<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-pang-v6ops-ipv6-monitoring-deployment-05" category="bcp" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="IPv6 Network Monitoring Deployment">IPv6 Network Deployment Monitoring and Analysis</title>
    <seriesInfo name="Internet-Draft" value="draft-pang-v6ops-ipv6-monitoring-deployment-05"/>
    <author initials="R." surname="Pang" fullname="Ran Pang">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>pangran@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="J." surname="Zhao" fullname="Jing Zhao">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhaoj501@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="M." surname="Jin" fullname="Mingshuang Jin">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jinmingshuang@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhang" fullname="Shuai Zhang">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhangs366@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>Operations and Management Area</area>
    <workgroup>v6ops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 63?>

<t>This document addresses key operational challenges in large-scale IPv6 deployment and proposes an architecture for IPv6 deployment monitoring and analysis. It describes an architectural approach and comprehensive metrics to provide end-to-end visibility across network infrastructure, cloud services, edge computing, and end-user domains.</t>
    </abstract>
  </front>
  <middle>
    <?line 68?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The IPv6 protocol specification was published in 1998. As IPv6 adoption has accelerated in recent years, IPv6 was standardized as an Internet Standard <xref target="RFC8200"/> in 2017.</t>
      <section anchor="current-ipv6-deployment-status">
        <name>Current IPv6 Deployment Status</name>
        <t>The deployment of IPv6 has become a core driving force for network development. With the continuous expansion of network scale and the emergence of new services, IPv6 provides abundant address space, enhanced security, and improved network performance, making it a key component in network evolution. The efficient deployment and promotion of IPv6 networks have become critical priorities for operators and service providers.</t>
        <t>As of 2023, significant progress has been made in global IPv6 deployment. According to the <em>Global IPv6 Development Report 2024</em> <xref target="GlobalIPv6Report2024"/>, IPv6 deployment accelerated notably in 2023, with global coverage exceeding 30% for the first time. In leading countries, IPv6 coverage has reached or approached 70%, and the proportion of IPv6 mobile traffic has surpassed that of IPv4.</t>
        <t><xref target="RFC9386"/> describes the IPv6 deployment status in 2022, and Section 5 lists common challenges including transition mechanisms, network management and operation, performance, and customer experience. ETSI-GR-IPE-001 <xref target="ETSI-GR-IPE-001"/> also analyzes existing gaps in IPv6-related use cases.</t>
      </section>
      <section anchor="current-approaches-to-monitoring-ipv6-deployment">
        <name>Current Approaches to Monitoring IPv6 Deployment</name>
        <t>Several tools and platforms are used to monitor IPv6 deployment, such as:</t>
        <ul spacing="normal">
          <li>
            <t>Internet Society Pulse: Curates information about IPv6 adoption levels in countries and networks worldwide.</t>
          </li>
          <li>
            <t>Akamai IPv6 Adoption Visualization: Tracks IPv6 adoption trends at country or network level.</t>
          </li>
          <li>
            <t>APNIC IPv6 Measurement: Provides an interactive map for viewing IPv6 deployment rates in specific countries.</t>
          </li>
          <li>
            <t>Cloudflare IPv6 Adoption Trends: Offers IPv6 adoption insights across the Internet.</t>
          </li>
          <li>
            <t>Cisco 6lab IPv6: Displays IPv6 prefix data.</t>
          </li>
          <li>
            <t>Regional or National Monitoring Platforms: Examples include NZ IPv6, RIPE NCC IPv6 Statistics, and USG IPv6 &amp; DNSSEC External Service Deployment Status.</t>
          </li>
        </ul>
        <t>While valuable for high-level trend analysis, these tools have significant limitations for carrier-grade operational use.</t>
        <t>Inadequate IPv6 monitoring can lead to unrecognized service degradation, increased operational costs, and poor end-user experience, which hinders the large-scale adoption of IPv6.</t>
      </section>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <section anchor="fragmented-monitoring-coverage">
        <name>Fragmented Monitoring Coverage</name>
        <t>Monitoring points are predominantly concentrated in backbone networks <xref target="RFC7707"/>, lacking fine-grained visibility into user terminals, access networks, and application endpoints.</t>
      </section>
      <section anchor="single-dimensional-evaluation">
        <name>Single-Dimensional Evaluation</name>
        <t>Assessments mainly rely on basic metrics such as connection availability <xref target="RFC9099"/> and address allocation rates, lacking a holistic view of service continuity, transmission quality, network element readiness, and active connection states.</t>
      </section>
      <section anchor="lack-of-cross-domain-correlation">
        <name>Lack of Cross-Domain Correlation</name>
        <t>Data silos exist among different network domains (fixed, mobile, core, application), preventing end-to-end path analysis and fault correlation <xref target="RFC9312"/>.</t>
      </section>
      <section anchor="insufficient-in-depth-analysis">
        <name>Insufficient In-Depth Analysis</name>
        <t>Incomplete IPv6 transformation in applications and content delivery chains (e.g., deeply nested links, multimedia content) is difficult to characterize without in-depth monitoring capabilities for such scenarios.</t>
      </section>
      <section anchor="limited-dynamic-prediction">
        <name>Limited Dynamic Prediction</name>
        <t>Current models cannot effectively quantify the impact of external factors (policy changes, user behavior, market dynamics) on IPv6 evolution, which limits proactive network planning.</t>
      </section>
    </section>
    <section anchor="ipv6-network-end-to-end-monitoring-and-analysis-architecture">
      <name>IPv6 Network End-to-End Monitoring and Analysis Architecture</name>
      <t>To address the above challenges, this document describes an end-to-end IPv6 monitoring and analysis architecture. The architecture provides full visibility into IPv6 deployment while ensuring interoperability and scalability.</t>
      <section anchor="architectural-principles">
        <name>Architectural Principles</name>
        <t>The monitoring framework follows these key principles:</t>
        <ul spacing="normal">
          <li>
            <t>Standardized Data Models: Use standardized data models (e.g., YANG) for consistent data representation across domains to ensure interoperability.</t>
          </li>
          <li>
            <t>Modular Design: Deploy independent functional components with well-defined interfaces to support incremental deployment.</t>
          </li>
          <li>
            <t>Cross-Domain Correlation: Enable end-to-end visibility via integrated data analysis across administrative domains.</t>
          </li>
          <li>
            <t>Service-Oriented Metrics: Use a comprehensive monitoring metrics framework aligned with operational objectives.</t>
          </li>
          <li>
            <t>Visualization Tools: Dashboards and visual interfaces to support key operational decisions.</t>
          </li>
          <li>
            <t>Extensibility: Support integration with existing monitoring systems and allow future extensions.</t>
          </li>
        </ul>
      </section>
      <section anchor="architecture-components">
        <name>Architecture Components</name>
        <t>The architecture consists of three layers, as shown in Figure 1: the Data Collection Layer, the Intelligent Analysis Layer, and the Visualization Layer.</t>
        <figure anchor="fig-1">
          <name>IPv6 Network End-to-End Monitoring and Analysis Architecture</name>
          <artwork><![CDATA[
                     +---------------------------------------+
                     |         Visualization Layer           |
                     | (Dashboards, Topology, Fault Alerts)  |
                     +---------------------------------------+
                                  ^          ^
                                  | API/REST |
                     +------------------------------------------+
                     |         Intelligent Analysis Layer       |
                     |  +-----------+ +-----------+ +---------+ |
                     |  |  Traffic  | |  Dynamic  | | Quality | |
                     |  |Correlation| |Attribution| | Analysis| |
                     |  +-----------+ +-----------+ +---------+ |
                     +------------------------------------------+
                                  ^          ^
                                  |          |
              +-----------------------------------------------------------+
              |                   Data Collection Layer                   |
              |  +-----------+  +-----------+  +-----------+  +---------+ |
              |  |   Home    |  |           |  |           |  |         | |
              |  | Broadband |  |  Mobile   |  |  Bearer   |  |   App   | |
              |  |  Network  |  |  Network  |  |  Network  |  | Domain  | |
              |  +-----------+  +-----------+  +-----------+  +---------+ |
              +-----------------------------------------------------------+
]]></artwork>
        </figure>
        <section anchor="data-collection-layer">
          <name>Data Collection Layer</name>
          <t>This layer defines unified interface standards to integrate multi-source data from the home broadband network, mobile network, IP bearer network, and application domain. The framework supports interworking with multi-vendor devices and subsystems.</t>
          <t>Implementations SHOULD leverage existing IETF standards for data collection where applicable.</t>
          <ul spacing="normal">
            <li>
              <t>Integration with existing network management systems can provide daily-level monitoring data through standardized interfaces.</t>
            </li>
            <li>
              <t>The architecture leverages mature, standardized collection mechanisms (such as Telemetry, NETCONF/YANG etc.) to ensure uniform data formats and meet high-frequency traffic monitoring requirements.</t>
            </li>
          </ul>
        </section>
        <section anchor="intelligent-analysis-layer">
          <name>Intelligent Analysis Layer</name>
          <t>The Intelligent Analysis Layer processes traffic data collected from the four major service domains. Using multi-dimensional traffic analysis models and comprehensive metrics, it provides fine-grained insights and supports cross-domain root cause diagnosis.
This layer also supports AI-based model extensions, including anomaly detection for unexpected drops in IPv6 traffic and predictive analytics for forecasting IPv6 traffic growth based on historical data and external factors (e.g., regional policy rollouts).</t>
          <section anchor="multi-domain-traffic-correlation-analysis">
            <name>Multi-domain Traffic Correlation Analysis</name>
            <ul spacing="normal">
              <li>
                <t>Network Traffic Analysis: Supports collection of IPv6/IPv4 inbound and outbound traffic at key network nodes. Analyzes traffic evolution trends.</t>
              </li>
              <li>
                <t>User-Side Traffic Analysis: Monitors user-side devices and access networks (fixed and mobile), including IPv6 capability monitoring of home ONTs, routers, end-user devices, and access networks.</t>
              </li>
              <li>
                <t>Application Traffic Analysis: Supports collection and analysis of IPv6/IPv4 active applications, and calculates IPv6 traffic for different services.</t>
              </li>
              <li>
                <t>Inter-network Traffic Analysis: Builds region-application matrices to analyze cross-operator paths and locate regional bottlenecks.</t>
              </li>
            </ul>
          </section>
          <section anchor="dynamic-traffic-attribution">
            <name>Dynamic Traffic Attribution</name>
            <t>Based on traffic analysis results from each domain, this component identifies regions with anomalous IPv6 traffic. Using multi-domain correlation analysis (e.g., by region, network layer, or application type), it attributes traffic fluctuations to specific subsystems.</t>
            <t>Optionally, monitoring insights can inform network policy adjustments that influence client-side path selection behaviors, such as those defined in Happy Eyeballs <xref target="RFC8305"/>.</t>
          </section>
          <section anchor="traffic-quality-analysis">
            <name>Traffic Quality Analysis</name>
            <ul spacing="normal">
              <li>
                <t>User-level Topology Reconstruction: Models service chains and reconstructs end-to-end topologies, supporting segmented diagnosis of latency and packet loss (home terminal, access network, application segments).</t>
              </li>
              <li>
                <t>Deterioration Localization: Compares IPv4/IPv6 performance segment by segment to locate underperforming network elements.</t>
              </li>
              <li>
                <t>IPv6 Application Access Quality Assessment: Evaluates KPIs of application systems in IPv6 environments, including response time, connection success rate, and data transmission rate.</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="visualization-layer">
          <name>Visualization Layer</name>
          <t>The Visualization Layer presents analyzed data via operational dashboards to support network management decisions.</t>
          <t>Key functions include:</t>
          <ul spacing="normal">
            <li>
              <t>Unified Operational Dashboard: Presents an overview of key IPv6 deployment metrics and ecosystem trends using real-time widgets, charts, and graphs.</t>
            </li>
            <li>
              <t>Cross-Domain Topology Views: Displays interactive topology maps for each network domain, showing the status of IPv6-enabled resources, connections, and operational state.</t>
            </li>
            <li>
              <t>Multi-Dimensional Data Exploration: Provides chart-based views (traffic distribution, quality trends, application support comparison etc.) that allow operators to filter metrics by time, region, service type, and other dimensions.</t>
            </li>
            <li>
              <t>Fault and Status Visualization: Converts root cause analysis results into visual alerts on dashboards and topologies (color-coded nodes, heat maps etc.) to speed up fault identification and troubleshooting.</t>
            </li>
          </ul>
        </section>
        <section anchor="ipv6-monitoring-metrics">
          <name>IPv6 Monitoring Metrics</name>
          <t>The comprehensive IPv6 monitoring metrics framework includes the following categories:</t>
          <ul spacing="normal">
            <li>
              <t>Readiness Metrics
              </t>
              <ul spacing="normal">
                <li>
                  <t>Network Element Readiness: IPv6 readiness of network equipment, end-user devices, and security devices.</t>
                </li>
                <li>
                  <t>Application Readiness: IPv6 support rates for websites and service systems.</t>
                </li>
                <li>
                  <t>Infrastructure Readiness: IPv6 readiness of fixed Internet, mobile Internet, dedicated lines, and data center network (DCN) infrastructure.</t>
                </li>
                <li>
                  <t>Network Readiness:
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>IPv6 coverage of backbone networks, metropolitan area networks (MANs), IDCs, and dedicated lines.</t>
                    </li>
                    <li>
                      <t>End-to-end IPv6 performance of backbone networks, MANs, IDCs, dedicated lines, and access networks.</t>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>Cloud Readiness: IPv6 readiness of CDNs, cloud services, cloud platforms, and DNS servers.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Operational Metrics
              </t>
              <ul spacing="normal">
                <li>
                  <t>IPv6 Traffic: IPv6 traffic share in cross-border, inter-domain, intra-domain, fixed MAN, mobile core, IDC, dedicated line, and application traffic.</t>
                </li>
                <li>
                  <t>Active IPv6 Connections: IPv6 active connection share in fixed MAN, mobile core, IDC, dedicated line, and application services.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Performance and Quality Metrics
              </t>
              <ul spacing="normal">
                <li>
                  <t>DNS Resolution Latency and Success Rate.</t>
                </li>
                <li>
                  <t>End-to-End Latency (RTT).</t>
                </li>
                <li>
                  <t>Packet Loss Ratio (PLR).</t>
                </li>
              </ul>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="implementation-considerations">
      <name>Implementation Considerations</name>
      <t>This architecture and its associated metrics have been deployed in operational networks, delivering measurable improvements in IPv6 deployment effectiveness. Based on experiences from large-scale operator networks, the following key recommendations are provided:</t>
      <section anchor="phased-deployment-strategy">
        <name>Phased Deployment Strategy</name>
        <ol spacing="normal" type="1"><li>
            <t>Phase 1: Prioritize monitoring of key nodes in core and metro networks to quickly obtain basic IPv6 traffic visibility.</t>
          </li>
          <li>
            <t>Phase 2: Extend to user-side terminal collection and application-side active probing to establish end-to-end monitoring capabilities.</t>
          </li>
          <li>
            <t>Phase 3: Enhance intelligent analysis models to support automated root cause localization and predictive analytics.</t>
          </li>
        </ol>
      </section>
      <section anchor="organizational-collaboration-model">
        <name>Organizational Collaboration Model</name>
        <ul spacing="normal">
          <li>
            <t>Establish cross-departmental teams (fixed, mobile, IP bearer, application etc.) to ensure data sharing and process integration.</t>
          </li>
          <li>
            <t>Define data ownership for each domain and establish data quality governance mechanisms.</t>
          </li>
        </ul>
      </section>
      <section anchor="technical-selection-recommendations">
        <name>Technical Selection Recommendations</name>
        <ul spacing="normal">
          <li>
            <t>Prioritize network devices that support standard interfaces (NETCONF/YANG, Telemetry) to reduce integration complexity.</t>
          </li>
          <li>
            <t>Adopt a modular architecture to facilitate future function expansion and multi-vendor access.</t>
          </li>
        </ul>
      </section>
      <section anchor="deployment-validation">
        <name>Deployment Validation</name>
        <t>The architecture and metrics described in this document have been deployed on the operational networks of major operators (e.g., China Unicom), covering fixed broadband, mobile, IP bearer, and application domains.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Implementations MUST provide:</t>
      <ul spacing="normal">
        <li>
          <t>Role-based access control.</t>
        </li>
        <li>
          <t>Anonymization of user-related data.</t>
        </li>
        <li>
          <t>Secure data transmission protocols.</t>
        </li>
        <li>
          <t>Integrity verification for collected metrics.</t>
        </li>
      </ul>
      <t>The monitoring mechanism described in this document uses passive monitoring only.
It does NOT modify, insert, or delete any IPv6 or IPv4 packet headers, payloads, or user traffic.
No changes are made to packet content or format during collection and analysis, ensuring user traffic integrity and no impact on network services.
No personally identifiable information (PII) is collected, processed, or reported, thus eliminating end-user privacy risks.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8200.xml">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7707" target="https://www.rfc-editor.org/info/rfc7707" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7707.xml">
          <front>
            <title>Network Reconnaissance in IPv6 Networks</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>IPv6 offers a much larger address space than that of its IPv4 counterpart. An IPv6 subnet of size /64 can (in theory) accommodate approximately 1.844 * 10^19 hosts, thus resulting in a much lower host density (#hosts/#addresses) than is typical in IPv4 networks, where a site typically has 65,000 or fewer unique addresses. As a result, it is widely assumed that it would take a tremendous effort to perform address-scanning attacks against IPv6 networks; therefore, IPv6 address-scanning attacks have been considered unfeasible. This document formally obsoletes RFC 5157, which first discussed this assumption, by providing further analysis on how traditional address-scanning techniques apply to IPv6 networks and exploring some additional techniques that can be employed for IPv6 network reconnaissance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7707"/>
          <seriesInfo name="DOI" value="10.17487/RFC7707"/>
        </reference>
        <reference anchor="RFC8305" target="https://www.rfc-editor.org/info/rfc8305" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8305.xml">
          <front>
            <title>Happy Eyeballs Version 2: Better Connectivity Using Concurrency</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>Many communication protocols operating over the modern Internet use hostnames. These often resolve to multiple IP addresses, each of which may have different performance and connectivity characteristics. Since specific addresses or address families (IPv4 or IPv6) may be blocked, broken, or sub-optimal on a network, clients that attempt multiple connections in parallel have a chance of establishing a connection more quickly. This document specifies requirements for algorithms that reduce this user-visible delay and provides an example algorithm, referred to as "Happy Eyeballs". This document obsoletes the original algorithm description in RFC 6555.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8305"/>
          <seriesInfo name="DOI" value="10.17487/RFC8305"/>
        </reference>
        <reference anchor="RFC9099" target="https://www.rfc-editor.org/info/rfc9099" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9099.xml">
          <front>
            <title>Operational Security Considerations for IPv6 Networks</title>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="K. Chittimaneni" initials="K." surname="Chittimaneni"/>
            <author fullname="M. Kaeo" initials="M." surname="Kaeo"/>
            <author fullname="E. Rey" initials="E." surname="Rey"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>Knowledge and experience on how to operate IPv4 networks securely is available, whether the operator is an Internet Service Provider (ISP) or an enterprise internal network. However, IPv6 presents some new security challenges. RFC 4942 describes security issues in the protocol, but network managers also need a more practical, operations-minded document to enumerate advantages and/or disadvantages of certain choices.</t>
              <t>This document analyzes the operational security issues associated with several types of networks and proposes technical and procedural mitigation techniques. This document is only applicable to managed networks, such as enterprise networks, service provider networks, or managed residential networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9099"/>
          <seriesInfo name="DOI" value="10.17487/RFC9099"/>
        </reference>
        <reference anchor="RFC9312" target="https://www.rfc-editor.org/info/rfc9312" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9312.xml">
          <front>
            <title>Manageability of the QUIC Transport Protocol</title>
            <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
            <author fullname="B. Trammell" initials="B." surname="Trammell"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document discusses manageability of the QUIC transport protocol and focuses on the implications of QUIC's design and wire image on network operations involving QUIC traffic. It is intended as a "user's manual" for the wire image to provide guidance for network operators and equipment vendors who rely on the use of transport-aware network functions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9312"/>
          <seriesInfo name="DOI" value="10.17487/RFC9312"/>
        </reference>
        <reference anchor="RFC9386" target="https://www.rfc-editor.org/info/rfc9386" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9386.xml">
          <front>
            <title>IPv6 Deployment Status</title>
            <author fullname="G. Fioccola" initials="G." surname="Fioccola"/>
            <author fullname="P. Volpato" initials="P." surname="Volpato"/>
            <author fullname="J. Palet Martinez" initials="J." surname="Palet Martinez"/>
            <author fullname="G. Mishra" initials="G." surname="Mishra"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>This document provides an overview of the status of IPv6 deployment in 2022. Specifically, it looks at the degree of adoption of IPv6 in the industry, analyzes the remaining challenges, and proposes further investigations in areas where the industry has not yet taken a clear and unified approach in the transition to IPv6. It obsoletes RFC 6036.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9386"/>
          <seriesInfo name="DOI" value="10.17487/RFC9386"/>
        </reference>
        <reference anchor="GlobalIPv6Report2024">
          <front>
            <title>Global IPv6 Development Report 2024</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ETSI-GR-IPE-001">
          <front>
            <title>IPv6 Implementation Gaps and Recommendations</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
