[v6ops] IPv4 trajectory

"Fred Baker (fred)" <fred@cisco.com> Tue, 31 March 2015 05:35 UTC

Return-Path: <fred@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A7411B2AA4 for <v6ops@ietfa.amsl.com>; Mon, 30 Mar 2015 22:35:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -112.612
X-Spam-Level:
X-Spam-Status: No, score=-112.612 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CCiwmcJgB_Vf for <v6ops@ietfa.amsl.com>; Mon, 30 Mar 2015 22:35:50 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 499D31B2AA0 for <v6ops@ietf.org>; Mon, 30 Mar 2015 22:35:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4881; q=dns/txt; s=iport; t=1427780150; x=1428989750; h=from:to:subject:date:message-id:mime-version; bh=WwzxKTja01S+mqWVPJrENDqQXbypP/Tp7/k6oUQY+pk=; b=HGODvLxk/hVoUTPfSsjldR0OEB2HHELoUKoU0oF1NMytUFr25DRkdh5b yP4JprNQEBLglR5dNCd9R6HYBh7wBG/Bb9bMUUZR7kaN3jKOtY4ef7Zx4 h7ySEcPeBELFPCjvkromFoKrvyz8Cvs6xY3C/1ZU6ul9opVJjjtKX0a2p A=;
X-Files: signature.asc : 487
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DmBADdMBpV/5pdJa1cgwaBMIMMwHuJAzgUAQEBAQEBAXyEFgQBI0QXDQFKAjQnBCGIGQijV49MmiIBAQEBAQUBAQEBAQEBG5MFL4EWBZBPgWmBMYZTgRuGCYk+g0cig26CM38BAQE
X-IronPort-AV: E=Sophos;i="5.11,498,1422921600"; d="asc'?scan'208";a="136762066"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by alln-iport-8.cisco.com with ESMTP; 31 Mar 2015 05:35:49 +0000
Received: from xhc-rcd-x06.cisco.com (xhc-rcd-x06.cisco.com [173.37.183.80]) by rcdn-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id t2V5Znd7002767 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL) for <v6ops@ietf.org>; Tue, 31 Mar 2015 05:35:49 GMT
Received: from xmb-rcd-x09.cisco.com ([169.254.9.131]) by xhc-rcd-x06.cisco.com ([173.37.183.80]) with mapi id 14.03.0195.001; Tue, 31 Mar 2015 00:35:49 -0500
From: "Fred Baker (fred)" <fred@cisco.com>
To: IPv6 Ops WG <v6ops@ietf.org>
Thread-Topic: IPv4 trajectory
Thread-Index: AQHQa3SKOP355mCtYUCyFmxhLNVm0A==
Date: Tue, 31 Mar 2015 05:35:48 +0000
Message-ID: <63C03012-C7DD-497E-A1EF-019711E95FD0@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [10.19.64.117]
Content-Type: multipart/signed; boundary="Apple-Mail=_C8C8D8F0-9DFF-47A6-B66E-DE2E260DEA82"; protocol="application/pgp-signature"; micalg="pgp-sha1"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/v6ops/nYPu52cbuYzqyFJ_stmwNJdLxYA>
Subject: [v6ops] IPv4 trajectory
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 Mar 2015 05:35:52 -0000

In the course of the Google Doc “towards IPv4 as a service” discussion, Brian Carpenter wrote

> Scope question: do we need to distinguish edge networks from Tier 3 provider networks? Are we making the assumption that transit and core carriers remain dual-stack? Listing LISP suggests that we might not be making that assumption exactly.

Let me give you my thought process. Happy to be told I am wrong.

As I read RFC 4213, the transition process was envisioned as taking three steps:

1) IPv4-only
2) IPv4+IPv6 Dual Stack
3) IPv6-only

Had the transition started five or ten years ago, that might have been reasonable. Where things stand, though, I don’t think it is. From my perspective, the process over some amount of time into the future (amount of time is anybody’s guess) will take six steps:

1) IPv4-only network
2) IPv4 with bits of IPv6 here and there, in some combination of overlay and native
3) IPv4+IPv6 (native) dual stack network
4) IPv6+IPv4 non-native, translated or overlay (e.g., as a service)
5) IPv6 with little bits of IPv4 here and there; your printer might be an example
6) IPv6-only

In steps 1 and 2, it is an IPv4 network, possibly with some toys in it playing IPv6. We might have toys playing AppleTalk and DECNet too. IPv4 is the workhorse, and toys is toys.

In step 3, every host in the network has an IPv4 address and an IPv6 address, or constructively could have if it wants one, and every router is carrying IPv4 routing as well as IPv6 routing. It’s likely multiplexing IPv4 addresses, and IPv4 is increasingly broken. But the big question is what applications and providers support IPv6; as long as a big one (Skype?) is not making the transition, people have a business reason to keep IPv4 going. As applications become dual stack, traffic levels approach a 50/50 distribution, barring some specific reason they would be forced to IPv4 or IPv6.

Right now, most networks are still in step 1, and those that have a clue are somewhere between step 2 and step 3. But some are moving, or at least experimenting, with step 4.

steps 4-6 are fundamentally about an IPv6 network.

In step 4, the network is optimizing configurations and costs by making IPv4 a translation or an overlay, but IPv4 remains an important aspect of the network. Obvious examples include anything listed. IPv4 might reach the host one way or another, or be translated some distance away, but a client using IPv4 can reach an IPv4-only server, and it can reply, and part of the path in between is IPv6-only.

In step 5, IPv4 has taken a place comparable to AppleTalk; yes, there’s some there, but where, precisely? And in step 6, we have finally turned IPv4 off entirely, and with it probably Bisync and X.25.


Now, what assumptions am I making? I believe that an IPv4 packet can make it end to end until step 5; it might spend part of that as a translated IPv6 packet or in a tunnel of some kind, but it can get there. As of step 5, that is no longer the case. Exactly how that happens is Not My Department. Note that many core networks don’t describe themselves as IPv4, IPv6, or dual stack networks; they describe themselves as MPLS networks that carry IP as a payload.


Listing LISP... to me, LISP is yet another encapsulation, a tunnel broker, and one that is particularly complex. It can carry IPv6 across an IPv4 network or IPv4 over an IPv6 network. Someone suggested it should be on the list, and it’s on the list. One thing I actually expect is that the list of technologies we might invite deployment reports regarding is longer than the list of technologies people actually use. We might learn something from that.


Is anyone’s head exploding yet?