1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
2031
2032
2033
2034
2035
2036
2037
2038
2039
2040
2041
2042
2043
2044
2045
2046
2047
2048
2049
2050
2051
2052
2053
2054
2055
2056
2057
2058
2059
2060
2061
2062
2063
2064
2065
2066
2067
2068
2069
2070
2071
2072
2073
2074
2075
2076
2077
2078
2079
2080
2081
2082
2083
2084
2085
2086
2087
2088
2089
2090
2091
2092
2093
2094
2095
2096
2097
2098
2099
2100
2101
2102
2103
2104
2105
2106
2107
2108
2109
2110
2111
2112
2113
2114
2115
2116
2117
2118
2119
|
Internet Engineering Task Force (IETF) G. Fioccola
Request for Comments: 9386 P. Volpato
Obsoletes: 6036 Huawei Technologies
Category: Informational J. Palet Martinez
ISSN: 2070-1721 The IPv6 Company
G. Mishra
Verizon Inc.
C. Xie
China Telecom
April 2023
IPv6 Deployment Status
Abstract
This document provides an overview of the status of IPv6 deployment
in 2022. Specifically, it looks at the degree of adoption of IPv6 in
the industry, analyzes the remaining challenges, and proposes further
investigations in areas where the industry has not yet taken a clear
and unified approach in the transition to IPv6. It obsoletes RFC
6036.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Not all documents
approved by the IESG are candidates for any level of Internet
Standard; see Section 2 of RFC 7841.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc9386.
Copyright Notice
Copyright (c) 2023 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Revised BSD License text as described in Section 4.e of the
Trust Legal Provisions and are provided without warranty as described
in the Revised BSD License.
Table of Contents
1. Introduction
1.1. Terminology
2. IPv6: The Global Picture
2.1. IPv4 Address Exhaustion
2.1.1. IPv4 Addresses per Capita and IPv6 Status
2.2. IPv6 Users
2.3. IPv6 Web Content
2.4. IPv6 Public Actions and Policies
3. A Survey on IPv6 Deployments
3.1. IPv6 Allocations
3.2. IPv6 among Internet Service Providers
3.3. IPv6 among Enterprises
3.3.1. Government and Universities
4. IPv6 Deployment Scenarios
4.1. Dual-Stack
4.2. IPv6-Only Overlay
4.3. IPv6-Only Underlay
4.4. IPv4-as-a-Service
4.5. IPv6-Only
5. Common IPv6 Challenges
5.1. Transition Choices
5.1.1. Service Providers: Fixed and Mobile Operators
5.1.2. Enterprises
5.1.3. Industrial Internet
5.1.4. Content and Cloud Service Providers
5.1.5. CPEs and User Devices
5.1.6. Software Applications
5.2. Network Management and Operations
5.3. Performance
5.3.1. IPv6 Packet Loss and Latency
5.3.2. Customer Experience
5.4. IPv6 Security and Privacy
5.4.1. Protocols' Security Issues
6. IANA Considerations
7. Security Considerations
8. References
8.1. Normative References
8.2. Informative References
Appendix A. Summary of Questionnaire and Replies for Network
Operators
Appendix B. Summary of Questionnaire and Replies for Enterprises
Acknowledgements
Contributors
Authors' Addresses
1. Introduction
[RFC6036] describes IPv6 deployment scenarios that were adopted or
foreseen by a number of Internet Service Providers (ISPs) who
responded to a technical questionnaire in early 2010, and [RFC6036]
also provides practices and plans that were expected to take place in
the following years. Since the publication of [RFC6036], several
other documents have contributed to the IPv6 transition discussion in
operational environments. To name a few:
* [RFC6180] discusses IPv6 deployment models and transition
mechanisms, recommending those proven to be effective in
operational networks.
* [RFC6883] provides guidance and suggestions for Internet content
providers and Application Service Providers (ASPs).
* [RFC7381] introduces the guidelines of IPv6 deployment for
enterprises.
[RFC6540] recommends the support of IPv6 to all IP-capable nodes. It
was referenced in the IAB statement on IPv6 [IAB], which represented
a major step in driving the IETF and other Standards Development
Organizations (SDOs) towards using IPv6 in their works.
In more recent times, organizations, such as ETSI, provided more
contributions to the use of IPv6 in operational environments,
targeting IPv6 in different industry segments. As a result,
[ETSI-IP6-WhitePaper] was published to provide an updated view on the
IPv6 best practices adopted so far, in particular, in the ISP domain.
Considering all of the above, and after more than ten years since the
publication of [RFC6036], it is useful to assess the status of the
transition to IPv6. Some reasons include:
* In some areas, the lack of IPv4 addresses forced both carriers and
content providers to shift to IPv6 to support the introduction of
new applications, in particular, in wireless networks.
* Some governmental actions took place to encourage or even enforce
the adoption of IPv6 in certain countries.
* Looking at the global adoption of IPv6, this seems to have reached
a threshold that justifies speaking of end-to-end IPv6
connectivity, at least at the IPv6 service layer.
This document aims to provide a survey of the status of IPv6
deployment and highlight both the achievements and remaining
obstacles in the transition to IPv6 networks (and its coexistence
with continued IPv4 services). The target is to give an updated view
of the practices and plans already described in [RFC6036] to
encourage further actions and more investigations in those areas that
are still under discussion and to present the main incentives for the
adoption of IPv6.
This document is intended for a general audience interested in
understanding the status of IPv6 in different industries and network
domains. People who provide or use network services may find it
useful for the transition to IPv6. Also, people developing plans for
IPv6 adoption in an organization or in an industry may find
information and references for their analysis. Attention is given to
the different stages of the transition to IPv6 networks and services.
In particular, terminology on the use of "IPv6-only" is provided,
considering IPv6-only networks and services as the final stage of
such transition.
The topics discussed in this document are organized into four main
chapters.
* Section 2 reports data and analytics about the status of IPv6.
* Section 3 provides a survey of IPv6 deployments in different
environments, including ISPs, enterprises, and universities.
* Section 4 describes the IPv6 deployment approaches for Mobile
Broadband (MBB), Fixed Broadband (FBB), and enterprises.
* Section 5 analyzes the general challenges to be solved in the IPv6
transition. Specific attention is given to operations,
performance, and security issues.
1.1. Terminology
This section defines the terminology regarding the usage of IPv6-only
expressions within this document. The term IPv6-only is defined in
relation to the specific scope it is referring to. In this regard,
it may happen that only part of a service, a network, or even a node
is in an IPv6-only scope, and the rest is not. The most used terms
in relation to the different scopes are listed below:
IPv6-only interface:
The interface of a node is configured to forward only IPv6. This
denotes that just part of the node can be IPv6-only since the rest
of the interfaces of the same node may work with IPv4 as well. A
Dual-Stack interface is not an IPv6-only interface.
IPv6-only node:
The node uses only IPv6. All interfaces of the host only have
IPv6 addresses.
IPv6-only service:
It is used if, between the host's interface and the interface of
the content server, all packet headers of the service session are
IPv6.
IPv6-only overlay:
It is used if, between the end points of the tunnels, all inner
packet headers of the tunnels are IPv6. For example, IPv6-only
overlay in a fixed network means that the encapsulation is only
IPv6 between the interfaces of the Provider Edge (PE) nodes or
between the Customer Provider Edge (CPE) node and the Broadband
Network Gateway (BNG).
IPv6-only underlay:
It is used if the data plane and control plane are IPv6, but this
is not necessarily true for the management plane. For example,
IPv6-only underlay in a fixed network means that the underlay
network protocol is only IPv6 between any PE nodes, but they can
be Dual-Stack in overlay. Segment Routing over IPv6 (SRv6) is an
example of IPv6-only underlay.
IPv6-only network:
It is used if every node in this network is IPv6-only. IPv4
should not exist in an IPv6-only network. In particular, an
IPv6-only network's data plane, control plane, and management
plane must be IPv6. All PEs must be IPv6-only. Therefore, if
tunnels exist among PEs, both inner and outer headers must be
IPv6. For example, an IPv6-only access network means that every
node in this access network must be IPv6-only, and similarly, an
IPv6-only backbone network means that every node in this backbone
network must be IPv6-only.
IPv4-as-a-Service (IPv4aaS):
IPv4 service support is provided by means of a transition
mechanism; therefore, there is a combination of encapsulation/
translation + IPv6-only underlay + decapsulation/translation. For
an IPv6-only network, connectivity to legacy IPv4 is either non-
existent or provided by IPv4aaS mechanisms.
Note that IPv6-only definitions are also discussed in
[IPv6-ONLY-DEF].
2. IPv6: The Global Picture
This section deals with some key questions related to IPv6, namely:
(1) the status of IPv4 exhaustion, often considered as one of the
triggers to switch to IPv6, (2) the number of IPv6 end users, a
primary measure to sense IPv6 adoption, (3) the percentage of
websites reachable over IPv6, and (4) a report on IPv6 public actions
and policies.
These parameters are monitored by the Regional Internet Registries
(RIRs) and other institutions worldwide, as they provide a first-
order indication on the adoption of IPv6.
2.1. IPv4 Address Exhaustion
According to [CAIR], there will be 29.3 billion networked devices by
2023, up from 18.4 billion in 2018. This poses the question about
whether the IPv4 address space can sustain such a number of
allocations and, consequently, if this may affect the process of its
exhaustion. The answer is not straightforward, as many aspects have
to be considered.
On one hand, the RIRs are reporting scarcity of available and still-
reserved addresses. Table 3 of [POTAROO1] (January 2022) shows that
the available pool of the five RIRs at the end of 2021 counted 5.2
million IPv4 addresses, while the reserved pool included another 12.1
million, for a total of 17.3 million IPv4 addresses (-5.5% year over
year, comparing 2021 against 2020). Table 1 of [POTAROO1] shows that
the total IPv4 allocated pool equaled 3.685 billion addresses
(+0.027% year over year). The ratio between the available addresses
and the total allocated was brought to 0.469% of the remaining IPv4
address space (from 0.474% at the end of 2020).
On the other hand, [POTAROO1] again highlights the role of both
address transfer and Network Address Translation (NAT) to counter the
IPv4 exhaustion. The transfer of IPv4 addresses can be done under
the control or registration of an RIR or on the so-called grey
market, where third parties operate to enable the buying/selling of
IPv4 addresses. In all cases, a set of IPv4 addresses is
"transferred" to a different holder that has the need to expand their
address range. As an example, [IGP-GT] and [NRO] show the amount of
transfers to recipient organizations in the different regions. Cloud
Service Providers (CSPs) appear to be the most active in buying IPv4
addresses to satisfy their need of providing IPv4 connectivity to
their tenants. NAT systems provide a means to absorb at least a
portion of the demand of public IPv4 addresses, as they enable the
use of private addressing in internal networks while limiting the use
of public addresses on their WAN-facing side. In the case of NAT,
architectural and operational issues remain. Private address space
cannot provide an adequate address span, especially for large
organizations, and the reuse of addresses may make the network more
complex. In addition, multiple levels of address translation may
coexist in a network, e.g., Carrier-Grade NAT (CGN) [RFC6264], based
on two stages of translation. This comes with an economic and
operational burden, as discussed later in this document.
2.1.1. IPv4 Addresses per Capita and IPv6 Status
The IPv4 addresses per capita ratio measures the quantity of IPv4
addresses allocated to a given country divided by the population of
that country. It provides an indication of the imbalanced
distribution of the IPv4 addresses worldwide. It clearly derives
from the allocation of addresses made in the early days of the
Internet.
The sources for measuring the IPv4 addresses per capita ratio are the
allocations done by the RIRs and the statistics about the world
population. In this regard, [POTAROO2] provides distribution files.
The next tables compare the number of IPv4 addresses available per
person in a certain country (IPv4 address per capita) against the
relative adoption of IPv6 in the same country (expressed as the
number of IPv6-capable users in the considered country). The table
shows just a subset of the data available from [POTAROO2]. In
particular, the following table provides the data for the 25 most
populated countries in the world. The table is ordered based on the
IPv4 addresses per capita ratio, and the data refer to 1 January
2022.
+==============================+=================+=================+
| Country | IPv4 per Capita | IPv6 Deployment |
+==============================+=================+=================+
| United States of America | 4.89 | 47.1% |
+------------------------------+-----------------+-----------------+
| United Kingdom | 1.65 | 33.2% |
+------------------------------+-----------------+-----------------+
| Japan | 1.50 | 36.7% |
+------------------------------+-----------------+-----------------+
| Germany | 1.48 | 53.0% |
+------------------------------+-----------------+-----------------+
| France | 1.27 | 42.1% |
+------------------------------+-----------------+-----------------+
| Italy | 0.91 | 4.7% |
+------------------------------+-----------------+-----------------+
| South Africa | 0.46 | 2.4% |
+------------------------------+-----------------+-----------------+
| Brazil | 0.41 | 38.7% |
+------------------------------+-----------------+-----------------+
| Russian Federation | 0.31 | 9.7% |
+------------------------------+-----------------+-----------------+
| China | 0.24 | 60.1%(*) |
+------------------------------+-----------------+-----------------+
| Egypt | 0.24 | 4.3% |
+------------------------------+-----------------+-----------------+
| Mexico | 0.23 | 41.8% |
+------------------------------+-----------------+-----------------+
| Turkey | 0.20 | 0.2% |
+------------------------------+-----------------+-----------------+
| Vietnam | 0.17 | 48.0% |
+------------------------------+-----------------+-----------------+
| Iran (Islamic Republic) | 0.15 | 0.1% |
+------------------------------+-----------------+-----------------+
| Thailand | 0.13 | 40.8% |
+------------------------------+-----------------+-----------------+
| Indonesia | 0.07 | 5.0% |
+------------------------------+-----------------+-----------------+
| Philippines | 0.05 | 13.8% |
+------------------------------+-----------------+-----------------+
| India | 0.03 | 76.9% |
+------------------------------+-----------------+-----------------+
| Pakistan | 0.03 | 2.1% |
+------------------------------+-----------------+-----------------+
| United Republic of Tanzania | 0.02 | 0.0% |
+------------------------------+-----------------+-----------------+
| Nigeria | 0.02 | 0.2% |
+------------------------------+-----------------+-----------------+
| Bangladesh | 0.01 | 0.3% |
+------------------------------+-----------------+-----------------+
| Ethiopia | 0.00 | 0.0% |
+------------------------------+-----------------+-----------------+
| Democratic Republic of Congo | 0.00 | 0.1% |
+------------------------------+-----------------+-----------------+
Table 1: IPv4 per Capita and IPv6 Deployment for the Top 25 Most
Populated Countries in the World (as of January 2022)
(*) The IPv6 deployment information in China is derived from
[CN-IPv6].
A direct correlation between low IPv4 per capita and high IPv6
adoption is not immediate, yet some indications emerge. For example,
some countries, such as Brazil, China, and India, have clearly moved
towards IPv6 adoption. As discussed later, this appears related to
several factors in addition to the lack of IPv4 addresses, including
local regulation and market-driven actions. The 5 countries at the
top of the table, with relative high availability of IPv4 addresses,
have also shown a good level of IPv6 adoption. In other cases, a
relative scarcity of IPv4 addresses has not meant a clear move
towards IPv6, as several countries listed in the table still have low
or very low IPv6 adoption.
2.2. IPv6 Users
The count of the IPv6 users is the key parameter to get an immediate
understanding of the adoption of IPv6. Some organizations constantly
track the usage of IPv6 by aggregating data from several sources. As
an example, the Internet Society constantly monitors the volume of
IPv6 traffic for the networks that joined the World IPv6 Launch
initiative [WIPv6L]. The measurement aggregates statistics from
organizations, such as [Akm-stats], that provide data down to the
single network level, measuring the number of hits to their content
delivery platform. For the scope of this document, the approach used
by APNIC to quantify the adoption of IPv6 by means of a script that
runs on a user's device [CAIDA] is considered. To give a rough
estimation of the relative growth of IPv6, the next table aggregates
the total number of estimated IPv6-capable users as of 1 January 2022
and compares it against the total Internet users, as measured by
[POTAROO2].
+=====+==========+==========+==========+==========+==========+=====+
| | Jan 2018 | Jan 2019 | Jan 2020 | Jan 2021 | Jan 2022 |CAGR |
+=====+==========+==========+==========+==========+==========+=====+
|IPv6 | 513.07 | 574.02 | 989.25 | 1,136.28 | 1,207.61 |23.9%|
+-----+----------+----------+----------+----------+----------+-----+
|World| 3,410.27 | 3,470.36 | 4,065.00 | 4,091.62 | 4,093.69 | 4.7%|
+-----+----------+----------+----------+----------+----------+-----+
|Ratio| 15.0% | 16.5% | 24.3% | 27.8% | 29.5% |18.4%|
+-----+----------+----------+----------+----------+----------+-----+
Table 2: IPv6-Capable Users against Total Users (in Millions) as
of January 2022
Two figures appear: first, the IPv6 Internet population is growing
with a two-digit Compound Annual Growth Rate (CAGR), and second, the
ratio IPv6 over total is also growing steadily.
2.3. IPv6 Web Content
[W3Techs] keeps track of the use of several technical components of
websites worldwide through different analytical engines. The
utilization of IPv6 for websites is shown in the next table, where
the percentages refer to the websites that are accessible over IPv6.
+===========+=======+=======+=======+=======+=======+=======+
| Worldwide | Jan | Jan | Jan | Jan | Jan | CAGR |
| Websites | 2018 | 2019 | 2020 | 2021 | 2022 | |
+===========+=======+=======+=======+=======+=======+=======+
| % of IPv6 | 11.4% | 13.3% | 15.0% | 17.5% | 20.6% | 15.9% |
+-----------+-------+-------+-------+-------+-------+-------+
Table 3: Usage of IPv6 in Websites (as of January 2022)
Looking at the growth rate, it may not appear particularly high. It
has to be noted, though, that not all websites are equal. The
largest content providers, which already support IPv6, generate a lot
more content than small websites. At the beginning of January 2022,
[Csc6lab] measured that out of the world's top 500 sites, 203 are
IPv6 enabled (+3.6% from January 2021 to January 2022). If we
consider that the big content providers (such as Google, Facebook,
and Netflix) generate more than 50% of the total mobile traffic
[SNDVN], and in some cases even more up to 65% [ISOC1] [HxBld], the
percentage of content accessible over IPv6 is clearly more relevant
than the number of enabled IPv6 websites. Of that 50% of all mobile
traffic, it would be interesting to know what percentage is IPv6.
Unfortunately, this information is not available.
Related to that, a question that sometimes arises is whether the
content stored by content providers would be all accessible on IPv6
in the hypothetical case of a sudden IPv4 switch off. Even if this
is pure speculation, the numbers above may bring to state that this
is likely the case. This would reinforce the common thought that, in
quantitative terms, most of the content is accessible via IPv6.
2.4. IPv6 Public Actions and Policies
As previously noted, the worldwide deployment of IPv6 is not uniform
[G_stats] [APNIC1]. It is worth noticing that, in some cases, higher
IPv6 adoption in certain countries has been achieved as a consequence
of actions taken by the local governments through regulation or
incentive to the market. Looking at the European Union area, some
countries, such as Belgium, France, and Germany, are well ahead in
terms of IPv6 adoption.
In the case of Belgium, the Belgian Institute for Postal services and
Telecommunications (BIPT) acted to mediate an agreement between the
local ISPs and the government to limit the use of Carrier-Grade NAT
(CGN) systems and of public IPv4 addresses for lawful investigations
in 2012 [BIPT]. The agreement limited the use of one IPv4 address
per 16 customers behind NAT. The economic burden sustained by the
ISPs for the unoptimized use of NAT induced the shift to IPv6 and its
increased adoption in the latest years.
In France, the National Regulator (Autorite de regulation des
communications electroniques, or Arcep) introduced an obligation for
the mobile carriers awarded with a license to use 5G frequencies
(3.4-3.8 GHz) in Metropolitan France to be IPv6 compatible [ARCEP].
As stated in [ARCEP] (translated from French),
| The goal is to ensure that services are interoperable and to
| remove obstacles to using services that are only available in
| IPv6, as the number of devices in use continues to soar, and
| because the RIPE NCC has run out of IPv4 addresses.
A slow adoption of IPv6 could prevent new Internet services from
spreading widely or create a barrier to entry for newcomers to the
market. Per [ARCEP] (translated from French), "IPv6 can help to
increase competition in the telecom industry, and help to
industrialize a country for specific vertical sectors".
Increased IPv6 adoption in Germany depended on a mix of industry and
public actions. Specifically, the Federal Office for Information
Technology (under the Federal Ministry of the Interior) issued over
the years a few recommendations on the use of IPv6 in the German
public administration. The latest guideline in 2019 constitutes a
high-level road map for mandatory IPv6 introduction in the federal
administration networks [GFA].
In the United States, the Office of Management and Budget is also
calling for IPv6 adoption [US-FR] [US-CIO]. These documents define a
plan to have 80% of the US federal IP-capable networks based on
IPv6-only by the year 2025. China is another example of a government
that is supporting a country-wide IPv6 adoption [CN]. In India, the
high adoption of IPv6 took origin from the decision of Reliance Jio
to move to IPv6 in their networks [RelJio]. In addition, the
Department of Telecommunications (under the Ministry of
Communications and Information Technology) issued guidelines for the
progressive adoption of IPv6 in public and private networks. The
latest one dates 2021 [IDT] and fosters further moves to IPv6
connection services.
3. A Survey on IPv6 Deployments
This section discusses the status of IPv6 adoption in service
provider and enterprise networks.
3.1. IPv6 Allocations
RIRs are responsible for allocating IPv6 address blocks to ISPs,
Local Internet Registries (LIRs), and enterprises or other
organizations. An ISP/LIR will use the allocated block to assign
addresses to their end users. The following table shows the amount
of individual allocations, per RIR, in the time period from 2017-2021
[APNIC2].
+==========+=====+=======+=======+=======+=======+===========+====+
| Registry |Dec | Dec | Dec | Dec | Dec | Cumulated |CAGR|
| |2017 | 2018 | 2019 | 2020 | 2021 | | |
+==========+=====+=======+=======+=======+=======+===========+====+
| AFRINIC | 112| 110 | 115 | 109 | 136 | 582 | 51%|
+----------+-----+-------+-------+-------+-------+-----------+----+
| APNIC |1,369| 1,474 | 1,484 | 1,498 | 1,392 | 7,217 | 52%|
+----------+-----+-------+-------+-------+-------+-----------+----+
| ARIN | 684| 659 | 605 | 644 | 671 | 3,263 | 48%|
+----------+-----+-------+-------+-------+-------+-----------+----+
| LACNIC |1,549| 1,448 | 1,614 | 1,801 | 730 | 7,142 | 47%|
+----------+-----+-------+-------+-------+-------+-----------+----+
| RIPE NCC |2,051| 2,620 | 3,104 | 1,403 | 2,542 | 11,720 | 55%|
+----------+-----+-------+-------+-------+-------+-----------+----+
| Total |5,765| 6,311 | 6,922 | 5,455 | 5,471 | 29,924 | 51%|
+----------+-----+-------+-------+-------+-------+-----------+----+
Table 4: IPv6 Allocations Worldwide (as of January 2022)
The trend shows the steady progress of IPv6. The decline of IPv6
allocations in 2020 and 2021 may be due to the COVID-19 pandemic. It
also happened to IPv4 allocations.
[APNIC2] also compares the number of allocations for both address
families. The CAGR looks quite similar in 2021 but a little higher
for the IPv4 allocations in comparison to the IPv6 allocations (53.6%
versus 50.9%).
+=========+=====+=====+========+=======+=======+===========+=======+
| Address |Dec |Dec | Dec | Dec | Dec | Cumulated | CAGR |
| family |2017 |2018 | 2019 | 2020 | 2021 | | |
+=========+=====+=====+========+=======+=======+===========+=======+
| IPv6 |5,765|6,311| 6,922 | 5,455 | 5,471 | 29,924 | 50.9% |
+---------+-----+-----+--------+-------+-------+-----------+-------+
| IPv4 |8,091|9,707| 13,112 | 6,263 | 7,829 | 45,002 | 53.6% |
+---------+-----+-----+--------+-------+-------+-----------+-------+
Table 5: Allocations per Address Family (as of January 2022)
The reason may be that the IPv4 allocations in 2021 included many
allocations of small address ranges (e.g., /24) [APNIC2]. On the
contrary, a single IPv6 allocation is large enough to cope with the
need of an operator for long period. After an operator receives an
IPv6 /30 or /32 allocation, it is unlikely that a new request of
addresses is repeated in the short term.
The next table is based on [APNIC3] and [APNIC4] and shows the
percentage of Autonomous Systems (ASes) supporting IPv6 compared to
the total ASes worldwide. The number of IPv6-capable ASes increased
from 24.3% in January 2018 to 38.7% in January 2022. This equals to
18% of the CAGR for IPv6-enabled networks. In comparison, the CAGR
for the total of IPv6 and IPv4 networks is just 5%.
+==============+========+========+========+========+========+======+
| Advertised | Jan | Jan | Jan | Jan | Jan | CAGR |
| ASN | 2018 | 2019 | 2020 | 2021 | 2022 | |
+==============+========+========+========+========+========+======+
| IPv6-capable | 14,500 | 16,470 | 18,650 | 21,400 | 28,140 | 18% |
+--------------+--------+--------+--------+--------+--------+------+
| Total ASN | 59,700 | 63,100 | 66,800 | 70,400 | 72,800 | 5% |
+--------------+--------+--------+--------+--------+--------+------+
| Ratio | 24.3% | 26.1% | 27.9% | 30.4% | 38.7% | |
+--------------+--------+--------+--------+--------+--------+------+
Table 6: Percentage of IPv6-Capable ASes (as of January 2022)
The tables above provide an aggregated view of the allocations'
dynamic. The next subsections will zoom into each specific domain to
highlight its relative status.
3.2. IPv6 among Internet Service Providers
A survey was submitted to a group of service providers in Europe
during the third quarter of 2020 (see Appendix A for the complete
poll) to understand their plans about IPv6 and their technical
preferences regarding its adoption. Although this poll does not give
an exhaustive view on the IPv6 status, it provides some insights that
are relevant to the discussion.
The poll revealed that the majority of ISPs interviewed had plans
concerning IPv6 (79%). Of them, 60% had ongoing activities already,
while 33% were expected to start activities in a 12-month timeframe.
The transition to IPv6 involved all business segments: mobile (63%),
fixed (63%), and enterprise (50%).
The reasons to move to IPv6 varied. Global IPv4 address depletion
and the run out of private address space recommended in [RFC1918]
were reported as the important drivers for IPv6 deployment (48%). In
a few cases, respondents cited the requirement of national IPv6
policies and the launch of 5G as the reasons (13%). Enterprise
customer demand was also a reason to introduce IPv6 (13%).
From a technical preference standpoint, Dual-Stack [RFC4213] was the
most adopted solution in both wireline (59%) and cellular networks
(39%). In wireline, the second most adopted mechanism was Dual-Stack
Lite (DS-Lite) [RFC6333] (19%). In cellular networks, the second
preference was 464XLAT [RFC6877] (21%).
More details about the answers received can be found in Appendix A.
3.3. IPv6 among Enterprises
As described in [RFC7381], enterprises face different challenges than
ISPs. Publicly available reports show how the enterprise deployment
of IPv6 lags behind ISP deployment [cmpwr].
[NST_1] provides estimations on the deployment status of IPv6 for
domains such as example.com, example.net, or example.org in the
United States. The measurement encompasses many industries,
including telecommunications, so the term "enterprises" is a bit
loose in this context. In any case, it provides a first indication
of IPv6 adoption in several US industry sectors. The analysis tries
to infer whether IPv6 is supported by looking from "outside" a
company's network. It takes into consideration the support of IPv6
to external services, such as Domain Name System (DNS), mail, and
websites. [BGR_1] has similar data for China, while [CNLABS_1]
provides the status in India.
+===============+==================+=======+=======+=========+
| Country | Domains analyzed | DNS | Mail | Website |
+===============+==================+=======+=======+=========+
| China | 478 | 74.7% | 0.0% | 19.7% |
+---------------+------------------+-------+-------+---------+
| India | 104 | 51.9% | 15.4% | 16.3% |
+---------------+------------------+-------+-------+---------+
| United States | 1070 | 66.8% | 21.2% | 6.3% |
| of America | | | | |
+---------------+------------------+-------+-------+---------+
Table 7: IPv6 Support for External-Facing Services across
Enterprises (as of January 2022)
A poll submitted to a group of large enterprises in North America in
early 2021 (see Appendix B) shows that the operational issues are
even more critical than for ISPs.
Looking at current implementations, almost one third has dual-stacked
networks, while 20% declares that portions of their networks are
IPv6-only. Additionally, 35% of the enterprises did not implement
IPv6 at all or are stuck at the training phase. In no case is the
network fully based on IPv6.
Speaking of training, the most critical needs are in the field of
IPv6 security and IPv6 troubleshooting (both highlighted by the two
thirds of respondents), followed by address planning / network
configurations (57.41%).
Coming to implementation, the three areas of concern are IPv6
security (31.48%), training (27.78%), and application conversion
(25.93%), and 33.33% of respondents think that all three areas are
all simultaneously of concern.
The full poll is reported in Appendix B.
3.3.1. Government and Universities
This section focuses specifically on the adoption of IPv6 in
governments and academia.
As far as governmental agencies are concerned, [NST_2] provides
analytics on the degree of IPv6 support for DNS, mail, and websites
across second-level domains associated with US federal agencies.
These domains are in the form of example.gov or example.fed. The
script used by [NST_2] has also been employed to measure the same
analytics in other countries, e.g., China [BGR_2], India [CNLABS_2],
and the European Union [IPv6Forum]. For this latter analytic, some
post-processing is necessary to filter out the non-European domains.
+====================+==================+=======+=======+=========+
| Country | Domains analyzed | DNS | Mail | Website |
+====================+==================+=======+=======+=========+
| China | 52 | 0.0% | 0.0% | 98.1% |
+--------------------+------------------+-------+-------+---------+
| European Union (*) | 19 | 47.4% | 0.0% | 21.1% |
+--------------------+------------------+-------+-------+---------+
| India | 618 | 7.6% | 6.5% | 7.1% |
+--------------------+------------------+-------+-------+---------+
| United States of | 1283 | 87.1% | 14.0% | 51.7% |
| America | | | | |
+--------------------+------------------+-------+-------+---------+
Table 8: IPv6 Support for External-Facing Services across
Governmental Institutions (as of January 2022)
(*) Both EU and country-specific domains are considered.
IPv6 support in the US is higher than other countries. This is
likely due to the IPv6 mandate set by [US-CIO]. In the case of
India, the degree of support seems still quite low. This is also
true for China, with the notable exception of a high percentage of
IPv6-enabled websites for government-related organizations.
Similar statistics are also available for higher education. [NST_3]
measures the data from second-level domains of universities in the
US, such as example.edu. [BGR_3] looks at Chinese education-related
domains. [CNLABS_1] analyzes domains in India (mostly third level),
while [IPv6Forum] lists universities in the European Union (second
level), again after filtering the non-European domains.
+================+==================+=======+=======+=========+
| Country | Domains analyzed | DNS | Mail | Website |
+================+==================+=======+=======+=========+
| China | 111 | 36.9% | 0.0% | 77.5% |
+----------------+------------------+-------+-------+---------+
| European Union | 118 | 83.9% | 43.2% | 35.6% |
+----------------+------------------+-------+-------+---------+
| India | 100 | 31.0% | 54.0% | 5.0% |
+----------------+------------------+-------+-------+---------+
| United States | 346 | 49.1% | 19.4% | 21.7% |
| of America | | | | |
+----------------+------------------+-------+-------+---------+
Table 9: IPv6 Support for External-Facing Services across
Universities (as of January 2022)
Overall, the universities have wider support of IPv6-based services
compared to the other sectors. Apart from a couple of exceptions
(e.g., the support of IPv6 mail in China and IPv6 websites in India),
the numbers shown in the table above indicate good support of IPv6 in
academia.
4. IPv6 Deployment Scenarios
The scope of this section is to discuss the network and service
scenarios applicable for the transition to IPv6. Most of the related
definitions have been provided in Section 1.1. This clause is
intended to focus on the technical and operational characteristics.
The sequence of scenarios described here does not necessarily have to
be intended as a road map for the IPv6 transition. Depending on
their specific plans and requirements, service providers may either
adopt the scenarios proposed in a sequence or jump directly to a
specific one.
4.1. Dual-Stack
Based on the poll answers provided by network operators (Appendix A),
Dual-Stack [RFC4213] appears to be currently the most widely deployed
IPv6 solution (about 50%; see both Appendix A and the statistics
reported in [ETSI-IP6-WhitePaper]).
With Dual-Stack, IPv6 can be introduced together with other network
upgrades, and many parts of network management and IT systems can
still work in IPv4. This avoids a major upgrade of such systems to
support IPv6, which is possibly the most difficult task in the IPv6
transition. The cost and effort on the network management and IT
systems upgrade are moderate. The benefits are to start using IPv6
and save NAT costs.
Although Dual-Stack may provide advantages in the introductory stage,
it does have a few disadvantages in the long run, like the
duplication of the network resources and states. It also requires
more IPv4 addresses, thus increasing both Capital Expenses (CAPEX)
and Operating Expenses (OPEX). For example, even if private
addresses are used with Carrier-Grade NAT (CGN), there is extra
investment in the CGN devices, logs storage, and help desk to track
CGN-related issues.
For this reason, when IPv6 usage exceeds a certain threshold, it may
be advantageous to start a transition to the next scenario. For
example, the process may start with the IPv4aaS stage, as described
hereinafter. It is difficult to establish the criterion for
switching (e.g., to properly identify the upper bound of the IPv4
decrease or the lower bound of the IPv6 increase). In addition to
the technical factors, the switch to the next scenarios may also
cause a loss of customers. Based on the feedback of network
operators participating in the World IPv6 Launch [WIPv6L] in June
2021, 108 out of 346 operators exceed 50% of IPv6 traffic volume
(31.2%), 72 exceed 60% (20.8%), and 37 exceed 75% (10.7%). The
consensus to move to IPv6-only might be reasonable when IPv6 traffic
volume is between 50% and 60%.
4.2. IPv6-Only Overlay
As defined in Section 1.1, IPv6-only is generally associated with a
scope, e.g., IPv6-only overlay or IPv6-only underlay.
The IPv6-only overlay denotes that the overlay tunnel between the end
points of a network is based only on IPv6. Tunneling provides a way
to use an existing IPv4 infrastructure to carry IPv6 traffic. IPv6
or IPv4 hosts and routers can tunnel IPv6 packets over IPv4 regions
by encapsulating them within IPv4 packets. The approach with
IPv6-only overlay helps to maintain compatibility with the existing
base of IPv4, but it is not a long-term solution.
As a matter of fact, IPv4 reachability must be provided for a long
time to come over IPv6 for IPv6-only hosts. Most ISPs are leveraging
CGN to extend the life of IPv4 instead of going with IPv6-only
solutions.
4.3. IPv6-Only Underlay
The IPv6-only underlay network uses IPv6 as the network protocol for
all traffic delivery. Both the control and data planes are based on
IPv6. The definition of IPv6-only underlay needs to be associated
with a scope in order to identify the domain where it is applicable,
such as the IPv6-only access network or IPv6-only backbone network.
When both enterprises and service providers begin to transition from
an IPv4/MPLS backbone to introduce IPv6 in the underlay, they do not
necessarily need to Dual-Stack the underlay. Forwarding plane
complexity on the Provider (P) nodes of the ISP core should be kept
simple as a backbone with a single protocol. Hence, when operators
decide to transition to an IPv6 underlay, the ISP backbone should be
IPv6-only because Dual-Stack is not the best choice. The underlay
could be IPv6-only and allow IPv4 packets to be tunneled using a VPN
over an IPv6-only backbone while leveraging [RFC8950], which
specifies the extensions necessary to allow advertising IPv4 Network
Layer Reachability Information (NLRI) with an IPv6 next hop.
IPv6-only underlay network deployment for access and backbone
networks seems to not be the first option, and the current trend is
to keep the IPv4/MPLS data plane and run IPv4/IPv6 Dual-Stack to edge
nodes.
As ISPs do the transition in the future to an IPv6-only access
network or backbone network, e.g., Segment Routing over IPv6 (SRv6)
data plane, they start the elimination of IPv4 from the underlay
transport network while continuing to provide IPv4 services.
Basically, as also shown by the poll among network operators, from a
network architecture perspective, it is not recommended to apply
Dual-Stack to the transport network per reasons mentioned above
related to the forwarding plane complexities.
4.4. IPv4-as-a-Service
IPv4aaS can be used to ensure IPv4 support, and it can be a complex
decision that depends on several factors, such as economic aspects,
policy, and government regulation.
[RFC9313] compares the merits of the most common transition solutions
for IPv4aaS, i.e., 464XLAT [RFC6877], DS-Lite [RFC6333], Lightweight
4over6 (lw4o6) [RFC7596], Mapping of Address and Port with
Encapsulation (MAP-E) [RFC7597], and Mapping of Address and Port
using Translation (MAP-T) [RFC7599], but does not provide an explicit
recommendation. However, the poll in Appendix A indicates that the
most widely deployed IPv6 transition solution in the Mobile Broadband
(MBB) domain is 464XLAT, while in the Fixed Broadband (FBB) domain,
it is DS-Lite.
Both are IPv4aaS solutions that leverage IPv6-only underlay. IPv4aaS
offers Dual-Stack service to users and allows an ISP to run IPv6-only
in the network, typically the access network.
While it may not always be the case, IPv6-only transition
technologies, such as 464XLAT, require far fewer IPv4 addresses
[RFC9313], because they are more efficient and do not restrict the
number of ports per subscriber. This helps to reduce troubleshooting
costs and to remove some operational issues related to permanent
block listing of IPv4 address blocks when used via CGN in some
services.
IPv4aaS may be facilitated by the natural upgrade or replacement of
CPEs because of newer technologies (triple-play, higher bandwidth WAN
links, better Wi-Fi technologies, etc.). The CAPEX and OPEX of other
parts of the network may be lowered (for example, CGN and associated
logs) due to the operational simplification of the network.
For deployments with a large number of users (e.g., large mobile
operators) or a large number of hosts (e.g., large Data Centers
(DCs)), even the full private address space [RFC1918] is not enough.
Also, Dual-Stack will likely lead to duplication of network resources
and operations to support both IPv6 and IPv4, which increases the
amount of state information in the network. This suggests that, for
scenarios such as MBB or large DCs, IPv4aaS could be more efficient
from the start of the IPv6 introduction.
So, in general, when the Dual-Stack disadvantages outweigh the
IPv6-only complexity, it makes sense to transition to IPv4aaS. Some
network operators have already started this process, as in the case
of [TMus], [RelJio], and [EE].
4.5. IPv6-Only
IPv6-only is the final stage of the IPv6 transition, and it happens
when a complete network, end to end, no longer has IPv4. No IPv4
address is configured for network management or anything else.
Since IPv6-only means that both underlay networks and overlay
services are only IPv6, it will take longer to happen.
5. Common IPv6 Challenges
This section lists common IPv6 challenges, which have been validated
and discussed during several meetings and public events. The scope
is to encourage more investigations. Despite that IPv6 has already
been well proven in production, there are some challenges to
consider. In this regard, it is worth noting that [ETSI-GR-IPE-001]
also discusses gaps that still exist in IPv6-related use cases.
5.1. Transition Choices
A service provider, an enterprise, or a CSP may perceive quite a
complex task with the transition to IPv6 due to the many technical
alternatives available and the changes required in management and
operations. Moreover, the choice of the method to support the
transition is an important challenge and may depend on factors
specific to the context, such as the IPv6 network design that fits
the service requirements, the network operations, and the deployment
strategy.
The subsections below briefly highlight the approaches that the
different parties may take and the related challenges.
5.1.1. Service Providers: Fixed and Mobile Operators
For fixed operators, the massive software upgrade of CPEs to support
Dual-Stack already started in most of the service provider networks.
On average, looking at the global statistics, the IPv6 traffic
percentage is currently around 40% [G_stats]. As highlighted in
Section 3.2, all major content providers have already implemented
Dual-Stack access to their services, and most of them have
implemented IPv6-only in their Data Centers. This aspect could
affect the decision on the IPv6 adoption for an operator, but there
are also other factors, like the current IPv4 address shortage, CPE
costs, CGN costs, and so on.
* Fixed operators with a Dual-Stack architecture can start defining
and applying a new strategy when reaching the limit in terms of
the number of IPv4 addresses available. This may be done through
CGN or with an IPv4aaS approach.
* Most of the fixed operators remain attached to a Dual-Stack
architecture, and many have already employed CGN. In this case,
it is likely that CGN boosts their ability to supply IPv4
connectivity to CPEs for more years to come. Indeed, only few
fixed operators have chosen to move to an IPv6-only scenario.
For mobile operators, the situation is quite different, since in some
cases, mobile operators are already stretching their IPv4 address
space. The reason is that CGN translation limits have been reached
and no more IPv4 public pool addresses are available.
* Some mobile operators choose to implement Dual-Stack as a first
and immediate mitigation solution.
* Other mobile operators prefer to move to IPv4aaS solutions (e.g.,
464XLAT) since Dual-Stack only mitigates and does not solve the
IPv4 address scarcity issue completely.
For both fixed and mobile operators, the approach for the transition
is not unique, and this brings different challenges in relation to
the network architecture and related costs; therefore, each operator
needs to do their own evaluations for the transition based on the
specific situation.
5.1.2. Enterprises
At present, the usage of IPv6 for enterprises often relies on
upstream service providers, since the enterprise connectivity depends
on the services provided by their upstream provider. Regarding the
enterprises' internal infrastructures, IPv6 shows its advantages in
the case of a merger and acquisition, because it can be avoided by
the overlapping of the two address spaces, which is common in case of
IPv4 private addresses. In addition, since several governments are
introducing IPv6 policies, all the enterprises providing consulting
services to governments are also required to support IPv6.
However, enterprises face some challenges. They are shielded from
IPv4 address depletion issues due to their prevalent use of proxy and
private addressing [RFC1918]; thus, they do not have the business
requirement or technical justification to transition to IPv6.
Enterprises need to find a business case and a strong motivation to
transition to IPv6 to justify additional CAPEX and OPEX. Also, since
Information and Communication Technologies (ICTs) are not the core
business for most of the enterprises, the ICT budget is often
constrained and cannot expand considerably. However, there are
examples of big enterprises that are considering IPv6 to achieve
business targets through a more efficient IPv6 network and to
introduce newer services that require IPv6 network architecture.
Enterprises worldwide, in particular small- and medium-sized
enterprises, are quite late to adopt IPv6, especially on internal
networks. In most cases, the enterprise engineers and technicians do
not have a great experience with IPv6, and the problem of application
porting to IPv6 looks quite difficult. As highlighted in the
relevant poll, the technicians may need to be trained, but the
management does not see a business need for adoption. This creates
an unfortunate cycle where the perceived complexity of the IPv6
protocol and concerns about security and manageability combine with
the lack of urgent business needs to prevent adoption of IPv6. In
2019 and 2020, there has been a concerted effort by some ARIN and
APNIC initiatives to provide training [ARIN-CG] [ISIF-ASIA-G].
5.1.3. Industrial Internet
In an industrial environment, Operational Technology (OT) refers to
the systems used to monitor and control processes within a factory or
production environment, while Information Technology (IT) refers to
anything related to computer technology and networking connectivity.
IPv6 is frequently mentioned in relation to Industry 4.0 and the
Internet of Things (IoT), affecting the evolution of both OT and IT.
There are potential advantages for using IPv6 for the Industrial
Internet of Things (IIoT), in particular, the large IPv6 address
space, the automatic IPv6 address configuration, and resource
discovery. However, its industrial adoption, in particular, in smart
manufacturing systems, has been much slower than expected. There are
still many obstacles and challenges that prevent its pervasive use.
The key problems identified are the incomplete or underdeveloped tool
support, the dependency on manual configuration, and the poor
knowledge of the IPv6 protocols. To promote the use of IPv6 for
smart manufacturing systems and IIoT applications, a generic approach
to remove these pain points is highly desirable. Indeed, as for
enterprises, it is important to provide an easy way to familiarize
system architects and software developers with the IPv6 protocol.
Advances in cloud-based platforms and developments in artificial
intelligence (AI) and machine learning (ML) allow OT and IT systems
to integrate and migrate to a centralized analytical, processing, and
integrated platform, which must act in real time. The limitation is
that manufacturing companies have diverse corporate cultures, and the
adoption of new technologies may lag as a result.
For Industrial Internet and related IIoT applications, it would be
desirable to leverage the configurationless characteristic of IPv6 to
automatically manage and control the IoT devices. In addition, it
could be interesting to have the ability to use IP-based
communication and standard application protocols at every point in
the production process and further reduce the use of specialized
communication systems.
5.1.4. Content and Cloud Service Providers
The high number of addresses required to connect the virtual and
physical elements in a Data Center and the necessity to overcome the
limitation posed by [RFC1918] have been the drivers to the adoption
of IPv6 in several CSP networks.
Most CSPs have adopted IPv6 in their internal infrastructure but are
also active in gathering IPv4 addresses on the transfer market to
serve the current business needs of IPv4 connectivity. As noted in
the previous section, most enterprises do not consider the transition
to IPv6 as a priority. To this extent, the use of IPv4-based network
services by the CSPs will last.
Several public references, as reported hereinafter, discuss how most
of the major players find themselves at different stages in the
transition to IPv6-only in their Data Center (DC) infrastructure. In
some cases, the transition already happened and the DC infrastructure
of these hyperscalers is completely based on IPv6.
It is interesting to look at how much traffic in a network is going
to Caches and Content Delivery Networks (CDNs). The response is
expected to be a high percentage, at least higher than 50% in most of
the cases, since all the key Caches and CDNs are ready for IPv6
[Cldflr] [Ggl] [Ntflx] [Amzn] [Mcrsft]. So the percentage of traffic
going to the key Caches/CDNs is a good approximation of the potential
IPv6 traffic in a network.
The challenges for CSPs are mainly related to the continuous support
of IPv4 to be guaranteed, since most CSPs already completed the
transition to IPv6-only. If, in the next years, the scarcity of IPv4
addresses becomes more evident, it is likely that the cost of buying
an IPv4 address by a CSP could be charged to their customers.
5.1.5. CPEs and User Devices
It can be noted that most of the user devices (e.g., smartphones)
have been IPv6 enabled for many years. But there are exceptions, for
example, for the past few years, smart TVs have typically had IPv6
support; however, not all the economies replace them at the same
pace.
As already mentioned, ISPs who historically provided public IPv4
addresses to their customers generally still have those IPv4
addresses (unless they chose to transfer them). Some have chosen to
put new customers on CGN but without touching existing customers.
Because of the extremely small number of customers who notice that
IPv4 is done via NAT444 (i.e., the preferred CGN solution for
carriers), it could be less likely to run out of IPv4 addresses and
private IPv4 space. But as IPv4-only devices and traffic reduce, the
need to support private and public IPv4 lessens. So to have CPEs
completely support IPv6 serves as an important challenge and
incentive to choose IPv4aaS solutions [ANSI] over Dual-Stack.
5.1.6. Software Applications
The transition to IPv6 requires that the application software is
adapted for use in IPv6-based networks ([ARIN-SW] provides an
example). The use of transition mechanisms like 464XLAT is essential
to support IPv4-only applications while they evolve to IPv6.
Depending on the transition mechanism employed, some issues may
remain. For example, in the case of NAT64/DNS64, the use of literal
IPv4 addresses, instead of DNS names, will fail unless mechanisms
such as Application Level Gateways (ALGs) are used. This issue is
not present in 464XLAT (see [RFC8683]).
It is worth mentioning Happy Eyeballs [RFC8305] as a relevant aspect
of application transition to IPv6.
5.2. Network Management and Operations
There are important IPv6 complementary solutions related to
Operations, Administration, and Maintenance (OAM) that look less
mature compared to IPv4. A Network Management System (NMS) has a
central role in the modern networks for both network operators and
enterprises, and its transition is a fundamental issue. This is
because some IPv6 products are not as field proven as IPv4 products,
even if conventional protocols (e.g., SNMP and RADIUS) already
support IPv6. In addition, an incompatible vendor road map for the
development of new NMS features affects the confidence of network
operators or enterprises.
An important factor is represented by the need for training the
network operations workforce. Deploying IPv6 requires that policies
and procedures have to be adjusted in order to successfully plan and
complete an IPv6 transition. Staff has to be aware of the best
practices for managing IPv4 and IPv6 assets. In addition to network
nodes, network management applications and equipment need to be
properly configured and, in some cases, also replaced. This may
introduce more complexity and costs for the transition.
Availability of both systems and training is necessary in areas such
as IPv6 addressing. IPv6 addresses can be assigned to an interface
through different means, such as Stateless Auto-Configuration (SLAAC)
[RFC4862], or by using the stateful Dynamic Host Configuration
Protocol (DHCP) [RFC8415]. IP Address Management (IPAM) systems may
contribute by handling the technical differences and automating some
of the configuration tasks, such as the address assignment or the
management of DHCP services.
5.3. Performance
People tend to compare the performance of IPv6 versus IPv4 to argue
or motivate the IPv6 transition. In some cases, IPv6 behaving
"worse" than IPv4 may be used as an argument for avoiding the full
adoption of IPv6. However, there are some aspects where IPv6 has
already filled (or is filling) the gap to IPv4. This position is
supported when looking at available analytics on two critical
parameters: packet loss and latency. These parameters have been
constantly monitored over time, but only a few comprehensive
measurement campaigns are providing up-to-date information. While
performance is undoubtedly an important issue to consider and worth
further investigation, the reality is that a definitive answer cannot
be found on what IP version performs better. Depending on the
specific use case and application, IPv6 is better; in others, the
same applies to IPv4.
5.3.1. IPv6 Packet Loss and Latency
[APNIC5] provides a measurement of both the failure rate and Round-
Trip Time (RTT) of IPv6 compared against IPv4. Both measures are
based on scripts that employ the three-way handshake of TCP. As
such, the measurement of the failure rate does not provide a direct
measurement of packet loss (which would need an Internet-wide
measurement campaign). That said, despite that IPv4 is still
performing better, the difference seems to have decreased in recent
years. Two reports, namely [RIPE1] and [APRICOT], discussed the
associated trend, showing how the average worldwide failure rate of
IPv6 is still a bit worse than IPv4. Reasons for this effect may be
found in endpoints with an unreachable IPv6 address, routing
instability, or firewall behavior. Yet, this worsening effect may
appear as disturbing for a plain transition to IPv6.
[APNIC5] also compares the latency of both address families.
Currently, the worldwide average is slightly in favor of IPv6.
Zooming at the country or even at the operator level, it is possible
to get more detailed information and appreciate that cases exist
where IPv6 is faster than IPv4. Regions (e.g., Western Europe,
Northern America, and Southern Asia) and countries (e.g., US, India,
and Germany) with an advanced deployment of IPv6 (e.g., greater than
45%) are showing that IPv6 has better performance than IPv4.
[APRICOT] highlights how when a difference in performance exists, it
is often related to asymmetric routing issues. Other possible
explanations for a relative latency difference relate to the
specificity of the IPv6 header, which allows packet fragmentation.
In turn, this means that hardware needs to spend cycles to analyze
all of the header sections, and when it is not capable of handling
one of them, it drops the packet. A few measurement campaigns on the
behavior of IPv6 in CDNs are also available [MAPRG] [INFOCOM]. The
TCP connection time is still higher for IPv6 in both cases, even if
the gap has reduced over the analysis time window.
5.3.2. Customer Experience
It is not totally clear if the customer experience is in some way
perceived as better when IPv6 is used instead of IPv4. In some
cases, it has been publicly reported by IPv6 content providers that
users have a better experience when using IPv6-only compared to IPv4
[ISOC2]. This could be explained because, in the case of an IPv6
user connecting to an application hosted in an IPv6-only Data Center,
the connection is end to end, without translations. Instead, when
using IPv4, there is a NAT translation either in the CPE or in the
service provider's network, in addition to IPv4 to IPv6 (and back to
IPv4) translation in the IPv6-only content provider Data Center.
[ISOC2] and [FB] provide reasons in favor of IPv6. In other cases,
the result seems to be still slightly in favor of IPv4 [INFOCOM]
[MAPRG], even if the difference between IPv4 and IPv6 tends to vanish
over time.
5.4. IPv6 Security and Privacy
An important point that is sometimes considered as a challenge when
discussing the transition to IPv6 is related to the security and
privacy. [RFC9099] analyzes the operational security issues in
several places of a network (enterprises, service providers, and
residential users). It is also worth considering the additional
security issues brought by the applied IPv6 transition technologies
used to implement IPv4aaS (e.g., 464XLAT and DS-Lite) [ComputSecur].
The security aspects have to be considered to keep at least the same,
or even a better, level of security as it exists nowadays in an IPv4
network environment. The autoconfiguration features of IPv6 will
require some more attention. Router discovery and address
autoconfiguration may produce unexpected results and security holes.
IPsec protects IPv6 traffic at least as well as it does IPv4, and the
security protocols for constrained devices (IoT) are designed for
IPv6 operation.
IPv6 was designed to restore the end-to-end model of communications
with all nodes on networks using globally unique addresses. But
considering this, IPv6 may imply privacy concerns due to greater
visibility on the Internet. IPv6 nodes can (and typically do) use
privacy extensions [RFC8981] to prevent any tracking of their burned-
in Media Access Control (MAC) address(es), which are easily readable
in the original modified 64-bit Extended Unique Identifier (EUI-64)
interface identifier format. On the other hand, stable IPv6
interface identifiers [RFC8064] were developed, and this can also
affect privacy.
As reported in [ISOC3], in comparing IPv6 and IPv4 at the protocol
level, one may probably conclude that the increased complexity of
IPv6 will result in an increased number of attack vectors that imply
more possible ways to perform different types of attacks. However, a
more interesting and practical question is how IPv6 deployments
compare to IPv4 deployments in terms of security. In that sense,
there are a number of aspects to consider.
Most security vulnerabilities related to network protocols are based
on implementation flaws. Typically, security researchers find
vulnerabilities in protocol implementations, which eventually are
"patched" to mitigate such vulnerabilities. Over time, this process
of finding and patching vulnerabilities results in more robust
implementations. For obvious reasons, the IPv4 protocols have
benefited from the work of security researchers for much longer, and
thus IPv4 implementations are generally more robust than IPv6.
However, with more IPv6 deployment, IPv6 will also benefit from this
process in the long run. It is also worth mentioning that most
vulnerabilities nowadays are caused by human beings and are in the
application layer, not the IP layer.
Besides the intrinsic properties of the protocols, the security level
of the resulting deployments is closely related to the level of
expertise of network and security engineers. In that sense, there is
obviously much more experience and confidence with deploying and
operating IPv4 networks than with deploying and operating IPv6
networks.
5.4.1. Protocols' Security Issues
In general, there are security concerns related to IPv6 that can be
classified as follows:
* Basic IPv6 protocol (basic header, extension headers, addressing)
* IPv6-associated protocols (ICMPv6, NDP, MLD, DNS, DHCPv6)
* Internet-wide IPv6 security (filtering, DDoS, transition
mechanisms)
ICMPv6 is an integral part of IPv6 and performs error reporting and
diagnostic functions. The Neighbor Discovery Protocol (NDP) is a
node discovery protocol in IPv6, which replaces and enhances
functions of ARP. Multicast Listener Discovery (MLD) is used by IPv6
routers for discovering multicast listeners on a directly attached
link, much like how the Internet Group Management Protocol (IGMP) is
used in IPv4.
These IPv6-associated protocols, like ICMPv6, NDP, and MLD, are
something new compared to IPv4, so they add new security threats and
the related solutions are still under discussion today. NDP has
vulnerabilities [RFC3756] [RFC6583]. [RFC3756] says to use IPsec,
but it is impractical and not used; on the other hand, SEcure
Neighbor Discovery (SEND) [RFC3971] is not widely available. It is
worth mentioning that applying host isolation may address many of
these concerns, as described in [ND-CONSIDERATIONS].
[RIPE2] describes the most important threats and solutions regarding
IPv6 security.
5.4.1.1. IPv6 Extension Headers and Fragmentation
IPv6 extension headers provide a hook for interesting new features to
be added and are more flexible than IPv4 options. This does add some
complexity. In particular, some security mechanisms may require
processing the full chain of headers, and some firewalls may require
filtering packets based on their extension headers. Additionally,
packets with IPv6 extension headers may be dropped in the public
Internet [RFC7872]. Some documents, e.g., [HBH-PROCESSING],
[HBH-OPT-HDR], and [IPv6-EXT-HDR], analyze and provide guidance
regarding the processing procedures of IPv6 extension headers.
Defense against possible attacks through extension headers is
necessary. For example, the original IPv6 Routing Header type 0
(RH0) was deprecated because of possible remote traffic amplification
[RFC5095]. In addition, it is worth mentioning that the unrecognized
Hop-by-Hop Options Header and Destination Options Header will not be
considered by the nodes if they are not configured to deal with it
[RFC8200]. Other attacks based on extension headers may be based on
IPv6 header chains and fragmentation that could be used to bypass
filtering. To mitigate this effect, the initial IPv6 header, the
extension headers, and the upper-layer header must all be in the
first fragment [RFC8200]. Also, the use of the IPv6 fragment header
is forbidden in all Neighbor Discovery messages [RFC6980].
The fragment header is used by the IPv6 source node to send a packet
bigger than the path MTU, and the destination host processes fragment
headers. There are several threats related to fragmentation to pay
attention to, e.g., overlapping fragments (not allowed), resource
consumption while waiting for the last fragment (to discard), and
atomic fragments (to be isolated).
The operational implications of IPv6 packets with extension headers
are further discussed in [RFC9098].
6. IANA Considerations
This document has no IANA actions.
7. Security Considerations
This document has no impact on the security properties of specific
IPv6 protocols or transition tools. In addition to the discussion
above in Section 5.4, the security considerations relating to the
protocols and transition tools are described in the relevant
documents.
8. References
8.1. Normative References
[RFC1918] Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G.
J., and E. Lear, "Address Allocation for Private
Internets", BCP 5, RFC 1918, DOI 10.17487/RFC1918,
February 1996, <https://www.rfc-editor.org/info/rfc1918>.
[RFC3756] Nikander, P., Ed., Kempf, J., and E. Nordmark, "IPv6
Neighbor Discovery (ND) Trust Models and Threats",
RFC 3756, DOI 10.17487/RFC3756, May 2004,
<https://www.rfc-editor.org/info/rfc3756>.
[RFC3971] Arkko, J., Ed., Kempf, J., Zill, B., and P. Nikander,
"SEcure Neighbor Discovery (SEND)", RFC 3971,
DOI 10.17487/RFC3971, March 2005,
<https://www.rfc-editor.org/info/rfc3971>.
[RFC4213] Nordmark, E. and R. Gilligan, "Basic Transition Mechanisms
for IPv6 Hosts and Routers", RFC 4213,
DOI 10.17487/RFC4213, October 2005,
<https://www.rfc-editor.org/info/rfc4213>.
[RFC6036] Carpenter, B. and S. Jiang, "Emerging Service Provider
Scenarios for IPv6 Deployment", RFC 6036,
DOI 10.17487/RFC6036, October 2010,
<https://www.rfc-editor.org/info/rfc6036>.
[RFC6180] Arkko, J. and F. Baker, "Guidelines for Using IPv6
Transition Mechanisms during IPv6 Deployment", RFC 6180,
DOI 10.17487/RFC6180, May 2011,
<https://www.rfc-editor.org/info/rfc6180>.
[RFC6333] Durand, A., Droms, R., Woodyatt, J., and Y. Lee, "Dual-
Stack Lite Broadband Deployments Following IPv4
Exhaustion", RFC 6333, DOI 10.17487/RFC6333, August 2011,
<https://www.rfc-editor.org/info/rfc6333>.
[RFC6540] George, W., Donley, C., Liljenstolpe, C., and L. Howard,
"IPv6 Support Required for All IP-Capable Nodes", BCP 177,
RFC 6540, DOI 10.17487/RFC6540, April 2012,
<https://www.rfc-editor.org/info/rfc6540>.
[RFC6583] Gashinsky, I., Jaeggli, J., and W. Kumari, "Operational
Neighbor Discovery Problems", RFC 6583,
DOI 10.17487/RFC6583, March 2012,
<https://www.rfc-editor.org/info/rfc6583>.
[RFC6877] Mawatari, M., Kawashima, M., and C. Byrne, "464XLAT:
Combination of Stateful and Stateless Translation",
RFC 6877, DOI 10.17487/RFC6877, April 2013,
<https://www.rfc-editor.org/info/rfc6877>.
[RFC6883] Carpenter, B. and S. Jiang, "IPv6 Guidance for Internet
Content Providers and Application Service Providers",
RFC 6883, DOI 10.17487/RFC6883, March 2013,
<https://www.rfc-editor.org/info/rfc6883>.
[RFC7381] Chittimaneni, K., Chown, T., Howard, L., Kuarsingh, V.,
Pouffary, Y., and E. Vyncke, "Enterprise IPv6 Deployment
Guidelines", RFC 7381, DOI 10.17487/RFC7381, October 2014,
<https://www.rfc-editor.org/info/rfc7381>.
[RFC7596] Cui, Y., Sun, Q., Boucadair, M., Tsou, T., Lee, Y., and I.
Farrer, "Lightweight 4over6: An Extension to the Dual-
Stack Lite Architecture", RFC 7596, DOI 10.17487/RFC7596,
July 2015, <https://www.rfc-editor.org/info/rfc7596>.
[RFC7597] Troan, O., Ed., Dec, W., Li, X., Bao, C., Matsushima, S.,
Murakami, T., and T. Taylor, Ed., "Mapping of Address and
Port with Encapsulation (MAP-E)", RFC 7597,
DOI 10.17487/RFC7597, July 2015,
<https://www.rfc-editor.org/info/rfc7597>.
[RFC7599] Li, X., Bao, C., Dec, W., Ed., Troan, O., Matsushima, S.,
and T. Murakami, "Mapping of Address and Port using
Translation (MAP-T)", RFC 7599, DOI 10.17487/RFC7599, July
2015, <https://www.rfc-editor.org/info/rfc7599>.
[RFC8950] Litkowski, S., Agrawal, S., Ananthamurthy, K., and K.
Patel, "Advertising IPv4 Network Layer Reachability
Information (NLRI) with an IPv6 Next Hop", RFC 8950,
DOI 10.17487/RFC8950, November 2020,
<https://www.rfc-editor.org/info/rfc8950>.
[RFC9099] Vyncke, É., Chittimaneni, K., Kaeo, M., and E. Rey,
"Operational Security Considerations for IPv6 Networks",
RFC 9099, DOI 10.17487/RFC9099, August 2021,
<https://www.rfc-editor.org/info/rfc9099>.
[RFC9313] Lencse, G., Palet Martinez, J., Howard, L., Patterson, R.,
and I. Farrer, "Pros and Cons of IPv6 Transition
Technologies for IPv4-as-a-Service (IPv4aaS)", RFC 9313,
DOI 10.17487/RFC9313, October 2022,
<https://www.rfc-editor.org/info/rfc9313>.
8.2. Informative References
[Akm-stats]
Akamai, "IPv6 Adoption Visualization", 2023,
<https://www.akamai.com/uk/en/resources/our-thinking/
state-of-the-internet-report/state-of-the-internet-ipv6-
adoption-visualization>.
[Amzn] Amazon Web Services, "Announcing Internet Protocol Version
6 (IPv6) support for Amazon CloudFront, AWS WAF, and
Amazon S3 Transfer Acceleration", October 2016,
<https://aws.amazon.com/es/about-aws/whats-new/2016/10/
ipv6-support-for-cloudfront-waf-and-s3-transfer-
acceleration/>.
[ANSI] ANSI, "Host and Router Profiles for IPv6", ANSI/
CTA 2048-A, October 2020, <https://shop.cta.tech/products/
host-and-router-profiles-for-ipv6>.
[APNIC1] APNIC Labs, "IPv6 Capable Rate by country (%)",
<https://stats.labs.apnic.net/ipv6>.
[APNIC2] Huston, G., "IP addressing in 2021", January 2022,
<https://blog.apnic.net/2022/01/19/ip-addressing-in-
2021/>.
[APNIC3] Huston, G., "BGP in 2020 - The BGP Table", January 2021,
<https://blog.apnic.net/2021/01/05/bgp-in-2020-the-bgp-
table/>.
[APNIC4] Huston, G., "BGP in 2021 - The BGP Table", January 2022,
<https://blog.apnic.net/2022/01/06/bgp-in-2021-the-bgp-
table/>.
[APNIC5] APNIC Labs, "Average RTT Difference (ms) (V6 - V4) for
World (XA)", <https://stats.labs.apnic.net/v6perf/XA>.
[APRICOT] Huston, G., "IPv6 Performance Measurement", February 2020,
<https://2020.apricot.net/assets/files/APAE432/ipv6-
performance-measurement.pdf>.
[ARCEP] ARCEP, "Proposant au ministre chargé des communications
électroniques les modalités et les conditions
d'attribution d'autorisations d'utilisation de fréquences
dans la bande 3,4 - 3,8 GHz", [Decision on the terms and
conditions for awarding licenses to use frequencies in the
3.4 – 3.8 GHz band], Décision n° [Decision No.] 2019-1386,
November 2019,
<https://www.arcep.fr/uploads/tx_gsavis/19-1386.pdf>.
[ARIN-CG] ARIN, "2020 ARIN Community Grant Program Recipients: IPv6
Security, Applications, and Training for Enterprises",
2020, <https://www.arin.net/about/community_grants/
recipients/2020>.
[ARIN-SW] ARIN, "Preparing Applications for IPv6",
<https://www.arin.net/resources/guide/ipv6/
preparing_apps_for_v6.pdf>.
[BGR_1] BIIGROUP, "China Commercial IPv6 and DNSSEC Deployment
Monitor", December 2021,
<http://218.2.231.237:5001/cgi-bin/generate>.
[BGR_2] BIIGROUP, "China Government IPv6 and DNSSEC Deployment
Monitor", December 2021,
<http://218.2.231.237:5001/cgi-bin/generate_gov>.
[BGR_3] BIIGROUP, "China Education IPv6 and DNSSEC Deployment
Monitor", December 2021,
<http://218.2.231.237:5001/cgi-bin/generate_edu>.
[BIPT] Vannieuwenhuyse, J., "IPv6 in Belgium", September 2017,
<https://www.ripe.net/participate/meetings/roundtable/
september-2017/government-roundtable-meeting-bahrain-26-
september-2017/presentations/belgium-experience-bahrain-
roundtable.pdf>.
[CAIDA] Huston, G., "Client-Side IPv6 Measurement", June 2020,
<https://www.cmand.org/workshops/202006-v6/
slides/2020-06-16-client-side.pdf>.
[CAIR] Cisco, "Cisco Annual Internet Report (2018-2023) White
Paper", March 2020,
<https://www.cisco.com/c/en/us/solutions/collateral/
executive-perspectives/annual-internet-report/white-paper-
c11-741490.html>.
[Cldflr] Cloudflare, "Understanding and configuring Cloudflare's
IPv6 support", <https://support.cloudflare.com/hc/en-us/
articles/229666767-Understanding-and-configuring-
Cloudflare-s-IPv6-support>.
[cmpwr] Elkins, N., "Impact on Enterprises of the IPv6-Only
Direction for the U.S. Federal Government",
<https://mydigitalpublication.com/article/
Impact+on+Enterprises+of+the+IPv6-Only+Direction+for+the+U
.S.+Federal+Government/3702828/664279/article.html>.
[CN] China.org.cn, "China to speed up IPv6-based Internet
development", November 2017, <http://www.china.org.cn/
business/2017-11/27/content_41948814.htm>.
[CN-IPv6] National IPv6 Deployment and Monitoring Platform, "Active
IPv6 Internet Users", (in Chinese), 2022,
<https://www.china-ipv6.cn/#/activeconnect/simpleInfo>.
[CNLABS_1] CNLABS, "Industry IPv6 and DNSSEC Statistics", 2022,
<https://cnlabs.in/IPv6_Mon/generate_industry.html>.
[CNLABS_2] CNLABS, "Government IPv6 and DNSSEC Statistics", 2022,
<https://cnlabs.in/IPv6_Mon/generate_gov.html>.
[ComputSecur]
Lencse, G. and Y. Kadobayashi, "Methodology for the
identification of potential security issues of different
IPv6 transition technologies: Threat analysis of DNS64 and
stateful NAT64", Computers and Security, Volume 77, Issue
C, pp. 397-411, DOI 10.1016/j.cose.2018.04.012, August
2018, <https://doi.org/10.1016/j.cose.2018.04.012>.
[Csc6lab] Cisco, "Display global data", 2023,
<https://6lab.cisco.com/stats/>.
[EE] Heatley, N., "IPv6-only Devices on EE Mobile", January
2017,
<https://indico.uknof.org.uk/event/38/contributions/489/
attachments/612/736/
Nick_Heatley_EE_IPv6_UKNOF_20170119.pdf>.
[ETSI-GR-IPE-001]
ETSI, "IPv6 Enhanced Innovation (IPE) Gap Analysis", ETSI
GR IPE 001, V1.1.1, August 2021,
<https://www.etsi.org/deliver/etsi_gr/
IPE/001_099/001/01.01.01_60/gr_IPE001v010101p.pdf>.
[ETSI-IP6-WhitePaper]
ETSI, "IPv6 Best Practices, Benefits, Transition
Challenges and the Way Forward", ETSI White Paper No. 35,
ISBN 979-10-92620-31-1, August 2020.
[FB] "Paul Saab Facebook V6 World Congress 2015", YouTube
video, 25:32, posted by Upperside Conferences, March 2015,
<https://youtu.be/An7s25FSK0U>.
[GFA] German Federal Government Commissioner for Information
Technology, "IPv6-Masterplan für die Bundesverwaltung",
[IPv6 Master Plan for the Federal Administration],
November 2019, <https://media.frag-den-
staat.de/files/foi/531501/de-government-ipv6-masterplan-
v100-entwurf_konvertiert.pdf>.
[Ggl] Google, "Introduction to GGC",
<https://support.google.com/interconnect/
answer/9058809?hl=en>.
[G_stats] Google, "Google IPv6 Statistics",
<https://www.google.com/intl/en/ipv6/statistics.html>.
[HBH-OPT-HDR]
Peng, S., Li, Z., Xie, C., Qin, Z., and G. Mishra,
"Operational Issues with Processing of the Hop-by-Hop
Options Header", Work in Progress, Internet-Draft, draft-
ietf-v6ops-hbh-04, 10 March 2023,
<https://datatracker.ietf.org/doc/html/draft-ietf-v6ops-
hbh-04>.
[HBH-PROCESSING]
Hinden, R. and G. Fairhurst, "IPv6 Hop-by-Hop Options
Processing Procedures", Work in Progress, Internet-Draft,
draft-ietf-6man-hbh-processing-07, 6 April 2023,
<https://datatracker.ietf.org/doc/html/draft-ietf-6man-
hbh-processing-07>.
[HxBld] HexaBuild, "IPv6 Adoption Report 2020: The IPv6 Internet
is the Corporate Network", November 2020,
<https://hexabuild.io/assets/files/HexaBuild-IPv6-
Adoption-Report-2020.pdf>.
[IAB] IAB, "IAB Statement on IPv6", November 2016,
<https://www.iab.org/2016/11/07/iab-statement-on-ipv6/>.
[IDT] Government of India: Department of Telecommunications,
"Revision of IPv6 Transition Timelines", February 2021,
<https://dot.gov.in/revision-ipv6-transition-timelines-
2021>.
[IGP-GT] Kuerbis, B. and M. Mueller, "The hidden standards war:
economic factors affecting IPv6 deployment", DOI
10.1108/DPRG-10-2019-0085, February 2019,
<https://www.emerald.com/insight/content/doi/10.1108/DPRG-
10-2019-0085/full/html>.
[INFOCOM] Doan, T., Bajpai, V., and S. Crawford, "A Longitudinal
View of Netflix: Content Delivery over IPv6 and Content
Cache Deployments", IEEE INFOCOM 2020, IEEE Conference on
Computer Communications, pp. 1073-1082,
DOI 10.1109/INFOCOM41043.2020.9155367, July 2020,
<https://dl.acm.org/doi/abs/10.1109/
INFOCOM41043.2020.9155367>.
[IPv6-EXT-HDR]
Bonica, R. and T. Jinmei, "Inserting, Processing And
Deleting IPv6 Extension Headers", Work in Progress,
Internet-Draft, draft-bonica-6man-ext-hdr-update-07, 24
February 2022, <https://datatracker.ietf.org/doc/html/
draft-bonica-6man-ext-hdr-update-07>.
[IPv6-ONLY-DEF]
Palet Martinez, J., "IPv6-only Terminology Definition",
Work in Progress, Internet-Draft, draft-palet-v6ops-ipv6-
only-05, 9 March 2020,
<https://datatracker.ietf.org/doc/html/draft-palet-v6ops-
ipv6-only-05>.
[IPv6Forum]
IPv6Forum, "Estimating IPv6 & DNSSEC External Service
Deployment Status", 2023,
<https://www.ipv6forum.com/IPv6-Monitoring/index.html>.
[ISIF-ASIA-G]
India Internet Engineering Society (IIESoc), "IPv6
Deployment at Enterprises", March 2022,
<https://isif.asia/ipv6-deployment-at-enterprises/>.
[ISOC1] Internet Society, "State of IPv6 Deployment 2018", June
2018, <https://www.internetsociety.org/resources/2018/
state-of-ipv6-deployment-2018/>.
[ISOC2] York, D., "Facebook News Feeds Load 20-40% Faster Over
IPv6", April 2015,
<https://www.internetsociety.org/blog/2015/04/facebook-
news-feeds-load-20-40-faster-over-ipv6/>.
[ISOC3] Gont, F., "IPv6 Security Frequently Asked Questions
(FAQ)", January 2019, <https://www.internetsociety.org/wp-
content/uploads/2019/02/Deploy360-IPv6-Security-FAQ.pdf>.
[MAPRG] Bajpai, V., "Measuring YouTube Content Delivery over
IPv6", IETF 99 Proceedings, July 2017,
<https://datatracker.ietf.org/meeting/99/materials/slides-
99-maprg-measuring-youtube-content-delivery-over-ipv6-00>.
[Mcrsft] Microsoft, "IPv6 for Azure VMs available in most regions",
September 2016, <https://azure.microsoft.com/en-
us/updates/ipv6-for-azure-vms/>.
[ND-CONSIDERATIONS]
Xiao, X., Vasilenko, E., Metz, E., Mishra, G., and N.
Buraglio, "Selectively Applying Host Isolation to Simplify
IPv6 First-hop Deployment", Work in Progress, Internet-
Draft, draft-ietf-v6ops-nd-considerations-00, 24 October
2022, <https://datatracker.ietf.org/doc/html/draft-ietf-
v6ops-nd-considerations-00>.
[NRO] NRO, "Internet Number Resource Status Report", September
2021, <https://www.nro.net/wp-content/uploads/NRO-
Statistics-2021-Q3-FINAL.pdf>.
[NST_1] NIST, "Estimating Industry IPv6 & DNSSEC External Service
Deployment Status", 2023, <https://fedv6-
deployment.antd.nist.gov/cgi-bin/generate-com>.
[NST_2] NIST, "Estimating USG IPv6 & DNSSEC External Service
Deployment Status", 2023, <https://fedv6-
deployment.antd.nist.gov/cgi-bin/generate-gov>.
[NST_3] NIST, "Estimating University IPv6 & DNSSEC External
Service Deployment Status", 2023, <https://fedv6-
deployment.antd.nist.gov/cgi-bin/generate-edu>.
[Ntflx] Aggarwal, R. and D. Temkin, "Enabling Support for IPv6",
July 2012, <https://netflixtechblog.com/enabling-support-
for-ipv6-48a495d5196f>.
[POTAROO1] Huston, G., "IP Addressing through 2021", January 2022,
<https://www.potaroo.net/ispcol/2022-01/addr2021.html>.
[POTAROO2] POTAROO, "IPv6 Resource Allocations", March 2023,
<https://www.potaroo.net/bgp/iso3166/v6cc.html>.
[RelJio] Chandra, R., "IPv6-only adoption challenges and
standardization requirements", IETF 109 Proceedings,
November 2020,
<https://datatracker.ietf.org/meeting/109/materials/
slides-109-v6ops-ipv6-only-adoption-challenges-and-
standardization-requirements-03>.
[RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless
Address Autoconfiguration", RFC 4862,
DOI 10.17487/RFC4862, September 2007,
<https://www.rfc-editor.org/info/rfc4862>.
[RFC5095] Abley, J., Savola, P., and G. Neville-Neil, "Deprecation
of Type 0 Routing Headers in IPv6", RFC 5095,
DOI 10.17487/RFC5095, December 2007,
<https://www.rfc-editor.org/info/rfc5095>.
[RFC6264] Jiang, S., Guo, D., and B. Carpenter, "An Incremental
Carrier-Grade NAT (CGN) for IPv6 Transition", RFC 6264,
DOI 10.17487/RFC6264, June 2011,
<https://www.rfc-editor.org/info/rfc6264>.
[RFC6980] Gont, F., "Security Implications of IPv6 Fragmentation
with IPv6 Neighbor Discovery", RFC 6980,
DOI 10.17487/RFC6980, August 2013,
<https://www.rfc-editor.org/info/rfc6980>.
[RFC7872] Gont, F., Linkova, J., Chown, T., and W. Liu,
"Observations on the Dropping of Packets with IPv6
Extension Headers in the Real World", RFC 7872,
DOI 10.17487/RFC7872, June 2016,
<https://www.rfc-editor.org/info/rfc7872>.
[RFC8064] Gont, F., Cooper, A., Thaler, D., and W. Liu,
"Recommendation on Stable IPv6 Interface Identifiers",
RFC 8064, DOI 10.17487/RFC8064, February 2017,
<https://www.rfc-editor.org/info/rfc8064>.
[RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6
(IPv6) Specification", STD 86, RFC 8200,
DOI 10.17487/RFC8200, July 2017,
<https://www.rfc-editor.org/info/rfc8200>.
[RFC8305] Schinazi, D. and T. Pauly, "Happy Eyeballs Version 2:
Better Connectivity Using Concurrency", RFC 8305,
DOI 10.17487/RFC8305, December 2017,
<https://www.rfc-editor.org/info/rfc8305>.
[RFC8415] Mrugalski, T., Siodelski, M., Volz, B., Yourtchenko, A.,
Richardson, M., Jiang, S., Lemon, T., and T. Winters,
"Dynamic Host Configuration Protocol for IPv6 (DHCPv6)",
RFC 8415, DOI 10.17487/RFC8415, November 2018,
<https://www.rfc-editor.org/info/rfc8415>.
[RFC8683] Palet Martinez, J., "Additional Deployment Guidelines for
NAT64/464XLAT in Operator and Enterprise Networks",
RFC 8683, DOI 10.17487/RFC8683, November 2019,
<https://www.rfc-editor.org/info/rfc8683>.
[RFC8981] Gont, F., Krishnan, S., Narten, T., and R. Draves,
"Temporary Address Extensions for Stateless Address
Autoconfiguration in IPv6", RFC 8981,
DOI 10.17487/RFC8981, February 2021,
<https://www.rfc-editor.org/info/rfc8981>.
[RFC9098] Gont, F., Hilliard, N., Doering, G., Kumari, W., Huston,
G., and W. Liu, "Operational Implications of IPv6 Packets
with Extension Headers", RFC 9098, DOI 10.17487/RFC9098,
September 2021, <https://www.rfc-editor.org/info/rfc9098>.
[RIPE1] Huston, G., "Measuring IPv6 Performance", October 2016,
<https://ripe73.ripe.net/wp-content/uploads/
presentations/35-2016-10-24-v6-performance.pdf>.
[RIPE2] RIPE, "IPv6 Security", January 2023,
<https://www.ripe.net/support/training/material/ipv6-
security/ipv6security-slides.pdf>.
[SNDVN] Cullen, C., "Sandvine releases 2020 Mobile Internet
Phenomena Report: YouTube is over 25% of all mobile
traffic", February 2020, <https://www.sandvine.com/press-
releases/sandvine-releases-2020-mobile-internet-phenomena-
report-youtube-is-over-25-of-all-mobile-traffic>.
[TMus] Lagerholm, S., "Going IPv6 Only", June 2018,
<https://pc.nanog.org/static/published/meetings/
NANOG73/1645/20180625_Lagerholm_T-
Mobile_S_Journey_To_v1.pdf>.
[US-CIO] Vought, R., "Memorandum for Heads of Executive Departments
and Agencies: Completing the Transition to Internet
Protocol Version 6 (IPv6)", 2020,
<https://www.cio.gov/assets/resources/internet-protocol-
version6-draft.pdf>.
[US-FR] Federal Register, "Request for Comments on Updated
Guidance for Completing the Transition to the Next
Generation Internet Protocol, Internet Protocol Version 6
(IPv6)", March 2020, <https://www.federalregister.gov/
documents/2020/03/02/2020-04202/request-for-comments-on-
updated-guidance-for-completing-the-transition-to-the-
next-generation>.
[W3Techs] W3Techs, "Historical yearly trends in the usage statistics
of site elements for websites", 2023,
<https://w3techs.com/technologies/history_overview/
site_element/all/y>.
[WIPv6L] World IPv6 Launch, "Measurements", June 2022,
<https://www.worldipv6launch.org/measurements/>.
Appendix A. Summary of Questionnaire and Replies for Network Operators
A survey was proposed to more than 50 service providers in the
European region during the third quarter of 2020 to ask for their
plans on IPv6 and the status of IPv6 deployment.
In this survey, 40 people, representing 38 organizations, provided
responses. This appendix summarizes the results obtained.
Respondents' business:
+============+========+=======+
| Convergent | Mobile | Fixed |
+============+========+=======+
| 82% | 8% | 11% |
+------------+--------+-------+
Table 10: Type of Operators
Question 1. Do you have plans to move more fixed, mobile, or
enterprise users to IPv6 in the next 2 years?
A. If so, fixed, mobile, or enterprise?
B. What are the reasons to do so?
C. When to start: already ongoing, in 12 months, or after 12 months?
D. Which transition solution will you use: Dual-Stack, DS-Lite,
464XLAT, or MAP-T/E?
Answers for 1.A (38 respondents)
+=====+=====+
| Yes | No |
+=====+=====+
| 79% | 21% |
+-----+-----+
Table 11: Plan to Move
to IPv6 within 2 Years
+========+=======+============+=============+
| Mobile | Fixed | Enterprise | No Response |
+========+=======+============+=============+
| 63% | 63% | 50% | 3% |
+--------+-------+------------+-------------+
Table 12: Business Segment
Answers for 1.B (29 respondents)
Even though this was an open question, some common answers can be
found.
* 14 respondents (48%) highlighted issues related to IPv4 depletion.
The reason to move to IPv6 is to avoid private and/or overlapping
addresses.
* 6 respondents (20%) stated that 5G/IoT is a business incentive to
introduce IPv6.
* 4 respondents (13%) highlighted that there is a national
regulation request to associate and enable IPv6 with the launch of
5G.
* 4 respondents (13%) considered IPv6 as a part of their innovation
strategy or an enabler for new services.
* 4 respondents (13%) introduced IPv6 because of enterprise customer
demand.
Answers for 1.C (30 respondents)
+=========+==============+=================+=============+
| Ongoing | In 12 months | After 12 months | No Response |
+=========+==============+=================+=============+
| 60% | 33% | 0% | 7% |
+---------+--------------+-----------------+-------------+
Table 13: Timeframe
Answers for 1.D (28 respondents for cellular, 27 for wireline)
+============+=========+=======+=============+
| Dual-Stack | 464XLAT | MAP-T | No Response |
+============+=========+=======+=============+
| 39% | 21% | 4% | 36% |
+------------+---------+-------+-------------+
Table 14: Transition in Use: Cellular
+============+=========+==========+=============+
| Dual-Stack | DS-Lite | 6RD/6VPE | No Response |
+============+=========+==========+=============+
| 59% | 19% | 4% | 19% |
+------------+---------+----------+-------------+
Table 15: Transition in Use: Wireline
Question 2. Do you need to change network devices for the above
goal?
A. If yes, what kind of devices: CPE, BNG/mobile core, or NAT?
B. Will you start the transition of your metro, backbone, or
backhaul network to support IPv6?
Answers for 2.A (30 respondents)
+=====+=====+=============+
| Yes | No | No Response |
+=====+=====+=============+
| 43% | 33% | 23% |
+-----+-----+-------------+
Table 16: Need to Change
+======+=========+=====+=====+=============+
| CPEs | Routers | BNG | CGN | Mobile core |
+======+=========+=====+=====+=============+
| 47% | 27% | 20% | 33% | 27% |
+------+---------+-----+-----+-------------+
Table 17: What to Change
Answers for 2.B (22 respondents)
+=====+========+=====+
| Yes | Future | No |
+=====+========+=====+
| 9% | 9% | 82% |
+-----+--------+-----+
Table 18: Plans for
Transition
Appendix B. Summary of Questionnaire and Replies for Enterprises
The Industry Network Technology Council (INTC) developed the
following poll to verify the need or willingness of medium-to-large
US-based enterprises for training and consultancy on IPv6
<https://industrynetcouncil.org/> in early 2021.
54 organizations provided answers.
Question 1. How much IPv6 implementation have you done at your
organization? (54 respondents)
+-------------------------------------------------+--------+
| None | 16.67% |
+-------------------------------------------------+--------+
| Some people have gotten some training | 16.67% |
+-------------------------------------------------+--------+
| Many people have gotten some training | 1.85% |
+-------------------------------------------------+--------+
| Website is IPv6 enabled | 7.41% |
+-------------------------------------------------+--------+
| Most equipment is dual-stacked | 31.48% |
+-------------------------------------------------+--------+
| Have an IPv6 transition plan for entire network | 5.56% |
+-------------------------------------------------+--------+
| Running IPv6-only in many places | 20.37% |
+-------------------------------------------------+--------+
| Entire network is IPv6-only | 0.00% |
+-------------------------------------------------+--------+
Table 19: IPv6 Implementation
Question 2. What kind of help or classes would you like to see INTC
do? (54 respondents)
+------------------------------------------------+--------+
| Classes/labs on IPv6 security | 66.67% |
+------------------------------------------------+--------+
| Classes/labs on IPv6 fundamentals | 55.56% |
+------------------------------------------------+--------+
| Classes/labs on address planning/network conf. | 57.41% |
+------------------------------------------------+--------+
| Classes/labs on IPv6 troubleshooting | 66.67% |
+------------------------------------------------+--------+
| Classes/labs on application conversion | 35.19% |
+------------------------------------------------+--------+
| Other | 14.81% |
+------------------------------------------------+--------+
Table 20: Help/Classes from INTC
Question 3. As you begin to think about the implementation of IPv6
at your organization, what areas do you feel are of concern? (54
respondents)
+-----------------------------+--------+
| Security | 31.48% |
+-----------------------------+--------+
| Application conversion | 25.93% |
+-----------------------------+--------+
| Training | 27.78% |
+-----------------------------+--------+
| All the above | 33.33% |
+-----------------------------+--------+
| Don't know enough to answer | 14.81% |
+-----------------------------+--------+
| Other | 9.26% |
+-----------------------------+--------+
Table 21: Areas of Concern for IPv6
Implementation
Acknowledgements
The authors of this document would like to thank Brian Carpenter,
Fred Baker, Alexandre Petrescu, Fernando Gont, Barbara Stark,
Haisheng Yu (Johnson), Dhruv Dhody, Gábor Lencse, Shuping Peng,
Daniel Voyer, Daniel Bernier, Hariharan Ananthakrishnan, Donavan
Fritz, Igor Lubashev, Erik Nygren, Eduard Vasilenko, and Xipeng Xiao
for their comments and review of this document.
Contributors
Nalini Elkins
Inside Products
Email: nalini.elkins@insidethestack.com
Sébastien Lourdez
Post Luxembourg
Email: sebastien.lourdez@post.lu
Authors' Addresses
Giuseppe Fioccola
Huawei Technologies
Riesstrasse, 25
80992 Munich
Germany
Email: giuseppe.fioccola@huawei.com
Paolo Volpato
Huawei Technologies
Via Lorenteggio, 240
20147 Milan
Italy
Email: paolo.volpato@huawei.com
Jordi Palet Martinez
The IPv6 Company
Molino de la Navata, 75
28420 La Navata - Galapagar, Madrid
Spain
Email: jordi.palet@theipv6company.com
Gyan S. Mishra
Verizon Inc.
Email: gyan.s.mishra@verizon.com
Chongfeng Xie
China Telecom
Email: xiechf@chinatelecom.cn
|