0.1% |
+ +------------------------------+-----------------+-----------------+
+ | Thailand | 0.13 | 40.8% |
+ +------------------------------+-----------------+-----------------+
+ | Indonesia | 0.07 | 5.0% |
+ +------------------------------+-----------------+-----------------+
+ | Philippines | 0.05 | 13.8% |
+ +------------------------------+-----------------+-----------------+
+ | India | 0.03 | 76.9% |
+ +------------------------------+-----------------+-----------------+
+ | Pakistan | 0.03 | 2.1% |
+ +------------------------------+-----------------+-----------------+
+ | United Republic of Tanzania | 0.02 | 0.0% |
+ +------------------------------+-----------------+-----------------+
+ | Nigeria | 0.02 | 0.2% |
+ +------------------------------+-----------------+-----------------+
+ | Bangladesh | 0.01 | 0.3% |
+ +------------------------------+-----------------+-----------------+
+ | Ethiopia | 0.00 | 0.0% |
+ +------------------------------+-----------------+-----------------+
+ | Democratic Republic of Congo | 0.00 | 0.1% |
+ +------------------------------+-----------------+-----------------+
+
+ Table 1: IPv4 per Capita and IPv6 Deployment for the Top 25 Most
+ Populated Countries in the World (as of January 2022)
+
+ (*) The IPv6 deployment information in China is derived from
+ [CN-IPv6].
+
+ A direct correlation between low IPv4 per capita and high IPv6
+ adoption is not immediate, yet some indications emerge. For example,
+ some countries, such as Brazil, China, and India, have clearly moved
+ towards IPv6 adoption. As discussed later, this appears related to
+ several factors in addition to the lack of IPv4 addresses, including
+ local regulation and market-driven actions. The 5 countries at the
+ top of the table, with relative high availability of IPv4 addresses,
+ have also shown a good level of IPv6 adoption. In other cases, a
+ relative scarcity of IPv4 addresses has not meant a clear move
+ towards IPv6, as several countries listed in the table still have low
+ or very low IPv6 adoption.
+
+2.2. IPv6 Users
+
+ The count of the IPv6 users is the key parameter to get an immediate
+ understanding of the adoption of IPv6. Some organizations constantly
+ track the usage of IPv6 by aggregating data from several sources. As
+ an example, the Internet Society constantly monitors the volume of
+ IPv6 traffic for the networks that joined the World IPv6 Launch
+ initiative [WIPv6L]. The measurement aggregates statistics from
+ organizations, such as [Akm-stats], that provide data down to the
+ single network level, measuring the number of hits to their content
+ delivery platform. For the scope of this document, the approach used
+ by APNIC to quantify the adoption of IPv6 by means of a script that
+ runs on a user's device [CAIDA] is considered. To give a rough
+ estimation of the relative growth of IPv6, the next table aggregates
+ the total number of estimated IPv6-capable users as of 1 January 2022
+ and compares it against the total Internet users, as measured by
+ [POTAROO2].
+
+ +=====+==========+==========+==========+==========+==========+=====+
+ | | Jan 2018 | Jan 2019 | Jan 2020 | Jan 2021 | Jan 2022 |CAGR |
+ +=====+==========+==========+==========+==========+==========+=====+
+ |IPv6 | 513.07 | 574.02 | 989.25 | 1,136.28 | 1,207.61 |23.9%|
+ +-----+----------+----------+----------+----------+----------+-----+
+ |World| 3,410.27 | 3,470.36 | 4,065.00 | 4,091.62 | 4,093.69 | 4.7%|
+ +-----+----------+----------+----------+----------+----------+-----+
+ |Ratio| 15.0% | 16.5% | 24.3% | 27.8% | 29.5% |18.4%|
+ +-----+----------+----------+----------+----------+----------+-----+
+
+ Table 2: IPv6-Capable Users against Total Users (in Millions) as
+ of January 2022
+
+ Two figures appear: first, the IPv6 Internet population is growing
+ with a two-digit Compound Annual Growth Rate (CAGR), and second, the
+ ratio IPv6 over total is also growing steadily.
+
+2.3. IPv6 Web Content
+
+ [W3Techs] keeps track of the use of several technical components of
+ websites worldwide through different analytical engines. The
+ utilization of IPv6 for websites is shown in the next table, where
+ the percentages refer to the websites that are accessible over IPv6.
+
+ +===========+=======+=======+=======+=======+=======+=======+
+ | Worldwide | Jan | Jan | Jan | Jan | Jan | CAGR |
+ | Websites | 2018 | 2019 | 2020 | 2021 | 2022 | |
+ +===========+=======+=======+=======+=======+=======+=======+
+ | % of IPv6 | 11.4% | 13.3% | 15.0% | 17.5% | 20.6% | 15.9% |
+ +-----------+-------+-------+-------+-------+-------+-------+
+
+ Table 3: Usage of IPv6 in Websites (as of January 2022)
+
+ Looking at the growth rate, it may not appear particularly high. It
+ has to be noted, though, that not all websites are equal. The
+ largest content providers, which already support IPv6, generate a lot
+ more content than small websites. At the beginning of January 2022,
+ [Csc6lab] measured that out of the world's top 500 sites, 203 are
+ IPv6 enabled (+3.6% from January 2021 to January 2022). If we
+ consider that the big content providers (such as Google, Facebook,
+ and Netflix) generate more than 50% of the total mobile traffic
+ [SNDVN], and in some cases even more up to 65% [ISOC1] [HxBld], the
+ percentage of content accessible over IPv6 is clearly more relevant
+ than the number of enabled IPv6 websites. Of that 50% of all mobile
+ traffic, it would be interesting to know what percentage is IPv6.
+ Unfortunately, this information is not available.
+
+ Related to that, a question that sometimes arises is whether the
+ content stored by content providers would be all accessible on IPv6
+ in the hypothetical case of a sudden IPv4 switch off. Even if this
+ is pure speculation, the numbers above may bring to state that this
+ is likely the case. This would reinforce the common thought that, in
+ quantitative terms, most of the content is accessible via IPv6.
+
+2.4. IPv6 Public Actions and Policies
+
+ As previously noted, the worldwide deployment of IPv6 is not uniform
+ [G_stats] [APNIC1]. It is worth noticing that, in some cases, higher
+ IPv6 adoption in certain countries has been achieved as a consequence
+ of actions taken by the local governments through regulation or
+ incentive to the market. Looking at the European Union area, some
+ countries, such as Belgium, France, and Germany, are well ahead in
+ terms of IPv6 adoption.
+
+ In the case of Belgium, the Belgian Institute for Postal services and
+ Telecommunications (BIPT) acted to mediate an agreement between the
+ local ISPs and the government to limit the use of Carrier-Grade NAT
+ (CGN) systems and of public IPv4 addresses for lawful investigations
+ in 2012 [BIPT]. The agreement limited the use of one IPv4 address
+ per 16 customers behind NAT. The economic burden sustained by the
+ ISPs for the unoptimized use of NAT induced the shift to IPv6 and its
+ increased adoption in the latest years.
+
+ In France, the National Regulator (Autorite de regulation des
+ communications electroniques, or Arcep) introduced an obligation for
+ the mobile carriers awarded with a license to use 5G frequencies
+ (3.4-3.8 GHz) in Metropolitan France to be IPv6 compatible [ARCEP].
+ As stated in [ARCEP] (translated from French),
+
+ | The goal is to ensure that services are interoperable and to
+ | remove obstacles to using services that are only available in
+ | IPv6, as the number of devices in use continues to soar, and
+ | because the RIPE NCC has run out of IPv4 addresses.
+
+ A slow adoption of IPv6 could prevent new Internet services from
+ spreading widely or create a barrier to entry for newcomers to the
+ market. Per [ARCEP] (translated from French), "IPv6 can help to
+ increase competition in the telecom industry, and help to
+ industrialize a country for specific vertical sectors".
+
+ Increased IPv6 adoption in Germany depended on a mix of industry and
+ public actions. Specifically, the Federal Office for Information
+ Technology (under the Federal Ministry of the Interior) issued over
+ the years a few recommendations on the use of IPv6 in the German
+ public administration. The latest guideline in 2019 constitutes a
+ high-level road map for mandatory IPv6 introduction in the federal
+ administration networks [GFA].
+
+ In the United States, the Office of Management and Budget is also
+ calling for IPv6 adoption [US-FR] [US-CIO]. These documents define a
+ plan to have 80% of the US federal IP-capable networks based on
+ IPv6-only by the year 2025. China is another example of a government
+ that is supporting a country-wide IPv6 adoption [CN]. In India, the
+ high adoption of IPv6 took origin from the decision of Reliance Jio
+ to move to IPv6 in their networks [RelJio]. In addition, the
+ Department of Telecommunications (under the Ministry of
+ Communications and Information Technology) issued guidelines for the
+ progressive adoption of IPv6 in public and private networks. The
+ latest one dates 2021 [IDT] and fosters further moves to IPv6
+ connection services.
+
+3. A Survey on IPv6 Deployments
+
+ This section discusses the status of IPv6 adoption in service
+ provider and enterprise networks.
+
+3.1. IPv6 Allocations
+
+ RIRs are responsible for allocating IPv6 address blocks to ISPs,
+ Local Internet Registries (LIRs), and enterprises or other
+ organizations. An ISP/LIR will use the allocated block to assign
+ addresses to their end users. The following table shows the amount
+ of individual allocations, per RIR, in the time period from 2017-2021
+ [APNIC2].
+
+ +==========+=====+=======+=======+=======+=======+===========+====+
+ | Registry |Dec | Dec | Dec | Dec | Dec | Cumulated |CAGR|
+ | |2017 | 2018 | 2019 | 2020 | 2021 | | |
+ +==========+=====+=======+=======+=======+=======+===========+====+
+ | AFRINIC | 112| 110 | 115 | 109 | 136 | 582 | 51%|
+ +----------+-----+-------+-------+-------+-------+-----------+----+
+ | APNIC |1,369| 1,474 | 1,484 | 1,498 | 1,392 | 7,217 | 52%|
+ +----------+-----+-------+-------+-------+-------+-----------+----+
+ | ARIN | 684| 659 | 605 | 644 | 671 | 3,263 | 48%|
+ +----------+-----+-------+-------+-------+-------+-----------+----+
+ | LACNIC |1,549| 1,448 | 1,614 | 1,801 | 730 | 7,142 | 47%|
+ +----------+-----+-------+-------+-------+-------+-----------+----+
+ | RIPE NCC |2,051| 2,620 | 3,104 | 1,403 | 2,542 | 11,720 | 55%|
+ +----------+-----+-------+-------+-------+-------+-----------+----+
+ | Total |5,765| 6,311 | 6,922 | 5,455 | 5,471 | 29,924 | 51%|
+ +----------+-----+-------+-------+-------+-------+-----------+----+
+
+ Table 4: IPv6 Allocations Worldwide (as of January 2022)
+
+ The trend shows the steady progress of IPv6. The decline of IPv6
+ allocations in 2020 and 2021 may be due to the COVID-19 pandemic. It
+ also happened to IPv4 allocations.
+
+ [APNIC2] also compares the number of allocations for both address
+ families. The CAGR looks quite similar in 2021 but a little higher
+ for the IPv4 allocations in comparison to the IPv6 allocations (53.6%
+ versus 50.9%).
+
+ +=========+=====+=====+========+=======+=======+===========+=======+
+ | Address |Dec |Dec | Dec | Dec | Dec | Cumulated | CAGR |
+ | family |2017 |2018 | 2019 | 2020 | 2021 | | |
+ +=========+=====+=====+========+=======+=======+===========+=======+
+ | IPv6 |5,765|6,311| 6,922 | 5,455 | 5,471 | 29,924 | 50.9% |
+ +---------+-----+-----+--------+-------+-------+-----------+-------+
+ | IPv4 |8,091|9,707| 13,112 | 6,263 | 7,829 | 45,002 | 53.6% |
+ +---------+-----+-----+--------+-------+-------+-----------+-------+
+
+ Table 5: Allocations per Address Family (as of January 2022)
+
+ The reason may be that the IPv4 allocations in 2021 included many
+ allocations of small address ranges (e.g., /24) [APNIC2]. On the
+ contrary, a single IPv6 allocation is large enough to cope with the
+ need of an operator for long period. After an operator receives an
+ IPv6 /30 or /32 allocation, it is unlikely that a new request of
+ addresses is repeated in the short term.
+
+ The next table is based on [APNIC3] and [APNIC4] and shows the
+ percentage of Autonomous Systems (ASes) supporting IPv6 compared to
+ the total ASes worldwide. The number of IPv6-capable ASes increased
+ from 24.3% in January 2018 to 38.7% in January 2022. This equals to
+ 18% of the CAGR for IPv6-enabled networks. In comparison, the CAGR
+ for the total of IPv6 and IPv4 networks is just 5%.
+
+ +==============+========+========+========+========+========+======+
+ | Advertised | Jan | Jan | Jan | Jan | Jan | CAGR |
+ | ASN | 2018 | 2019 | 2020 | 2021 | 2022 | |
+ +==============+========+========+========+========+========+======+
+ | IPv6-capable | 14,500 | 16,470 | 18,650 | 21,400 | 28,140 | 18% |
+ +--------------+--------+--------+--------+--------+--------+------+
+ | Total ASN | 59,700 | 63,100 | 66,800 | 70,400 | 72,800 | 5% |
+ +--------------+--------+--------+--------+--------+--------+------+
+ | Ratio | 24.3% | 26.1% | 27.9% | 30.4% | 38.7% | |
+ +--------------+--------+--------+--------+--------+--------+------+
+
+ Table 6: Percentage of IPv6-Capable ASes (as of January 2022)
+
+ The tables above provide an aggregated view of the allocations'
+ dynamic. The next subsections will zoom into each specific domain to
+ highlight its relative status.
+
+3.2. IPv6 among Internet Service Providers
+
+ A survey was submitted to a group of service providers in Europe
+ during the third quarter of 2020 (see Appendix A for the complete
+ poll) to understand their plans about IPv6 and their technical
+ preferences regarding its adoption. Although this poll does not give
+ an exhaustive view on the IPv6 status, it provides some insights that
+ are relevant to the discussion.
+
+ The poll revealed that the majority of ISPs interviewed had plans
+ concerning IPv6 (79%). Of them, 60% had ongoing activities already,
+ while 33% were expected to start activities in a 12-month timeframe.
+ The transition to IPv6 involved all business segments: mobile (63%),
+ fixed (63%), and enterprise (50%).
+
+ The reasons to move to IPv6 varied. Global IPv4 address depletion
+ and the run out of private address space recommended in [RFC1918]
+ were reported as the important drivers for IPv6 deployment (48%). In
+ a few cases, respondents cited the requirement of national IPv6
+ policies and the launch of 5G as the reasons (13%). Enterprise
+ customer demand was also a reason to introduce IPv6 (13%).
+
+ From a technical preference standpoint, Dual-Stack [RFC4213] was the
+ most adopted solution in both wireline (59%) and cellular networks
+ (39%). In wireline, the second most adopted mechanism was Dual-Stack
+ Lite (DS-Lite) [RFC6333] (19%). In cellular networks, the second
+ preference was 464XLAT [RFC6877] (21%).
+
+ More details about the answers received can be found in Appendix A.
+
+3.3. IPv6 among Enterprises
+
+ As described in [RFC7381], enterprises face different challenges than
+ ISPs. Publicly available reports show how the enterprise deployment
+ of IPv6 lags behind ISP deployment [cmpwr].
+
+ [NST_1] provides estimations on the deployment status of IPv6 for
+ domains such as example.com, example.net, or example.org in the
+ United States. The measurement encompasses many industries,
+ including telecommunications, so the term "enterprises" is a bit
+ loose in this context. In any case, it provides a first indication
+ of IPv6 adoption in several US industry sectors. The analysis tries
+ to infer whether IPv6 is supported by looking from "outside" a
+ company's network. It takes into consideration the support of IPv6
+ to external services, such as Domain Name System (DNS), mail, and
+ websites. [BGR_1] has similar data for China, while [CNLABS_1]
+ provides the status in India.
+
+ +===============+==================+=======+=======+=========+
+ | Country | Domains analyzed | DNS | Mail | Website |
+ +===============+==================+=======+=======+=========+
+ | China | 478 | 74.7% | 0.0% | 19.7% |
+ +---------------+------------------+-------+-------+---------+
+ | India | 104 | 51.9% | 15.4% | 16.3% |
+ +---------------+------------------+-------+-------+---------+
+ | United States | 1070 | 66.8% | 21.2% | 6.3% |
+ | of America | | | | |
+ +---------------+------------------+-------+-------+---------+
+
+ Table 7: IPv6 Support for External-Facing Services across
+ Enterprises (as of January 2022)
+
+ A poll submitted to a group of large enterprises in North America in
+ early 2021 (see Appendix B) shows that the operational issues are
+ even more critical than for ISPs.
+
+ Looking at current implementations, almost one third has dual-stacked
+ networks, while 20% declares that portions of their networks are
+ IPv6-only. Additionally, 35% of the enterprises did not implement
+ IPv6 at all or are stuck at the training phase. In no case is the
+ network fully based on IPv6.
+
+ Speaking of training, the most critical needs are in the field of
+ IPv6 security and IPv6 troubleshooting (both highlighted by the two
+ thirds of respondents), followed by address planning / network
+ configurations (57.41%).
+
+ Coming to implementation, the three areas of concern are IPv6
+ security (31.48%), training (27.78%), and application conversion
+ (25.93%), and 33.33% of respondents think that all three areas are
+ all simultaneously of concern.
+
+ The full poll is reported in Appendix B.
+
+3.3.1. Government and Universities
+
+ This section focuses specifically on the adoption of IPv6 in
+ governments and academia.
+
+ As far as governmental agencies are concerned, [NST_2] provides
+ analytics on the degree of IPv6 support for DNS, mail, and websites
+ across second-level domains associated with US federal agencies.
+ These domains are in the form of example.gov or example.fed. The
+ script used by [NST_2] has also been employed to measure the same
+ analytics in other countries, e.g., China [BGR_2], India [CNLABS_2],
+ and the European Union [IPv6Forum]. For this latter analytic, some
+ post-processing is necessary to filter out the non-European domains.
+
+ +====================+==================+=======+=======+=========+
+ | Country | Domains analyzed | DNS | Mail | Website |
+ +====================+==================+=======+=======+=========+
+ | China | 52 | 0.0% | 0.0% | 98.1% |
+ +--------------------+------------------+-------+-------+---------+
+ | European Union (*) | 19 | 47.4% | 0.0% | 21.1% |
+ +--------------------+------------------+-------+-------+---------+
+ | India | 618 | 7.6% | 6.5% | 7.1% |
+ +--------------------+------------------+-------+-------+---------+
+ | United States of | 1283 | 87.1% | 14.0% | 51.7% |
+ | America | | | | |
+ +--------------------+------------------+-------+-------+---------+
+
+ Table 8: IPv6 Support for External-Facing Services across
+ Governmental Institutions (as of January 2022)
+
+ (*) Both EU and country-specific domains are considered.
+
+ IPv6 support in the US is higher than other countries. This is
+ likely due to the IPv6 mandate set by [US-CIO]. In the case of
+ India, the degree of support seems still quite low. This is also
+ true for China, with the notable exception of a high percentage of
+ IPv6-enabled websites for government-related organizations.
+
+ Similar statistics are also available for higher education. [NST_3]
+ measures the data from second-level domains of universities in the
+ US, such as example.edu. [BGR_3] looks at Chinese education-related
+ domains. [CNLABS_1] analyzes domains in India (mostly third level),
+ while [IPv6Forum] lists universities in the European Union (second
+ level), again after filtering the non-European domains.
+
+ +================+==================+=======+=======+=========+
+ | Country | Domains analyzed | DNS | Mail | Website |
+ +================+==================+=======+=======+=========+
+ | China | 111 | 36.9% | 0.0% | 77.5% |
+ +----------------+------------------+-------+-------+---------+
+ | European Union | 118 | 83.9% | 43.2% | 35.6% |
+ +----------------+------------------+-------+-------+---------+
+ | India | 100 | 31.0% | 54.0% | 5.0% |
+ +----------------+------------------+-------+-------+---------+
+ | United States | 346 | 49.1% | 19.4% | 21.7% |
+ | of America | | | | |
+ +----------------+------------------+-------+-------+---------+
+
+ Table 9: IPv6 Support for External-Facing Services across
+ Universities (as of January 2022)
+
+ Overall, the universities have wider support of IPv6-based services
+ compared to the other sectors. Apart from a couple of exceptions
+ (e.g., the support of IPv6 mail in China and IPv6 websites in India),
+ the numbers shown in the table above indicate good support of IPv6 in
+ academia.
+
+4. IPv6 Deployment Scenarios
+
+ The scope of this section is to discuss the network and service
+ scenarios applicable for the transition to IPv6. Most of the related
+ definitions have been provided in Section 1.1. This clause is
+ intended to focus on the technical and operational characteristics.
+ The sequence of scenarios described here does not necessarily have to
+ be intended as a road map for the IPv6 transition. Depending on
+ their specific plans and requirements, service providers may either
+ adopt the scenarios proposed in a sequence or jump directly to a
+ specific one.
+
+4.1. Dual-Stack
+
+ Based on the poll answers provided by network operators (Appendix A),
+ Dual-Stack [RFC4213] appears to be currently the most widely deployed
+ IPv6 solution (about 50%; see both Appendix A and the statistics
+ reported in [ETSI-IP6-WhitePaper]).
+
+ With Dual-Stack, IPv6 can be introduced together with other network
+ upgrades, and many parts of network management and IT systems can
+ still work in IPv4. This avoids a major upgrade of such systems to
+ support IPv6, which is possibly the most difficult task in the IPv6
+ transition. The cost and effort on the network management and IT
+ systems upgrade are moderate. The benefits are to start using IPv6
+ and save NAT costs.
+
+ Although Dual-Stack may provide advantages in the introductory stage,
+ it does have a few disadvantages in the long run, like the
+ duplication of the network resources and states. It also requires
+ more IPv4 addresses, thus increasing both Capital Expenses (CAPEX)
+ and Operating Expenses (OPEX). For example, even if private
+ addresses are used with Carrier-Grade NAT (CGN), there is extra
+ investment in the CGN devices, logs storage, and help desk to track
+ CGN-related issues.
+
+ For this reason, when IPv6 usage exceeds a certain threshold, it may
+ be advantageous to start a transition to the next scenario. For
+ example, the process may start with the IPv4aaS stage, as described
+ hereinafter. It is difficult to establish the criterion for
+ switching (e.g., to properly identify the upper bound of the IPv4
+ decrease or the lower bound of the IPv6 increase). In addition to
+ the technical factors, the switch to the next scenarios may also
+ cause a loss of customers. Based on the feedback of network
+ operators participating in the World IPv6 Launch [WIPv6L] in June
+ 2021, 108 out of 346 operators exceed 50% of IPv6 traffic volume
+ (31.2%), 72 exceed 60% (20.8%), and 37 exceed 75% (10.7%). The
+ consensus to move to IPv6-only might be reasonable when IPv6 traffic
+ volume is between 50% and 60%.
+
+4.2. IPv6-Only Overlay
+
+ As defined in Section 1.1, IPv6-only is generally associated with a
+ scope, e.g., IPv6-only overlay or IPv6-only underlay.
+
+ The IPv6-only overlay denotes that the overlay tunnel between the end
+ points of a network is based only on IPv6. Tunneling provides a way
+ to use an existing IPv4 infrastructure to carry IPv6 traffic. IPv6
+ or IPv4 hosts and routers can tunnel IPv6 packets over IPv4 regions
+ by encapsulating them within IPv4 packets. The approach with
+ IPv6-only overlay helps to maintain compatibility with the existing
+ base of IPv4, but it is not a long-term solution.
+
+ As a matter of fact, IPv4 reachability must be provided for a long
+ time to come over IPv6 for IPv6-only hosts. Most ISPs are leveraging
+ CGN to extend the life of IPv4 instead of going with IPv6-only
+ solutions.
+
+4.3. IPv6-Only Underlay
+
+ The IPv6-only underlay network uses IPv6 as the network protocol for
+ all traffic delivery. Both the control and data planes are based on
+ IPv6. The definition of IPv6-only underlay needs to be associated
+ with a scope in order to identify the domain where it is applicable,
+ such as the IPv6-only access network or IPv6-only backbone network.
+
+ When both enterprises and service providers begin to transition from
+ an IPv4/MPLS backbone to introduce IPv6 in the underlay, they do not
+ necessarily need to Dual-Stack the underlay. Forwarding plane
+ complexity on the Provider (P) nodes of the ISP core should be kept
+ simple as a backbone with a single protocol. Hence, when operators
+ decide to transition to an IPv6 underlay, the ISP backbone should be
+ IPv6-only because Dual-Stack is not the best choice. The underlay
+ could be IPv6-only and allow IPv4 packets to be tunneled using a VPN
+ over an IPv6-only backbone while leveraging [RFC8950], which
+ specifies the extensions necessary to allow advertising IPv4 Network
+ Layer Reachability Information (NLRI) with an IPv6 next hop.
+
+ IPv6-only underlay network deployment for access and backbone
+ networks seems to not be the first option, and the current trend is
+ to keep the IPv4/MPLS data plane and run IPv4/IPv6 Dual-Stack to edge
+ nodes.
+
+ As ISPs do the transition in the future to an IPv6-only access
+ network or backbone network, e.g., Segment Routing over IPv6 (SRv6)
+ data plane, they start the elimination of IPv4 from the underlay
+ transport network while continuing to provide IPv4 services.
+ Basically, as also shown by the poll among network operators, from a
+ network architecture perspective, it is not recommended to apply
+ Dual-Stack to the transport network per reasons mentioned above
+ related to the forwarding plane complexities.
+
+4.4. IPv4-as-a-Service
+
+ IPv4aaS can be used to ensure IPv4 support, and it can be a complex
+ decision that depends on several factors, such as economic aspects,
+ policy, and government regulation.
+
+ [RFC9313] compares the merits of the most common transition solutions
+ for IPv4aaS, i.e., 464XLAT [RFC6877], DS-Lite [RFC6333], Lightweight
+ 4over6 (lw4o6) [RFC7596], Mapping of Address and Port with
+ Encapsulation (MAP-E) [RFC7597], and Mapping of Address and Port
+ using Translation (MAP-T) [RFC7599], but does not provide an explicit
+ recommendation. However, the poll in Appendix A indicates that the
+ most widely deployed IPv6 transition solution in the Mobile Broadband
+ (MBB) domain is 464XLAT, while in the Fixed Broadband (FBB) domain,
+ it is DS-Lite.
+
+ Both are IPv4aaS solutions that leverage IPv6-only underlay. IPv4aaS
+ offers Dual-Stack service to users and allows an ISP to run IPv6-only
+ in the network, typically the access network.
+
+ While it may not always be the case, IPv6-only transition
+ technologies, such as 464XLAT, require far fewer IPv4 addresses
+ [RFC9313], because they are more efficient and do not restrict the
+ number of ports per subscriber. This helps to reduce troubleshooting
+ costs and to remove some operational issues related to permanent
+ block listing of IPv4 address blocks when used via CGN in some
+ services.
+
+ IPv4aaS may be facilitated by the natural upgrade or replacement of
+ CPEs because of newer technologies (triple-play, higher bandwidth WAN
+ links, better Wi-Fi technologies, etc.). The CAPEX and OPEX of other
+ parts of the network may be lowered (for example, CGN and associated
+ logs) due to the operational simplification of the network.
+
+ For deployments with a large number of users (e.g., large mobile
+ operators) or a large number of hosts (e.g., large Data Centers
+ (DCs)), even the full private address space [RFC1918] is not enough.
+ Also, Dual-Stack will likely lead to duplication of network resources
+ and operations to support both IPv6 and IPv4, which increases the
+ amount of state information in the network. This suggests that, for
+ scenarios such as MBB or large DCs, IPv4aaS could be more efficient
+ from the start of the IPv6 introduction.
+
+ So, in general, when the Dual-Stack disadvantages outweigh the
+ IPv6-only complexity, it makes sense to transition to IPv4aaS. Some
+ network operators have already started this process, as in the case
+ of [TMus], [RelJio], and [EE].
+
+4.5. IPv6-Only
+
+ IPv6-only is the final stage of the IPv6 transition, and it happens
+ when a complete network, end to end, no longer has IPv4. No IPv4
+ address is configured for network management or anything else.
+
+ Since IPv6-only means that both underlay networks and overlay
+ services are only IPv6, it will take longer to happen.
+
+5. Common IPv6 Challenges
+
+ This section lists common IPv6 challenges, which have been validated
+ and discussed during several meetings and public events. The scope
+ is to encourage more investigations. Despite that IPv6 has already
+ been well proven in production, there are some challenges to
+ consider. In this regard, it is worth noting that [ETSI-GR-IPE-001]
+ also discusses gaps that still exist in IPv6-related use cases.
+
+5.1. Transition Choices
+
+ A service provider, an enterprise, or a CSP may perceive quite a
+ complex task with the transition to IPv6 due to the many technical
+ alternatives available and the changes required in management and
+ operations. Moreover, the choice of the method to support the
+ transition is an important challenge and may depend on factors
+ specific to the context, such as the IPv6 network design that fits
+ the service requirements, the network operations, and the deployment
+ strategy.
+
+ The subsections below briefly highlight the approaches that the
+ different parties may take and the related challenges.
+
+5.1.1. Service Providers: Fixed and Mobile Operators
+
+ For fixed operators, the massive software upgrade of CPEs to support
+ Dual-Stack already started in most of the service provider networks.
+ On average, looking at the global statistics, the IPv6 traffic
+ percentage is currently around 40% [G_stats]. As highlighted in
+ Section 3.2, all major content providers have already implemented
+ Dual-Stack access to their services, and most of them have
+ implemented IPv6-only in their Data Centers. This aspect could
+ affect the decision on the IPv6 adoption for an operator, but there
+ are also other factors, like the current IPv4 address shortage, CPE
+ costs, CGN costs, and so on.
+
+ * Fixed operators with a Dual-Stack architecture can start defining
+ and applying a new strategy when reaching the limit in terms of
+ the number of IPv4 addresses available. This may be done through
+ CGN or with an IPv4aaS approach.
+
+ * Most of the fixed operators remain attached to a Dual-Stack
+ architecture, and many have already employed CGN. In this case,
+ it is likely that CGN boosts their ability to supply IPv4
+ connectivity to CPEs for more years to come. Indeed, only few
+ fixed operators have chosen to move to an IPv6-only scenario.
+
+ For mobile operators, the situation is quite different, since in some
+ cases, mobile operators are already stretching their IPv4 address
+ space. The reason is that CGN translation limits have been reached
+ and no more IPv4 public pool addresses are available.
+
+ * Some mobile operators choose to implement Dual-Stack as a first
+ and immediate mitigation solution.
+
+ * Other mobile operators prefer to move to IPv4aaS solutions (e.g.,
+ 464XLAT) since Dual-Stack only mitigates and does not solve the
+ IPv4 address scarcity issue completely.
+
+ For both fixed and mobile operators, the approach for the transition
+ is not unique, and this brings different challenges in relation to
+ the network architecture and related costs; therefore, each operator
+ needs to do their own evaluations for the transition based on the
+ specific situation.
+
+5.1.2. Enterprises
+
+ At present, the usage of IPv6 for enterprises often relies on
+ upstream service providers, since the enterprise connectivity depends
+ on the services provided by their upstream provider. Regarding the
+ enterprises' internal infrastructures, IPv6 shows its advantages in
+ the case of a merger and acquisition, because it can be avoided by
+ the overlapping of the two address spaces, which is common in case of
+ IPv4 private addresses. In addition, since several governments are
+ introducing IPv6 policies, all the enterprises providing consulting
+ services to governments are also required to support IPv6.
+
+ However, enterprises face some challenges. They are shielded from
+ IPv4 address depletion issues due to their prevalent use of proxy and
+ private addressing [RFC1918]; thus, they do not have the business
+ requirement or technical justification to transition to IPv6.
+ Enterprises need to find a business case and a strong motivation to
+ transition to IPv6 to justify additional CAPEX and OPEX. Also, since
+ Information and Communication Technologies (ICTs) are not the core
+ business for most of the enterprises, the ICT budget is often
+ constrained and cannot expand considerably. However, there are
+ examples of big enterprises that are considering IPv6 to achieve
+ business targets through a more efficient IPv6 network and to
+ introduce newer services that require IPv6 network architecture.
+
+ Enterprises worldwide, in particular small- and medium-sized
+ enterprises, are quite late to adopt IPv6, especially on internal
+ networks. In most cases, the enterprise engineers and technicians do
+ not have a great experience with IPv6, and the problem of application
+ porting to IPv6 looks quite difficult. As highlighted in the
+ relevant poll, the technicians may need to be trained, but the
+ management does not see a business need for adoption. This creates
+ an unfortunate cycle where the perceived complexity of the IPv6
+ protocol and concerns about security and manageability combine with
+ the lack of urgent business needs to prevent adoption of IPv6. In
+ 2019 and 2020, there has been a concerted effort by some ARIN and
+ APNIC initiatives to provide training [ARIN-CG] [ISIF-ASIA-G].
+
+5.1.3. Industrial Internet
+
+ In an industrial environment, Operational Technology (OT) refers to
+ the systems used to monitor and control processes within a factory or
+ production environment, while Information Technology (IT) refers to
+ anything related to computer technology and networking connectivity.
+ IPv6 is frequently mentioned in relation to Industry 4.0 and the
+ Internet of Things (IoT), affecting the evolution of both OT and IT.
+
+ There are potential advantages for using IPv6 for the Industrial
+ Internet of Things (IIoT), in particular, the large IPv6 address
+ space, the automatic IPv6 address configuration, and resource
+ discovery. However, its industrial adoption, in particular, in smart
+ manufacturing systems, has been much slower than expected. There are
+ still many obstacles and challenges that prevent its pervasive use.
+ The key problems identified are the incomplete or underdeveloped tool
+ support, the dependency on manual configuration, and the poor
+ knowledge of the IPv6 protocols. To promote the use of IPv6 for
+ smart manufacturing systems and IIoT applications, a generic approach
+ to remove these pain points is highly desirable. Indeed, as for
+ enterprises, it is important to provide an easy way to familiarize
+ system architects and software developers with the IPv6 protocol.
+
+ Advances in cloud-based platforms and developments in artificial
+ intelligence (AI) and machine learning (ML) allow OT and IT systems
+ to integrate and migrate to a centralized analytical, processing, and
+ integrated platform, which must act in real time. The limitation is
+ that manufacturing companies have diverse corporate cultures, and the
+ adoption of new technologies may lag as a result.
+
+ For Industrial Internet and related IIoT applications, it would be
+ desirable to leverage the configurationless characteristic of IPv6 to
+ automatically manage and control the IoT devices. In addition, it
+ could be interesting to have the ability to use IP-based
+ communication and standard application protocols at every point in
+ the production process and further reduce the use of specialized
+ communication systems.
+
+5.1.4. Content and Cloud Service Providers
+
+ The high number of addresses required to connect the virtual and
+ physical elements in a Data Center and the necessity to overcome the
+ limitation posed by [RFC1918] have been the drivers to the adoption
+ of IPv6 in several CSP networks.
+
+ Most CSPs have adopted IPv6 in their internal infrastructure but are
+ also active in gathering IPv4 addresses on the transfer market to
+ serve the current business needs of IPv4 connectivity. As noted in
+ the previous section, most enterprises do not consider the transition
+ to IPv6 as a priority. To this extent, the use of IPv4-based network
+ services by the CSPs will last.
+
+ Several public references, as reported hereinafter, discuss how most
+ of the major players find themselves at different stages in the
+ transition to IPv6-only in their Data Center (DC) infrastructure. In
+ some cases, the transition already happened and the DC infrastructure
+ of these hyperscalers is completely based on IPv6.
+
+ It is interesting to look at how much traffic in a network is going
+ to Caches and Content Delivery Networks (CDNs). The response is
+ expected to be a high percentage, at least higher than 50% in most of
+ the cases, since all the key Caches and CDNs are ready for IPv6
+ [Cldflr] [Ggl] [Ntflx] [Amzn] [Mcrsft]. So the percentage of traffic
+ going to the key Caches/CDNs is a good approximation of the potential
+ IPv6 traffic in a network.
+
+ The challenges for CSPs are mainly related to the continuous support
+ of IPv4 to be guaranteed, since most CSPs already completed the
+ transition to IPv6-only. If, in the next years, the scarcity of IPv4
+ addresses becomes more evident, it is likely that the cost of buying
+ an IPv4 address by a CSP could be charged to their customers.
+
+5.1.5. CPEs and User Devices
+
+ It can be noted that most of the user devices (e.g., smartphones)
+ have been IPv6 enabled for many years. But there are exceptions, for
+ example, for the past few years, smart TVs have typically had IPv6
+ support; however, not all the economies replace them at the same
+ pace.
+
+ As already mentioned, ISPs who historically provided public IPv4
+ addresses to their customers generally still have those IPv4
+ addresses (unless they chose to transfer them). Some have chosen to
+ put new customers on CGN but without touching existing customers.
+ Because of the extremely small number of customers who notice that
+ IPv4 is done via NAT444 (i.e., the preferred CGN solution for
+ carriers), it could be less likely to run out of IPv4 addresses and
+ private IPv4 space. But as IPv4-only devices and traffic reduce, the
+ need to support private and public IPv4 lessens. So to have CPEs
+ completely support IPv6 serves as an important challenge and
+ incentive to choose IPv4aaS solutions [ANSI] over Dual-Stack.
+
+5.1.6. Software Applications
+
+ The transition to IPv6 requires that the application software is
+ adapted for use in IPv6-based networks ([ARIN-SW] provides an
+ example). The use of transition mechanisms like 464XLAT is essential
+ to support IPv4-only applications while they evolve to IPv6.
+ Depending on the transition mechanism employed, some issues may
+ remain. For example, in the case of NAT64/DNS64, the use of literal
+ IPv4 addresses, instead of DNS names, will fail unless mechanisms
+ such as Application Level Gateways (ALGs) are used. This issue is
+ not present in 464XLAT (see [RFC8683]).
+
+ It is worth mentioning Happy Eyeballs [RFC8305] as a relevant aspect
+ of application transition to IPv6.
+
+5.2. Network Management and Operations
+
+ There are important IPv6 complementary solutions related to
+ Operations, Administration, and Maintenance (OAM) that look less
+ mature compared to IPv4. A Network Management System (NMS) has a
+ central role in the modern networks for both network operators and
+ enterprises, and its transition is a fundamental issue. This is
+ because some IPv6 products are not as field proven as IPv4 products,
+ even if conventional protocols (e.g., SNMP and RADIUS) already
+ support IPv6. In addition, an incompatible vendor road map for the
+ development of new NMS features affects the confidence of network
+ operators or enterprises.
+
+ An important factor is represented by the need for training the
+ network operations workforce. Deploying IPv6 requires that policies
+ and procedures have to be adjusted in order to successfully plan and
+ complete an IPv6 transition. Staff has to be aware of the best
+ practices for managing IPv4 and IPv6 assets. In addition to network
+ nodes, network management applications and equipment need to be
+ properly configured and, in some cases, also replaced. This may
+ introduce more complexity and costs for the transition.
+
+ Availability of both systems and training is necessary in areas such
+ as IPv6 addressing. IPv6 addresses can be assigned to an interface
+ through different means, such as Stateless Auto-Configuration (SLAAC)
+ [RFC4862], or by using the stateful Dynamic Host Configuration
+ Protocol (DHCP) [RFC8415]. IP Address Management (IPAM) systems may
+ contribute by handling the technical differences and automating some
+ of the configuration tasks, such as the address assignment or the
+ management of DHCP services.
+
+5.3. Performance
+
+ People tend to compare the performance of IPv6 versus IPv4 to argue
+ or motivate the IPv6 transition. In some cases, IPv6 behaving
+ "worse" than IPv4 may be used as an argument for avoiding the full
+ adoption of IPv6. However, there are some aspects where IPv6 has
+ already filled (or is filling) the gap to IPv4. This position is
+ supported when looking at available analytics on two critical
+ parameters: packet loss and latency. These parameters have been
+ constantly monitored over time, but only a few comprehensive
+ measurement campaigns are providing up-to-date information. While
+ performance is undoubtedly an important issue to consider and worth
+ further investigation, the reality is that a definitive answer cannot
+ be found on what IP version performs better. Depending on the
+ specific use case and application, IPv6 is better; in others, the
+ same applies to IPv4.
+
+5.3.1. IPv6 Packet Loss and Latency
+
+ [APNIC5] provides a measurement of both the failure rate and Round-
+ Trip Time (RTT) of IPv6 compared against IPv4. Both measures are
+ based on scripts that employ the three-way handshake of TCP. As
+ such, the measurement of the failure rate does not provide a direct
+ measurement of packet loss (which would need an Internet-wide
+ measurement campaign). That said, despite that IPv4 is still
+ performing better, the difference seems to have decreased in recent
+ years. Two reports, namely [RIPE1] and [APRICOT], discussed the
+ associated trend, showing how the average worldwide failure rate of
+ IPv6 is still a bit worse than IPv4. Reasons for this effect may be
+ found in endpoints with an unreachable IPv6 address, routing
+ instability, or firewall behavior. Yet, this worsening effect may
+ appear as disturbing for a plain transition to IPv6.
+
+ [APNIC5] also compares the latency of both address families.
+ Currently, the worldwide average is slightly in favor of IPv6.
+ Zooming at the country or even at the operator level, it is possible
+ to get more detailed information and appreciate that cases exist
+ where IPv6 is faster than IPv4. Regions (e.g., Western Europe,
+ Northern America, and Southern Asia) and countries (e.g., US, India,
+ and Germany) with an advanced deployment of IPv6 (e.g., greater than
+ 45%) are showing that IPv6 has better performance than IPv4.
+ [APRICOT] highlights how when a difference in performance exists, it
+ is often related to asymmetric routing issues. Other possible
+ explanations for a relative latency difference relate to the
+ specificity of the IPv6 header, which allows packet fragmentation.
+ In turn, this means that hardware needs to spend cycles to analyze
+ all of the header sections, and when it is not capable of handling
+ one of them, it drops the packet. A few measurement campaigns on the
+ behavior of IPv6 in CDNs are also available [MAPRG] [INFOCOM]. The
+ TCP connection time is still higher for IPv6 in both cases, even if
+ the gap has reduced over the analysis time window.
+
+5.3.2. Customer Experience
+
+ It is not totally clear if the customer experience is in some way
+ perceived as better when IPv6 is used instead of IPv4. In some
+ cases, it has been publicly reported by IPv6 content providers that
+ users have a better experience when using IPv6-only compared to IPv4
+ [ISOC2]. This could be explained because, in the case of an IPv6
+ user connecting to an application hosted in an IPv6-only Data Center,
+ the connection is end to end, without translations. Instead, when
+ using IPv4, there is a NAT translation either in the CPE or in the
+ service provider's network, in addition to IPv4 to IPv6 (and back to
+ IPv4) translation in the IPv6-only content provider Data Center.
+ [ISOC2] and [FB] provide reasons in favor of IPv6. In other cases,
+ the result seems to be still slightly in favor of IPv4 [INFOCOM]
+ [MAPRG], even if the difference between IPv4 and IPv6 tends to vanish
+ over time.
+
+5.4. IPv6 Security and Privacy
+
+ An important point that is sometimes considered as a challenge when
+ discussing the transition to IPv6 is related to the security and
+ privacy. [RFC9099] analyzes the operational security issues in
+ several places of a network (enterprises, service providers, and
+ residential users). It is also worth considering the additional
+ security issues brought by the applied IPv6 transition technologies
+ used to implement IPv4aaS (e.g., 464XLAT and DS-Lite) [ComputSecur].
+
+ The security aspects have to be considered to keep at least the same,
+ or even a better, level of security as it exists nowadays in an IPv4
+ network environment. The autoconfiguration features of IPv6 will
+ require some more attention. Router discovery and address
+ autoconfiguration may produce unexpected results and security holes.
+ IPsec protects IPv6 traffic at least as well as it does IPv4, and the
+ security protocols for constrained devices (IoT) are designed for
+ IPv6 operation.
+
+ IPv6 was designed to restore the end-to-end model of communications
+ with all nodes on networks using globally unique addresses. But
+ considering this, IPv6 may imply privacy concerns due to greater
+ visibility on the Internet. IPv6 nodes can (and typically do) use
+ privacy extensions [RFC8981] to prevent any tracking of their burned-
+ in Media Access Control (MAC) address(es), which are easily readable
+ in the original modified 64-bit Extended Unique Identifier (EUI-64)
+ interface identifier format. On the other hand, stable IPv6
+ interface identifiers [RFC8064] were developed, and this can also
+ affect privacy.
+
+ As reported in [ISOC3], in comparing IPv6 and IPv4 at the protocol
+ level, one may probably conclude that the increased complexity of
+ IPv6 will result in an increased number of attack vectors that imply
+ more possible ways to perform different types of attacks. However, a
+ more interesting and practical question is how IPv6 deployments
+ compare to IPv4 deployments in terms of security. In that sense,
+ there are a number of aspects to consider.
+
+ Most security vulnerabilities related to network protocols are based
+ on implementation flaws. Typically, security researchers find
+ vulnerabilities in protocol implementations, which eventually are
+ "patched" to mitigate such vulnerabilities. Over time, this process
+ of finding and patching vulnerabilities results in more robust
+ implementations. For obvious reasons, the IPv4 protocols have
+ benefited from the work of security researchers for much longer, and
+ thus IPv4 implementations are generally more robust than IPv6.
+ However, with more IPv6 deployment, IPv6 will also benefit from this
+ process in the long run. It is also worth mentioning that most
+ vulnerabilities nowadays are caused by human beings and are in the
+ application layer, not the IP layer.
+
+ Besides the intrinsic properties of the protocols, the security level
+ of the resulting deployments is closely related to the level of
+ expertise of network and security engineers. In that sense, there is
+ obviously much more experience and confidence with deploying and
+ operating IPv4 networks than with deploying and operating IPv6
+ networks.
+
+5.4.1. Protocols' Security Issues
+
+ In general, there are security concerns related to IPv6 that can be
+ classified as follows:
+
+ * Basic IPv6 protocol (basic header, extension headers, addressing)
+
+ * IPv6-associated protocols (ICMPv6, NDP, MLD, DNS, DHCPv6)
+
+ * Internet-wide IPv6 security (filtering, DDoS, transition
+ mechanisms)
+
+ ICMPv6 is an integral part of IPv6 and performs error reporting and
+ diagnostic functions. The Neighbor Discovery Protocol (NDP) is a
+ node discovery protocol in IPv6, which replaces and enhances
+ functions of ARP. Multicast Listener Discovery (MLD) is used by IPv6
+ routers for discovering multicast listeners on a directly attached
+ link, much like how the Internet Group Management Protocol (IGMP) is
+ used in IPv4.
+
+ These IPv6-associated protocols, like ICMPv6, NDP, and MLD, are
+ something new compared to IPv4, so they add new security threats and
+ the related solutions are still under discussion today. NDP has
+ vulnerabilities [RFC3756] [RFC6583]. [RFC3756] says to use IPsec,
+ but it is impractical and not used; on the other hand, SEcure
+ Neighbor Discovery (SEND) [RFC3971] is not widely available. It is
+ worth mentioning that applying host isolation may address many of
+ these concerns, as described in [ND-CONSIDERATIONS].
+
+ [RIPE2] describes the most important threats and solutions regarding
+ IPv6 security.
+
+5.4.1.1. IPv6 Extension Headers and Fragmentation
+
+ IPv6 extension headers provide a hook for interesting new features to
+ be added and are more flexible than IPv4 options. This does add some
+ complexity. In particular, some security mechanisms may require
+ processing the full chain of headers, and some firewalls may require
+ filtering packets based on their extension headers. Additionally,
+ packets with IPv6 extension headers may be dropped in the public
+ Internet [RFC7872]. Some documents, e.g., [HBH-PROCESSING],
+ [HBH-OPT-HDR], and [IPv6-EXT-HDR], analyze and provide guidance
+ regarding the processing procedures of IPv6 extension headers.
+
+ Defense against possible attacks through extension headers is
+ necessary. For example, the original IPv6 Routing Header type 0
+ (RH0) was deprecated because of possible remote traffic amplification
+ [RFC5095]. In addition, it is worth mentioning that the unrecognized
+ Hop-by-Hop Options Header and Destination Options Header will not be
+ considered by the nodes if they are not configured to deal with it
+ [RFC8200]. Other attacks based on extension headers may be based on
+ IPv6 header chains and fragmentation that could be used to bypass
+ filtering. To mitigate this effect, the initial IPv6 header, the
+ extension headers, and the upper-layer header must all be in the
+ first fragment [RFC8200]. Also, the use of the IPv6 fragment header
+ is forbidden in all Neighbor Discovery messages [RFC6980].
+
+ The fragment header is used by the IPv6 source node to send a packet
+ bigger than the path MTU, and the destination host processes fragment
+ headers. There are several threats related to fragmentation to pay
+ attention to, e.g., overlapping fragments (not allowed), resource
+ consumption while waiting for the last fragment (to discard), and
+ atomic fragments (to be isolated).
+
+ The operational implications of IPv6 packets with extension headers
+ are further discussed in [RFC9098].
+
+6. IANA Considerations
+
+ This document has no IANA actions.
+
+7. Security Considerations
+
+ This document has no impact on the security properties of specific
+ IPv6 protocols or transition tools. In addition to the discussion
+ above in Section 5.4, the security considerations relating to the
+ protocols and transition tools are described in the relevant
+ documents.
+
+8. References
+
+8.1. Normative References
+
+ [RFC1918] Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G.
+ J., and E. Lear, "Address Allocation for Private
+ Internets", BCP 5, RFC 1918, DOI 10.17487/RFC1918,
+ February 1996, <https://www.rfc-editor.org/info/rfc1918>.
+
+ [RFC3756] Nikander, P., Ed., Kempf, J., and E. Nordmark, "IPv6
+ Neighbor Discovery (ND) Trust Models and Threats",
+ RFC 3756, DOI 10.17487/RFC3756, May 2004,
+ <https://www.rfc-editor.org/info/rfc3756>.
+
+ [RFC3971] Arkko, J., Ed., Kempf, J., Zill, B., and P. Nikander,
+ "SEcure Neighbor Discovery (SEND)", RFC 3971,
+ DOI 10.17487/RFC3971, March 2005,
+ <https://www.rfc-editor.org/info/rfc3971>.
+
+ [RFC4213] Nordmark, E. and R. Gilligan, "Basic Transition Mechanisms
+ for IPv6 Hosts and Routers", RFC 4213,
+ DOI 10.17487/RFC4213, October 2005,
+ <https://www.rfc-editor.org/info/rfc4213>.
+
+ [RFC6036] Carpenter, B. and S. Jiang, "Emerging Service Provider
+ Scenarios for IPv6 Deployment", RFC 6036,
+ DOI 10.17487/RFC6036, October 2010,
+ <https://www.rfc-editor.org/info/rfc6036>.
+
+ [RFC6180] Arkko, J. and F. Baker, "Guidelines for Using IPv6
+ Transition Mechanisms during IPv6 Deployment", RFC 6180,
+ DOI 10.17487/RFC6180, May 2011,
+ <https://www.rfc-editor.org/info/rfc6180>.
+
+ [RFC6333] Durand, A., Droms, R., Woodyatt, J., and Y. Lee, "Dual-
+ Stack Lite Broadband Deployments Following IPv4
+ Exhaustion", RFC 6333, DOI 10.17487/RFC6333, August 2011,
+ <https://www.rfc-editor.org/info/rfc6333>.
+
+ [RFC6540] George, W., Donley, C., Liljenstolpe, C., and L. Howard,
+ "IPv6 Support Required for All IP-Capable Nodes", BCP 177,
+ RFC 6540, DOI 10.17487/RFC6540, April 2012,
+ <https://www.rfc-editor.org/info/rfc6540>.
+
+ [RFC6583] Gashinsky, I., Jaeggli, J., and W. Kumari, "Operational
+ Neighbor Discovery Problems", RFC 6583,
+ DOI 10.17487/RFC6583, March 2012,
+ <https://www.rfc-editor.org/info/rfc6583>.
+
+ [RFC6877] Mawatari, M., Kawashima, M., and C. Byrne, "464XLAT:
+ Combination of Stateful and Stateless Translation",
+ RFC 6877, DOI 10.17487/RFC6877, April 2013,
+ <https://www.rfc-editor.org/info/rfc6877>.
+
+ [RFC6883] Carpenter, B. and S. Jiang, "IPv6 Guidance for Internet
+ Content Providers and Application Service Providers",
+ RFC 6883, DOI 10.17487/RFC6883, March 2013,
+ <https://www.rfc-editor.org/info/rfc6883>.
+
+ [RFC7381] Chittimaneni, K., Chown, T., Howard, L., Kuarsingh, V.,
+ Pouffary, Y., and E. Vyncke, "Enterprise IPv6 Deployment
+ Guidelines", RFC 7381, DOI 10.17487/RFC7381, October 2014,
+ <https://www.rfc-editor.org/info/rfc7381>.
+
+ [RFC7596] Cui, Y., Sun, Q., Boucadair, M., Tsou, T., Lee, Y., and I.
+ Farrer, "Lightweight 4over6: An Extension to the Dual-
+ Stack Lite Architecture", RFC 7596, DOI 10.17487/RFC7596,
+ July 2015, <https://www.rfc-editor.org/info/rfc7596>.
+
+ [RFC7597] Troan, O., Ed., Dec, W., Li, X., Bao, C., Matsushima, S.,
+ Murakami, T., and T. Taylor, Ed., "Mapping of Address and
+ Port with Encapsulation (MAP-E)", RFC 7597,
+ DOI 10.17487/RFC7597, July 2015,
+ <https://www.rfc-editor.org/info/rfc7597>.
+
+ [RFC7599] Li, X., Bao, C., Dec, W., Ed., Troan, O., Matsushima, S.,
+ and T. Murakami, "Mapping of Address and Port using
+ Translation (MAP-T)", RFC 7599, DOI 10.17487/RFC7599, July
+ 2015, <https://www.rfc-editor.org/info/rfc7599>.
+
+ [RFC8950] Litkowski, S., Agrawal, S., Ananthamurthy, K., and K.
+ Patel, "Advertising IPv4 Network Layer Reachability
+ Information (NLRI) with an IPv6 Next Hop", RFC 8950,
+ DOI 10.17487/RFC8950, November 2020,
+ <https://www.rfc-editor.org/info/rfc8950>.
+
+ [RFC9099] Vyncke, É., Chittimaneni, K., Kaeo, M., and E. Rey,
+ "Operational Security Considerations for IPv6 Networks",
+ RFC 9099, DOI 10.17487/RFC9099, August 2021,
+ <https://www.rfc-editor.org/info/rfc9099>.
+
+ [RFC9313] Lencse, G., Palet Martinez, J., Howard, L., Patterson, R.,
+ and I. Farrer, "Pros and Cons of IPv6 Transition
+ Technologies for IPv4-as-a-Service (IPv4aaS)", RFC 9313,
+ DOI 10.17487/RFC9313, October 2022,
+ <https://www.rfc-editor.org/info/rfc9313>.
+
+8.2. Informative References
+
+ [Akm-stats]
+ Akamai, "IPv6 Adoption Visualization", 2023,
+ <https://www.akamai.com/uk/en/resources/our-thinking/
+ state-of-the-internet-report/state-of-the-internet-ipv6-
+ adoption-visualization>.
+
+ [Amzn] Amazon Web Services, "Announcing Internet Protocol Version
+ 6 (IPv6) support for Amazon CloudFront, AWS WAF, and
+ Amazon S3 Transfer Acceleration", October 2016,
+ <https://aws.amazon.com/es/about-aws/whats-new/2016/10/
+ ipv6-support-for-cloudfront-waf-and-s3-transfer-
+ acceleration/>.
+
+ [ANSI] ANSI, "Host and Router Profiles for IPv6", ANSI/
+ CTA 2048-A, October 2020, <https://shop.cta.tech/products/
+ host-and-router-profiles-for-ipv6>.
+
+ [APNIC1] APNIC Labs, "IPv6 Capable Rate by country (%)",
+ <https://stats.labs.apnic.net/ipv6>.
+
+ [APNIC2] Huston, G., "IP addressing in 2021", January 2022,
+ <https://blog.apnic.net/2022/01/19/ip-addressing-in-
+ 2021/>.
+
+ [APNIC3] Huston, G., "BGP in 2020 - The BGP Table", January 2021,
+ <https://blog.apnic.net/2021/01/05/bgp-in-2020-the-bgp-
+ table/>.
+
+ [APNIC4] Huston, G., "BGP in 2021 - The BGP Table", January 2022,
+ <https://blog.apnic.net/2022/01/06/bgp-in-2021-the-bgp-
+ table/>.
+
+ [APNIC5] APNIC Labs, "Average RTT Difference (ms) (V6 - V4) for
+ World (XA)", <https://stats.labs.apnic.net/v6perf/XA>.
+
+ [APRICOT] Huston, G., "IPv6 Performance Measurement", February 2020,
+ <https://2020.apricot.net/assets/files/APAE432/ipv6-
+ performance-measurement.pdf>.
+
+ [ARCEP] ARCEP, "Proposant au ministre chargé des communications
+ électroniques les modalités et les conditions
+ d'attribution d'autorisations d'utilisation de fréquences
+ dans la bande 3,4 - 3,8 GHz", [Decision on the terms and
+ conditions for awarding licenses to use frequencies in the
+ 3.4 – 3.8 GHz band], Décision n° [Decision No.] 2019-1386,
+ November 2019,
+ <https://www.arcep.fr/uploads/tx_gsavis/19-1386.pdf>.
+
+ [ARIN-CG] ARIN, "2020 ARIN Community Grant Program Recipients: IPv6
+ Security, Applications, and Training for Enterprises",
+ 2020, <https://www.arin.net/about/community_grants/
+ recipients/2020>.
+
+ [ARIN-SW] ARIN, "Preparing Applications for IPv6",
+ <https://www.arin.net/resources/guide/ipv6/
+ preparing_apps_for_v6.pdf>.
+
+ [BGR_1] BIIGROUP, "China Commercial IPv6 and DNSSEC Deployment
+ Monitor", December 2021,
+ <http://218.2.231.237:5001/cgi-bin/generate>.
+
+ [BGR_2] BIIGROUP, "China Government IPv6 and DNSSEC Deployment
+ Monitor", December 2021,
+ <http://218.2.231.237:5001/cgi-bin/generate_gov>.
+
+ [BGR_3] BIIGROUP, "China Education IPv6 and DNSSEC Deployment
+ Monitor", December 2021,
+ <http://218.2.231.237:5001/cgi-bin/generate_edu>.
+
+ [BIPT] Vannieuwenhuyse, J., "IPv6 in Belgium", September 2017,
+ <https://www.ripe.net/participate/meetings/roundtable/
+ september-2017/government-roundtable-meeting-bahrain-26-
+ september-2017/presentations/belgium-experience-bahrain-
+ roundtable.pdf>.
+
+ [CAIDA] Huston, G., "Client-Side IPv6 Measurement", June 2020,
+ <https://www.cmand.org/workshops/202006-v6/
+ slides/2020-06-16-client-side.pdf>.
+
+ [CAIR] Cisco, "Cisco Annual Internet Report (2018-2023) White
+ Paper", March 2020,
+ <https://www.cisco.com/c/en/us/solutions/collateral/
+ executive-perspectives/annual-internet-report/white-paper-
+ c11-741490.html>.
+
+ [Cldflr] Cloudflare, "Understanding and configuring Cloudflare's
+ IPv6 support", <https://support.cloudflare.com/hc/en-us/
+ articles/229666767-Understanding-and-configuring-
+ Cloudflare-s-IPv6-support>.
+
+ [cmpwr] Elkins, N., "Impact on Enterprises of the IPv6-Only
+ Direction for the U.S. Federal Government",
+ <https://mydigitalpublication.com/article/
+ Impact+on+Enterprises+of+the+IPv6-Only+Direction+for+the+U
+ .S.+Federal+Government/3702828/664279/article.html>.
+
+ [CN] China.org.cn, "China to speed up IPv6-based Internet
+ development", November 2017, <http://www.china.org.cn/
+ business/2017-11/27/content_41948814.htm>.
+
+ [CN-IPv6] National IPv6 Deployment and Monitoring Platform, "Active
+ IPv6 Internet Users", (in Chinese), 2022,
+ <https://www.china-ipv6.cn/#/activeconnect/simpleInfo>.
+
+ [CNLABS_1] CNLABS, "Industry IPv6 and DNSSEC Statistics", 2022,
+ <https://cnlabs.in/IPv6_Mon/generate_industry.html>.
+
+ [CNLABS_2] CNLABS, "Government IPv6 and DNSSEC Statistics", 2022,
+ <https://cnlabs.in/IPv6_Mon/generate_gov.html>.
+
+ [ComputSecur]
+ Lencse, G. and Y. Kadobayashi, "Methodology for the
+ identification of potential security issues of different
+ IPv6 transition technologies: Threat analysis of DNS64 and
+ stateful NAT64", Computers and Security, Volume 77, Issue
+ C, pp. 397-411, DOI 10.1016/j.cose.2018.04.012, August
+ 2018, <https://doi.org/10.1016/j.cose.2018.04.012>.
+
+ [Csc6lab] Cisco, "Display global data", 2023,
+ <https://6lab.cisco.com/stats/>.
+
+ [EE] Heatley, N., "IPv6-only Devices on EE Mobile", January
+ 2017,
+ <https://indico.uknof.org.uk/event/38/contributions/489/
+ attachments/612/736/
+ Nick_Heatley_EE_IPv6_UKNOF_20170119.pdf>.
+
+ [ETSI-GR-IPE-001]
+ ETSI, "IPv6 Enhanced Innovation (IPE) Gap Analysis", ETSI
+ GR IPE 001, V1.1.1, August 2021,
+ <https://www.etsi.org/deliver/etsi_gr/
+ IPE/001_099/001/01.01.01_60/gr_IPE001v010101p.pdf>.
+
+ [ETSI-IP6-WhitePaper]
+ ETSI, "IPv6 Best Practices, Benefits, Transition
+ Challenges and the Way Forward", ETSI White Paper No. 35,
+ ISBN 979-10-92620-31-1, August 2020.
+
+ [FB] "Paul Saab Facebook V6 World Congress 2015", YouTube
+ video, 25:32, posted by Upperside Conferences, March 2015,
+ <https://youtu.be/An7s25FSK0U>.
+
+ [GFA] German Federal Government Commissioner for Information
+ Technology, "IPv6-Masterplan für die Bundesverwaltung",
+ [IPv6 Master Plan for the Federal Administration],
+ November 2019, <https://media.frag-den-
+ staat.de/files/foi/531501/de-government-ipv6-masterplan-
+ v100-entwurf_konvertiert.pdf>.
+
+ [Ggl] Google, "Introduction to GGC",
+ <https://support.google.com/interconnect/
+ answer/9058809?hl=en>.
+
+ [G_stats] Google, "Google IPv6 Statistics",
+ <https://www.google.com/intl/en/ipv6/statistics.html>.
+
+ [HBH-OPT-HDR]
+ Peng, S., Li, Z., Xie, C., Qin, Z., and G. Mishra,
+ "Operational Issues with Processing of the Hop-by-Hop
+ Options Header", Work in Progress, Internet-Draft, draft-
+ ietf-v6ops-hbh-04, 10 March 2023,
+ <https://datatracker.ietf.org/doc/html/draft-ietf-v6ops-
+ hbh-04>.
+
+ [HBH-PROCESSING]
+ Hinden, R. and G. Fairhurst, "IPv6 Hop-by-Hop Options
+ Processing Procedures", Work in Progress, Internet-Draft,
+ draft-ietf-6man-hbh-processing-07, 6 April 2023,
+ <https://datatracker.ietf.org/doc/html/draft-ietf-6man-
+ hbh-processing-07>.
+
+ [HxBld] HexaBuild, "IPv6 Adoption Report 2020: The IPv6 Internet
+ is the Corporate Network", November 2020,
+ <https://hexabuild.io/assets/files/HexaBuild-IPv6-
+ Adoption-Report-2020.pdf>.
+
+ [IAB] IAB, "IAB Statement on IPv6", November 2016,
+ <https://www.iab.org/2016/11/07/iab-statement-on-ipv6/>.
+
+ [IDT] Government of India: Department of Telecommunications,
+ "Revision of IPv6 Transition Timelines", February 2021,
+ <https://dot.gov.in/revision-ipv6-transition-timelines-
+ 2021>.
+
+ [IGP-GT] Kuerbis, B. and M. Mueller, "The hidden standards war:
+ economic factors affecting IPv6 deployment", DOI
+ 10.1108/DPRG-10-2019-0085, February 2019,
+ <https://www.emerald.com/insight/content/doi/10.1108/DPRG-
+ 10-2019-0085/full/html>.
+
+ [INFOCOM] Doan, T., Bajpai, V., and S. Crawford, "A Longitudinal
+ View of Netflix: Content Delivery over IPv6 and Content
+ Cache Deployments", IEEE INFOCOM 2020, IEEE Conference on
+ Computer Communications, pp. 1073-1082,
+ DOI 10.1109/INFOCOM41043.2020.9155367, July 2020,
+ <https://dl.acm.org/doi/abs/10.1109/
+ INFOCOM41043.2020.9155367>.
+
+ [IPv6-EXT-HDR]
+ Bonica, R. and T. Jinmei, "Inserting, Processing And
+ Deleting IPv6 Extension Headers", Work in Progress,
+ Internet-Draft, draft-bonica-6man-ext-hdr-update-07, 24
+ February 2022, <https://datatracker.ietf.org/doc/html/
+ draft-bonica-6man-ext-hdr-update-07>.
+
+ [IPv6-ONLY-DEF]
+ Palet Martinez, J., "IPv6-only Terminology Definition",
+ Work in Progress, Internet-Draft, draft-palet-v6ops-ipv6-
+ only-05, 9 March 2020,
+ <https://datatracker.ietf.org/doc/html/draft-palet-v6ops-
+ ipv6-only-05>.
+
+ [IPv6Forum]
+ IPv6Forum, "Estimating IPv6 & DNSSEC External Service
+ Deployment Status", 2023,
+ <https://www.ipv6forum.com/IPv6-Monitoring/index.html>.
+
+ [ISIF-ASIA-G]
+ India Internet Engineering Society (IIESoc), "IPv6
+ Deployment at Enterprises", March 2022,
+ <https://isif.asia/ipv6-deployment-at-enterprises/>.
+
+ [ISOC1] Internet Society, "State of IPv6 Deployment 2018", June
+ 2018, <https://www.internetsociety.org/resources/2018/
+ state-of-ipv6-deployment-2018/>.
+
+ [ISOC2] York, D., "Facebook News Feeds Load 20-40% Faster Over
+ IPv6", April 2015,
+ <https://www.internetsociety.org/blog/2015/04/facebook-
+ news-feeds-load-20-40-faster-over-ipv6/>.
+
+ [ISOC3] Gont, F., "IPv6 Security Frequently Asked Questions
+ (FAQ)", January 2019, <https://www.internetsociety.org/wp-
+ content/uploads/2019/02/Deploy360-IPv6-Security-FAQ.pdf>.
+
+ [MAPRG] Bajpai, V., "Measuring YouTube Content Delivery over
+ IPv6", IETF 99 Proceedings, July 2017,
+ <https://datatracker.ietf.org/meeting/99/materials/slides-
+ 99-maprg-measuring-youtube-content-delivery-over-ipv6-00>.
+
+ [Mcrsft] Microsoft, "IPv6 for Azure VMs available in most regions",
+ September 2016, <https://azure.microsoft.com/en-
+ us/updates/ipv6-for-azure-vms/>.
+
+ [ND-CONSIDERATIONS]
+ Xiao, X., Vasilenko, E., Metz, E., Mishra, G., and N.
+ Buraglio, "Selectively Applying Host Isolation to Simplify
+ IPv6 First-hop Deployment", Work in Progress, Internet-
+ Draft, draft-ietf-v6ops-nd-considerations-00, 24 October
+ 2022, <https://datatracker.ietf.org/doc/html/draft-ietf-
+ v6ops-nd-considerations-00>.
+
+ [NRO] NRO, "Internet Number Resource Status Report", September
+ 2021, <https://www.nro.net/wp-content/uploads/NRO-
+ Statistics-2021-Q3-FINAL.pdf>.
+
+ [NST_1] NIST, "Estimating Industry IPv6 & DNSSEC External Service
+ Deployment Status", 2023, <https://fedv6-
+ deployment.antd.nist.gov/cgi-bin/generate-com>.
+
+ [NST_2] NIST, "Estimating USG IPv6 & DNSSEC External Service
+ Deployment Status", 2023, <https://fedv6-
+ deployment.antd.nist.gov/cgi-bin/generate-gov>.
+
+ [NST_3] NIST, "Estimating University IPv6 & DNSSEC External
+ Service Deployment Status", 2023, <https://fedv6-
+ deployment.antd.nist.gov/cgi-bin/generate-edu>.
+
+ [Ntflx] Aggarwal, R. and D. Temkin, "Enabling Support for IPv6",
+ July 2012, <https://netflixtechblog.com/enabling-support-
+ for-ipv6-48a495d5196f>.
+
+ [POTAROO1] Huston, G., "IP Addressing through 2021", January 2022,
+ <https://www.potaroo.net/ispcol/2022-01/addr2021.html>.
+
+ [POTAROO2] POTAROO, "IPv6 Resource Allocations", March 2023,
+ <https://www.potaroo.net/bgp/iso3166/v6cc.html>.
+
+ [RelJio] Chandra, R., "IPv6-only adoption challenges and
+ standardization requirements", IETF 109 Proceedings,
+ November 2020,
+ <https://datatracker.ietf.org/meeting/109/materials/
+ slides-109-v6ops-ipv6-only-adoption-challenges-and-
+ standardization-requirements-03>.
+
+ [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless
+ Address Autoconfiguration", RFC 4862,
+ DOI 10.17487/RFC4862, September 2007,
+ <https://www.rfc-editor.org/info/rfc4862>.
+
+ [RFC5095] Abley, J., Savola, P., and G. Neville-Neil, "Deprecation
+ of Type 0 Routing Headers in IPv6", RFC 5095,
+ DOI 10.17487/RFC5095, December 2007,
+ <https://www.rfc-editor.org/info/rfc5095>.
+
+ [RFC6264] Jiang, S., Guo, D., and B. Carpenter, "An Incremental
+ Carrier-Grade NAT (CGN) for IPv6 Transition", RFC 6264,
+ DOI 10.17487/RFC6264, June 2011,
+ <https://www.rfc-editor.org/info/rfc6264>.
+
+ [RFC6980] Gont, F., "Security Implications of IPv6 Fragmentation
+ with IPv6 Neighbor Discovery", RFC 6980,
+ DOI 10.17487/RFC6980, August 2013,
+ <https://www.rfc-editor.org/info/rfc6980>.
+
+ [RFC7872] Gont, F., Linkova, J., Chown, T., and W. Liu,
+ "Observations on the Dropping of Packets with IPv6
+ Extension Headers in the Real World", RFC 7872,
+ DOI 10.17487/RFC7872, June 2016,
+ <https://www.rfc-editor.org/info/rfc7872>.
+
+ [RFC8064] Gont, F., Cooper, A., Thaler, D., and W. Liu,
+ "Recommendation on Stable IPv6 Interface Identifiers",
+ RFC 8064, DOI 10.17487/RFC8064, February 2017,
+ <https://www.rfc-editor.org/info/rfc8064>.
+
+ [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6
+ (IPv6) Specification", STD 86, RFC 8200,
+ DOI 10.17487/RFC8200, July 2017,
+ <https://www.rfc-editor.org/info/rfc8200>.
+
+ [RFC8305] Schinazi, D. and T. Pauly, "Happy Eyeballs Version 2:
+ Better Connectivity Using Concurrency", RFC 8305,
+ DOI 10.17487/RFC8305, December 2017,
+ <https://www.rfc-editor.org/info/rfc8305>.
+
+ [RFC8415] Mrugalski, T., Siodelski, M., Volz, B., Yourtchenko, A.,
+ Richardson, M., Jiang, S., Lemon, T., and T. Winters,
+ "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)",
+ RFC 8415, DOI 10.17487/RFC8415, November 2018,
+ <https://www.rfc-editor.org/info/rfc8415>.
+
+ [RFC8683] Palet Martinez, J., "Additional Deployment Guidelines for
+ NAT64/464XLAT in Operator and Enterprise Networks",
+ RFC 8683, DOI 10.17487/RFC8683, November 2019,
+ <https://www.rfc-editor.org/info/rfc8683>.
+
+ [RFC8981] Gont, F., Krishnan, S., Narten, T., and R. Draves,
+ "Temporary Address Extensions for Stateless Address
+ Autoconfiguration in IPv6", RFC 8981,
+ DOI 10.17487/RFC8981, February 2021,
+ <https://www.rfc-editor.org/info/rfc8981>.
+
+ [RFC9098] Gont, F., Hilliard, N., Doering, G., Kumari, W., Huston,
+ G., and W. Liu, "Operational Implications of IPv6 Packets
+ with Extension Headers", RFC 9098, DOI 10.17487/RFC9098,
+ September 2021, <https://www.rfc-editor.org/info/rfc9098>.
+
+ [RIPE1] Huston, G., "Measuring IPv6 Performance", October 2016,
+ <https://ripe73.ripe.net/wp-content/uploads/
+ presentations/35-2016-10-24-v6-performance.pdf>.
+
+ [RIPE2] RIPE, "IPv6 Security", January 2023,
+ <https://www.ripe.net/support/training/material/ipv6-
+ security/ipv6security-slides.pdf>.
+
+ [SNDVN] Cullen, C., "Sandvine releases 2020 Mobile Internet
+ Phenomena Report: YouTube is over 25% of all mobile
+ traffic", February 2020, <https://www.sandvine.com/press-
+ releases/sandvine-releases-2020-mobile-internet-phenomena-
+ report-youtube-is-over-25-of-all-mobile-traffic>.
+
+ [TMus] Lagerholm, S., "Going IPv6 Only", June 2018,
+ <https://pc.nanog.org/static/published/meetings/
+ NANOG73/1645/20180625_Lagerholm_T-
+ Mobile_S_Journey_To_v1.pdf>.
+
+ [US-CIO] Vought, R., "Memorandum for Heads of Executive Departments
+ and Agencies: Completing the Transition to Internet
+ Protocol Version 6 (IPv6)", 2020,
+ <https://www.cio.gov/assets/resources/internet-protocol-
+ version6-draft.pdf>.
+
+ [US-FR] Federal Register, "Request for Comments on Updated
+ Guidance for Completing the Transition to the Next
+ Generation Internet Protocol, Internet Protocol Version 6
+ (IPv6)", March 2020, <https://www.federalregister.gov/
+ documents/2020/03/02/2020-04202/request-for-comments-on-
+ updated-guidance-for-completing-the-transition-to-the-
+ next-generation>.
+
+ [W3Techs] W3Techs, "Historical yearly trends in the usage statistics
+ of site elements for websites", 2023,
+ <https://w3techs.com/technologies/history_overview/
+ site_element/all/y>.
+
+ [WIPv6L] World IPv6 Launch, "Measurements", June 2022,
+ <https://www.worldipv6launch.org/measurements/>.
+
+Appendix A. Summary of Questionnaire and Replies for Network Operators
+
+ A survey was proposed to more than 50 service providers in the
+ European region during the third quarter of 2020 to ask for their
+ plans on IPv6 and the status of IPv6 deployment.
+
+ In this survey, 40 people, representing 38 organizations, provided
+ responses. This appendix summarizes the results obtained.
+
+ Respondents' business:
+
+ +============+========+=======+
+ | Convergent | Mobile | Fixed |
+ +============+========+=======+
+ | 82% | 8% | 11% |
+ +------------+--------+-------+
+
+ Table 10: Type of Operators
+
+ Question 1. Do you have plans to move more fixed, mobile, or
+ enterprise users to IPv6 in the next 2 years?
+
+ A. If so, fixed, mobile, or enterprise?
+
+ B. What are the reasons to do so?
+
+ C. When to start: already ongoing, in 12 months, or after 12 months?
+
+ D. Which transition solution will you use: Dual-Stack, DS-Lite,
+ 464XLAT, or MAP-T/E?
+
+ Answers for 1.A (38 respondents)
+
+ +=====+=====+
+ | Yes | No |
+ +=====+=====+
+ | 79% | 21% |
+ +-----+-----+
+
+ Table 11: Plan to Move
+ to IPv6 within 2 Years
+
+ +========+=======+============+=============+
+ | Mobile | Fixed | Enterprise | No Response |
+ +========+=======+============+=============+
+ | 63% | 63% | 50% | 3% |
+ +--------+-------+------------+-------------+
+
+ Table 12: Business Segment
+
+ Answers for 1.B (29 respondents)
+
+ Even though this was an open question, some common answers can be
+ found.
+
+ * 14 respondents (48%) highlighted issues related to IPv4 depletion.
+ The reason to move to IPv6 is to avoid private and/or overlapping
+ addresses.
+
+ * 6 respondents (20%) stated that 5G/IoT is a business incentive to
+ introduce IPv6.
+
+ * 4 respondents (13%) highlighted that there is a national
+ regulation request to associate and enable IPv6 with the launch of
+ 5G.
+
+ * 4 respondents (13%) considered IPv6 as a part of their innovation
+ strategy or an enabler for new services.
+
+ * 4 respondents (13%) introduced IPv6 because of enterprise customer
+ demand.
+
+ Answers for 1.C (30 respondents)
+
+ +=========+==============+=================+=============+
+ | Ongoing | In 12 months | After 12 months | No Response |
+ +=========+==============+=================+=============+
+ | 60% | 33% | 0% | 7% |
+ +---------+--------------+-----------------+-------------+
+
+ Table 13: Timeframe
+
+ Answers for 1.D (28 respondents for cellular, 27 for wireline)
+
+ +============+=========+=======+=============+
+ | Dual-Stack | 464XLAT | MAP-T | No Response |
+ +============+=========+=======+=============+
+ | 39% | 21% | 4% | 36% |
+ +------------+---------+-------+-------------+
+
+ Table 14: Transition in Use: Cellular
+
+ +============+=========+==========+=============+
+ | Dual-Stack | DS-Lite | 6RD/6VPE | No Response |
+ +============+=========+==========+=============+
+ | 59% | 19% | 4% | 19% |
+ +------------+---------+----------+-------------+
+
+ Table 15: Transition in Use: Wireline
+
+ Question 2. Do you need to change network devices for the above
+ goal?
+
+ A. If yes, what kind of devices: CPE, BNG/mobile core, or NAT?
+
+ B. Will you start the transition of your metro, backbone, or
+ backhaul network to support IPv6?
+
+ Answers for 2.A (30 respondents)
+
+ +=====+=====+=============+
+ | Yes | No | No Response |
+ +=====+=====+=============+
+ | 43% | 33% | 23% |
+ +-----+-----+-------------+
+
+ Table 16: Need to Change
+
+ +======+=========+=====+=====+=============+
+ | CPEs | Routers | BNG | CGN | Mobile core |
+ +======+=========+=====+=====+=============+
+ | 47% | 27% | 20% | 33% | 27% |
+ +------+---------+-----+-----+-------------+
+
+ Table 17: What to Change
+
+ Answers for 2.B (22 respondents)
+
+ +=====+========+=====+
+ | Yes | Future | No |
+ +=====+========+=====+
+ | 9% | 9% | 82% |
+ +-----+--------+-----+
+
+ Table 18: Plans for
+ Transition
+
+Appendix B. Summary of Questionnaire and Replies for Enterprises
+
+ The Industry Network Technology Council (INTC) developed the
+ following poll to verify the need or willingness of medium-to-large
+ US-based enterprises for training and consultancy on IPv6
+ <https://industrynetcouncil.org/> in early 2021.
+
+ 54 organizations provided answers.
+
+ Question 1. How much IPv6 implementation have you done at your
+ organization? (54 respondents)
+
+ +-------------------------------------------------+--------+
+ | None | 16.67% |
+ +-------------------------------------------------+--------+
+ | Some people have gotten some training | 16.67% |
+ +-------------------------------------------------+--------+
+ | Many people have gotten some training | 1.85% |
+ +-------------------------------------------------+--------+
+ | Website is IPv6 enabled | 7.41% |
+ +-------------------------------------------------+--------+
+ | Most equipment is dual-stacked | 31.48% |
+ +-------------------------------------------------+--------+
+ | Have an IPv6 transition plan for entire network | 5.56% |
+ +-------------------------------------------------+--------+
+ | Running IPv6-only in many places | 20.37% |
+ +-------------------------------------------------+--------+
+ | Entire network is IPv6-only | 0.00% |
+ +-------------------------------------------------+--------+
+
+ Table 19: IPv6 Implementation
+
+ Question 2. What kind of help or classes would you like to see INTC
+ do? (54 respondents)
+
+ +------------------------------------------------+--------+
+ | Classes/labs on IPv6 security | 66.67% |
+ +------------------------------------------------+--------+
+ | Classes/labs on IPv6 fundamentals | 55.56% |
+ +------------------------------------------------+--------+
+ | Classes/labs on address planning/network conf. | 57.41% |
+ +------------------------------------------------+--------+
+ | Classes/labs on IPv6 troubleshooting | 66.67% |
+ +------------------------------------------------+--------+
+ | Classes/labs on application conversion | 35.19% |
+ +------------------------------------------------+--------+
+ | Other | 14.81% |
+ +------------------------------------------------+--------+
+
+ Table 20: Help/Classes from INTC
+
+ Question 3. As you begin to think about the implementation of IPv6
+ at your organization, what areas do you feel are of concern? (54
+ respondents)
+
+ +-----------------------------+--------+
+ | Security | 31.48% |
+ +-----------------------------+--------+
+ | Application conversion | 25.93% |
+ +-----------------------------+--------+
+ | Training | 27.78% |
+ +-----------------------------+--------+
+ | All the above | 33.33% |
+ +-----------------------------+--------+
+ | Don't know enough to answer | 14.81% |
+ +-----------------------------+--------+
+ | Other | 9.26% |
+ +-----------------------------+--------+
+
+ Table 21: Areas of Concern for IPv6
+ Implementation
+
+Acknowledgements
+
+ The authors of this document would like to thank Brian Carpenter,
+ Fred Baker, Alexandre Petrescu, Fernando Gont, Barbara Stark,
+ Haisheng Yu (Johnson), Dhruv Dhody, Gábor Lencse, Shuping Peng,
+ Daniel Voyer, Daniel Bernier, Hariharan Ananthakrishnan, Donavan
+ Fritz, Igor Lubashev, Erik Nygren, Eduard Vasilenko, and Xipeng Xiao
+ for their comments and review of this document.
+
+Contributors
+
+ Nalini Elkins
+ Inside Products
+ Email: nalini.elkins@insidethestack.com
+
+
+ Sébastien Lourdez
+ Post Luxembourg
+ Email: sebastien.lourdez@post.lu
+
+
+Authors' Addresses
+
+ Giuseppe Fioccola
+ Huawei Technologies
+ Riesstrasse, 25
+ 80992 Munich
+ Germany
+ Email: giuseppe.fioccola@huawei.com
+
+
+ Paolo Volpato
+ Huawei Technologies
+ Via Lorenteggio, 240
+ 20147 Milan
+ Italy
+ Email: paolo.volpato@huawei.com
+
+
+ Jordi Palet Martinez
+ The IPv6 Company
+ Molino de la Navata, 75
+ 28420 La Navata - Galapagar, Madrid
+ Spain
+ Email: jordi.palet@theipv6company.com
+
+
+ Gyan S. Mishra
+ Verizon Inc.
+ Email: gyan.s.mishra@verizon.com
+
+
+ Chongfeng Xie
+ China Telecom
+ Email: xiechf@chinatelecom.cn