<?xml version="1.0" encoding="UTF-8"?>
<rfc version="3"
     docName="draft-montero-uto-00"
     category="std"
     ipr="trust200902"
     consensus="true">

  <front>
    <title abbrev="Unified Transition Overlay">Unified Transition Overlay (UTO): A Minimal Cross-Version Transport Mechanism for IPv4/IPv6</title>

    <author fullname="Nicolas Montero Torrealba" initials="N." surname="Montero">
      <organization>Independent Researcher</organization>
      <address>
        <postal>
          <city>Santiago</city>
          <country>Chile</country>
        </postal>
        <email>nicolas.montero@usach.cl</email>
      </address>
    </author>

    <date day="12" month="December" year="2025"/>

    <workgroup>Network Working Group</workgroup>

    <keyword>IPv6</keyword>
    <keyword>IPv4</keyword>
    <keyword>Transition</keyword>
    <keyword>Encapsulation</keyword>
    <keyword>Overlay</keyword>

    <abstract>
      <t>
        This document specifies Unified Transition Overlay (UTO), a minimal encapsulation mechanism
        designed to enable bidirectional communication between IPv4-only and IPv6-only hosts without
        requiring NAT64, DNS64, heavy protocol translation, or global changes to Internet routing.
        UTO introduces a compact 12-byte header that carries a Remote Native Address (RNA) and allows
        a packet to traverse a network whose forwarding plane uses the opposite IP version. The
        underlying network remains purely IPv4 or purely IPv6, ensuring compatibility with existing
        hardware and reducing operational complexity.
      </t>
    </abstract>
  </front>

  <middle>

    <section anchor="intro" title="Introduction">
      <t>
        The transition from IPv4 to IPv6 has progressed far slower than originally expected. Although IPv6
        was standardized in 1998 and provides an address space sufficient for global-scale expansion, IPv4
        continues to dominate a significant portion of Internet traffic and infrastructure.
      </t>
      <t>
        Existing coexistence mechanisms such as NAT64, 464XLAT, DS-Lite, MAP-T, MAP-E, and tunneling
        technologies allow partial interoperability between the two protocol families. However, these
        solutions introduce operational challenges including stateful translation, DNS rewriting, multi-stage
        encapsulation, complex customer-premises equipment requirements, and decreased visibility for
        operators and middleboxes.
      </t>
      <t>
        Unified Transition Overlay (UTO) defines a minimal and efficient encapsulation mechanism allowing
        IPv4-only hosts to communicate with IPv6-only hosts, and vice versa, without altering the forwarding
        behavior of the underlying network. UTO preserves the original IP packet by wrapping it in a compact
        micro-header that carries the Remote Native Address (RNA) of the intended destination host.
      </t>
      <t>
        UTO operates exclusively at transition gateways and does not require updates to backbone routers,
        end-host stacks, or the semantics of the IPv4/IPv6 version field. The mechanism is suitable for
        incremental deployment and does not disrupt existing routing architectures.
      </t>
    </section>

    <section anchor="motivation" title="Motivation">
      <t>
        The continued coexistence of IPv4 and IPv6 has created operational environments in which many hosts
        are limited to a single IP version. IPv4 depletion has pushed cloud providers and IoT systems toward
        IPv6-only deployments, while numerous enterprise networks still rely heavily on IPv4 due to legacy
        applications, security policies, or hardware constraints.
      </t>
      <t>
        The industry has generally adopted translation-based models for cross-version communication. While
        functional, these models rely on complex transformation of packet headers, manipulation of DNS records,
        and maintenance of large state tables. Such approaches can reduce transparency, complicate troubleshooting,
        and introduce latency.
      </t>
      <t>
        UTO addresses these issues by avoiding deep translation entirely. Instead, the original IP packet
        remains intact, and only a concise transition overlay header is added. The underlying network sees only
        IPv4 or IPv6 traffic, while the UTO-Gateway performs minimal processing at the boundaries between domains.
      </t>
      <t>
        The goals of UTO include:
      </t>
      <ul spacing="normal">
        <li>Preserving native IPv4 and IPv6 semantics.</li>
        <li>Enabling communication between IPv4-only and IPv6-only hosts.</li>
        <li>Maintaining compatibility with existing hardware forwarding pipelines.</li>
        <li>Reducing operational complexity compared to NAT64 or dual-stack deployments.</li>
        <li>Supporting incremental deployment without global coordination.</li>
      </ul>
    </section>

    <section anchor="terminology" title="Terminology">
      <dl>
        <dt>UTO-Gateway (UGW)</dt>
        <dd>A device that applies or removes the UTO header and performs encapsulation or decapsulation
            based on the direction of cross-version traffic.</dd>

        <dt>Remote Native Address (RNA)</dt>
        <dd>The IPv4 or IPv6 address of the final destination host in its native format, carried inside
            the UTO header.</dd>

        <dt>Underlying Network</dt>
        <dd>The forwarding plane over which the encapsulated packet travels. This network may be IPv4-only
            or IPv6-only, depending on deployment.</dd>

        <dt>Native Packet</dt>
        <dd>The sender's original IPv4 or IPv6 packet before encapsulation.</dd>

        <dt>UTO Header</dt>
        <dd>A compact 12-byte transition header inserted before the native packet during encapsulation.</dd>

        <dt>Endpoint</dt>
        <dd>A host that supports only one IP version (IPv4-only or IPv6-only).</dd>
      </dl>
    </section>

    <section anchor="arch" title="Architecture Overview">
      <t>
        UTO enables cross-version communication by inserting a compact overlay header that carries the Remote
        Native Address (RNA) of the destination host. The underlying network transports the encapsulated packet
        using its native forwarding plane (IPv4 or IPv6), while the UTO-Gateway (UGW) at the remote boundary
        restores the original packet and delivers it to the destination.
      </t>
      <figure anchor="arch-fig" title="UTO Architecture">
        <artwork><![CDATA[
IPv4 Host ----> UGW(v4v6) ----> IPv6 Network ----> UGW(v6v4) ----> IPv6 Host

IPv6 Host ----> UGW(v6v4) ----> IPv4 Network ----> UGW(v4v6) ----> IPv4 Host
        ]]></artwork>
      </figure>
      <t>
        In all cases, the underlying forwarding devices (routers, middleboxes, fabric switches, and hardware
        ASIC pipelines) see only pure IPv4 or pure IPv6 packets. UTO does not modify the meaning of any field
        in either IP header, does not introduce mixed-version headers, and does not require new behaviors from
        the routing subsystem.
      </t>
      <t>
        Encapsulation occurs only at the edges of transition domains, where UGWs have explicit configuration defining
        which prefixes or hosts reside in opposite-version networks. Traffic between same-version hosts (IPv4-IPv4
        or IPv6-IPv6) remains native and is unaffected by UTO.
      </t>
    </section>

    <section anchor="header" title="UTO Header Format">
      <t>
        The UTO header precedes the native packet and has a fixed size of 12 bytes. It contains the Remote Native
        Address (RNA) of the destination host, encoded according to the address family and compressed when necessary.
        The general layout is:
      </t>
      <figure anchor="uto-layout" title="UTO Header Layout">
        <artwork align="left"><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Vers |Flags|HLen|                 Reserved                    |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                    Remote Native Address (part 1)             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                    Remote Native Address (part 2)             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        ]]></artwork>
      </figure>

      <t>
        The UTO header is inserted immediately after the outer IP header (IPv4 or IPv6), depending on the direction
        of encapsulation. When decapsulating, the receiving UGW removes the UTO header, restores the native packet,
        and forwards it according to its normal routing table.
      </t>

      <section anchor="fields" title="Field Definitions">
        <t><strong>Vers (4 bits):</strong> Indicates the version of the UTO protocol. This specification defines Vers=1 (0001).</t>
        <t><strong>Flags (4 bits):</strong> Identify the address family encoded in RNA.
          0001 - RNA contains an IPv4 address.
          0010 - RNA contains an IPv6 address (compressed).</t>
        <t><strong>HLen (8 bits):</strong> Total length of the UTO header in bytes. For this version, HLen MUST be set to 12.</t>
        <t><strong>Reserved (16 bits):</strong> Reserved for future use. MUST be set to zero on transmission and ignored on receipt.</t>
        <t><strong>Remote Native Address (RNA):</strong> Carries the destination host's native IPv4 or IPv6 address. When the
           address is IPv6, the RNA block contains a compressed representation sufficient to reconstruct the full
           128-bit address at the receiving UGW.</t>
      </section>

      <section anchor="rna-v4" title="Encoding of IPv4 Remote Native Address">
        <t>
          When the Flags field indicates an IPv4 address (0001), the RNA field carries the 32-bit IPv4 address
          left-aligned within the 64-bit RNA space. The remaining bits MUST be set to zero.
        </t>
        <t>Example:</t>
        <figure anchor="rna-v4-ex" title="IPv4 RNA Example">
          <artwork><![CDATA[
IPv4 address:  192.0.2.44
RNA encoding:  0xC000022C 00000000
          ]]></artwork>
        </figure>
      </section>

      <section anchor="rna-v6" title="Encoding of IPv6 Remote Native Address">
        <t>
          When the Flags field indicates IPv6 (0010), the RNA carries a compressed representation of the full
          128-bit IPv6 address. Compression is deterministic and reversible.
        </t>
        <t>
          UTO uses a two-component encoding scheme:
        </t>
        <ul spacing="normal">
          <li>A local 16-bit Label that identifies a known IPv6 prefix.</li>
          <li>A 64-bit Interface Identifier (IID) copied directly from the native IPv6 address.</li>
        </ul>
        <t>Each UGW maintains an internal Prefix Table:</t>
        <figure anchor="prefix-table" title="Prefix Table">
          <artwork><![CDATA[
Label (16 bits)    IPv6 Prefix (48 bits)
          ]]></artwork>
        </figure>
        <t>During encapsulation, the UGW:</t>
        <ol spacing="compact">
          <li>Splits the native IPv6 address into: Prefix (48 bits) + Subnet-ID (16 bits) + IID (64 bits).</li>
          <li>Replaces the Prefix+Subnet-ID (64 bits) with a single 16-bit Label.</li>
          <li>Keeps the original IID intact.</li>
          <li>Inserts: [Label | IID] into the RNA field of the UTO header.</li>
        </ol>
        <t>During decapsulation, the receiving UGW:</t>
        <ol spacing="compact">
          <li>Reads the Label.</li>
          <li>Recovers the 48-bit Prefix from its Prefix Table.</li>
          <li>Reconstructs the IPv6 address as: Prefix (48 bits) + Subnet-ID (16 bits from Label context) + IID (64 bits).</li>
        </ol>
        <t>Compression reduces RNA size while preserving uniqueness and allowing fast O(1) reconstruction.</t>
      </section>
    </section>

    <section anchor="operation" title="Protocol Operation">
      <t>
        This section describes the behavior of UTO-Gateways (UGWs) during encapsulation and decapsulation,
        and defines the forwarding logic for IPv4-to-IPv6 and IPv6-to-IPv4 transitions. UTO operates strictly
        at administrative boundaries and does not modify packets traveling within a single address family.
      </t>
      <t>Cross-version traffic is identified by UGW policy, typically based on destination prefixes, routing tables,
         interface roles, or explicitly configured host mappings.</t>

      <section anchor="flow-v4v6" title="IPv4-to-IPv6 Flow">
        <t>When an IPv4-only host sends a packet toward an IPv6-only host, the following steps occur:</t>
        <ol spacing="compact">
          <li>The IPv4 host transmits a normal IPv4 packet.</li>
          <li>The outbound UGW checks its policy and identifies the destination prefix as belonging to an IPv6 domain.</li>
          <li>The UGW constructs a UTO header with Flags=0010 (IPv6 RNA) and encodes the destination IPv6 address.</li>
          <li>The UGW encapsulates the native IPv4 packet inside an IPv6 outer header. The RNA in the UTO header allows the remote UGW to restore the intended destination address.</li>
          <li>The underlying IPv6 network forwards the packet normally, with no knowledge of UTO.</li>
          <li>At the receiving boundary, the remote UGW removes the UTO header, reconstructs the full IPv6 address, and delivers a native IPv6 packet to the IPv6-only host.</li>
        </ol>
      </section>

      <section anchor="flow-v6v4" title="IPv6-to-IPv4 Flow">
        <t>When an IPv6-only host sends a packet toward an IPv4-only host:</t>
        <ol spacing="compact">
          <li>The IPv6 host generates a normal IPv6 packet.</li>
          <li>The outbound UGW identifies that the destination belongs to an IPv4 domain.</li>
          <li>The UGW constructs a UTO header with Flags=0001 (IPv4 RNA) and inserts the 32-bit IPv4 address.</li>
          <li>The UGW encapsulates the native IPv6 packet inside an IPv4 outer header.</li>
          <li>The underlying IPv4 network forwards the encapsulated packet without inspecting the UTO header.</li>
          <li>The remote UGW decapsulates the packet, extracts the IPv4 RNA, and forwards a native IPv4 packet to the destination.</li>
        </ol>
      </section>

      <section anchor="ugw-behavior" title="Behavior of UTO-Gateways (UGW)">
        <t>UGWs MUST implement the following logic:</t>
        <ul spacing="normal">
          <li>Maintain policy tables for identifying opposite-version prefixes or host mappings.</li>
          <li>Apply encapsulation only when necessary; native same-version traffic MUST NOT be altered.</li>
          <li>Validate UTO header integrity and RNA encoding upon receipt.</li>
          <li>Reconstruct full IPv6 destinations using prefix tables associated with their domain.</li>
          <li>Enforce security policies that restrict which prefixes may originate cross-version traffic.</li>
          <li>Drop malformed UTO headers or reconstruction failures.</li>
        </ul>
        <t>UGWs MAY implement rate limiting or filtering on cross-version flows, depending on administrative policy.</t>
        <t>UGWs MUST NOT modify the inner native IP header except when decrementing the Hop Limit or TTL, as required by normal forwarding semantics.</t>
        <t>
          <strong>Performance Considerations:</strong> UTO is designed for efficient forwarding in both software and hardware
          implementations. Encapsulation and decapsulation are stateless operations requiring only header insertion/removal
          and optional prefix-table lookup. This avoids the per-flow state, checksum rewrites, and multi-field translations
          required by stateful transition mechanisms such as NAT64. Implementations MAY leverage hardware offload where available.
        </t>
      </section>
    </section>

    <section anchor="deploy" title="Deployment Scenarios">
      <t>
        UTO is designed for deployment in environments where one IP version dominates the core, while hosts or
        services using the opposite version exist at the edges. This section outlines representative deployment patterns.
      </t>
      <section anchor="deploy-enterprise" title="Enterprise with Legacy IPv4 Core">
        <t>Many organizations operate IPv4-centric networks due to legacy equipment or applications. Cloud services,
           IoT systems, and external APIs may be IPv6-only. UTO allows such enterprises to:</t>
        <ul spacing="normal">
          <li>Maintain an IPv4-only core.</li>
          <li>Enable IPv4 hosts to reach IPv6-only resources.</li>
          <li>Avoid NAT64 or DNS64 deployment.</li>
          <li>Preserve end-to-end semantics for IPv6 destinations.</li>
        </ul>
        <t>UGWs are deployed at the enterprise perimeter, typically at WAN routers or firewalls.</t>
      </section>
      <section anchor="deploy-isp" title="ISP with IPv6-Only Access Network">
        <t>ISPs deploying IPv6-only access (e.g., mobile or FTTH networks) may still need to support IPv4-only
           services hosted externally. UTO enables:</t>
        <ul spacing="normal">
          <li>Native IPv6 access network operation.</li>
          <li>Cross-version communication without per-flow state.</li>
          <li>Reduction of CGNAT pressure.</li>
          <li>Clean separation between access IPv6 and external IPv4 routes.</li>
        </ul>
        <t>UGWs are deployed at the ISP's edge to minimize translation complexity.</t>
      </section>
      <section anchor="deploy-iot" title="IoT IPv6 Devices Reaching IPv4 Infrastructure">
        <t>IoT deployments commonly use IPv6 due to address abundance and neighbor-discovery efficiency. However,
           control servers or legacy monitoring systems may operate only in IPv4. UTO allows IPv6-only IoT devices to:</t>
        <ul spacing="normal">
          <li>Reach IPv4 management systems without NAT-based hacks.</li>
          <li>Maintain native IPv6 addressing internally.</li>
          <li>Operate over an IPv4-only backhaul if required.</li>
        </ul>
        <t>UGWs in this scenario are placed at aggregation points or border concentrators.</t>
      </section>
    </section>

    <section anchor="adv-lim" title="Advantages and Limitations">
      <section anchor="advantages" title="Advantages">
        <t>UTO offers the following benefits:</t>
        <ul spacing="normal">
          <li>Minimal encapsulation overhead (12-byte header).</li>
          <li>No modification to IPv4 or IPv6 protocol semantics.</li>
          <li>No need for NAT64, DNS64, or stateful per-flow translation.</li>
          <li>Compatible with existing IPv4-only and IPv6-only hosts.</li>
          <li>Works with hardware forwarding pipelines already deployed.</li>
          <li>No impact on middleboxes that operate on the outer IP header.</li>
          <li>Easily deployable at administrative boundaries.</li>
          <li>Reduces operational and troubleshooting complexity.</li>
          <li>Supports incremental and partial deployments.</li>
        </ul>
      </section>
      <section anchor="limitations" title="Limitations">
        <t>UTO introduces certain limitations:</t>
        <ul spacing="normal">
          <li>Requires UTO-Gateways at transition points.</li>
          <li>Does not eliminate the need for proper routing policies.</li>
          <li>Requires prefix mapping tables for IPv6 RNA reconstruction.</li>
          <li>Encapsulated traffic may have a slightly larger MTU footprint.</li>
          <li>Cannot function as a global replacement for dual-stack architectures.</li>
        </ul>
        <t>
          UTO increases packet size by 12 bytes in addition to the outer IP header.
          UGWs MUST implement Path MTU Discovery (PMTUD) on the encapsulation path, or alternatively support IP-layer
          fragmentation when required. Operators SHOULD provision appropriate MTU values on boundary interfaces to
          avoid encapsulation-induced loss.
        </t>
      </section>
    </section>

    <section anchor="security" title="Security Considerations">
      <t>
        UTO does not alter IPv4 or IPv6 security properties. However, several operational considerations apply:
      </t>
      <ul spacing="normal">
        <li>UGWs MUST validate UTO header integrity before decapsulation.</li>
        <li>RNA values MUST be verified against authorized prefixes.</li>
        <li>Administrators SHOULD restrict which hosts can initiate cross-version traffic.</li>
        <li>Administrators SHOULD apply ingress filtering on UGW interfaces to prevent spoofing.</li>
        <li>UTO traffic MAY be protected using IPsec, MACsec, or tunnel-mode encryption if confidentiality is required.</li>
        <li>Misconfigured prefix tables could result in incorrect RNA reconstruction; implementations SHOULD detect inconsistencies.</li>
      </ul>
      <t>
        Since UTO encapsulates entire packets, its security posture is similar to other tunneling protocols.
        Operators SHOULD ensure that monitoring systems can observe both outer headers and encapsulated flows when necessary.
      </t>
    </section>

    <section anchor="iana" title="IANA Considerations">
      <t>
        This document requests that IANA allocate:
      </t>
      <ul spacing="normal">
        <li>A new IP Protocol Number for use as the UTO protocol header.</li>
        <li>A new IPv6 Next Header value identifying UTO encapsulation.</li>
      </ul>
      <t>
        These values are required for correct identification of UTO packets when conveyed over native IPv4 or IPv6 networks.
      </t>
    </section>

    <section anchor="backward" title="Backward Compatibility">
      <t>
        UTO is compatible with existing IPv4 and IPv6 networks because:
      </t>
      <ul spacing="normal">
        <li>UGWs handle all encapsulation and decapsulation.</li>
        <li>End hosts remain unchanged.</li>
        <li>Routers forward only native IPv4 or IPv6 outer headers.</li>
        <li>Middleboxes operate normally, inspecting only outer layers.</li>
      </ul>
      <t>
        No modifications to TCP, UDP, ICMP, IPv4, or IPv6 behavior are required. UTO can coexist with other transition
        technologies, including NAT64, DS-Lite, MAP-E, MAP-T, and traditional tunnels.
      </t>
    </section>

    <section anchor="examples" title="Examples">
      <section anchor="ex-v4v6" title="Complete IPv4-to-IPv6 Packet Flow">
        <t>The following example illustrates a full cross-version transition:</t>
        <t>Source IPv4 host: 10.1.1.10</t>
        <t>Destination IPv6: 2001:db8:20::44</t>
        <t>Steps:</t>
        <ol spacing="compact">
          <li>The IPv4 host sends: IPv4 Header, TCP/UDP/ICMP Payload.</li>
          <li>The outbound UGW constructs a UTO header with Flags=0010 and encodes the IPv6 address using the prefix and IID reconstruction method.</li>
          <li>The UGW encapsulates the native IPv4 packet inside an IPv6 outer header: IPv6 Outer Header, UTO Header, IPv4 Native Packet.</li>
          <li>The IPv6 backbone forwards the packet.</li>
          <li>The remote UGW decapsulates, reconstructs the IPv6 address, and forwards a native IPv6 packet to the destination.</li>
        </ol>
      </section>
      <section anchor="ex-v6v4" title="Complete IPv6-to-IPv4 Packet Flow">
        <t>Example:</t>
        <t>Source IPv6 host: 2001:db8:10::50</t>
        <t>Destination IPv4: 192.0.2.99</t>
        <t>Steps:</t>
        <ol spacing="compact">
          <li>The IPv6 host sends a native IPv6 packet.</li>
          <li>The outbound UGW inserts a UTO header with Flags=0001 and encodes the 32-bit IPv4 address (RNA field).</li>
          <li>Encapsulation produces: IPv4 Outer Header, UTO Header, IPv6 Native Packet.</li>
          <li>The IPv4 network forwards the packet normally.</li>
          <li>The receiving UGW extracts the IPv4 RNA and delivers a native IPv4 packet to the destination.</li>
        </ol>
      </section>
    </section>

  </middle>

  <back>
    <references title="Normative References">
      <reference anchor="RFC0791" target="https://www.rfc-editor.org/rfc/rfc791">
        <front>
          <title>Internet Protocol</title>
          <author initials="J." surname="Postel"/>
          <date year="1981" month="September"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="791"/>
      </reference>

      <reference anchor="RFC8200" target="https://www.rfc-editor.org/rfc/rfc8200">
        <front>
          <title>Internet Protocol, Version 6 (IPv6) Specification</title>
          <author initials="S." surname="Deering"/>
          <author initials="R." surname="Hinden"/>
          <date year="2017" month="July"/>
        </front>
        <seriesInfo name="STD" value="86"/>
        <seriesInfo name="RFC" value="8200"/>
      </reference>

      <reference anchor="RFC2473" target="https://www.rfc-editor.org/rfc/rfc2473">
        <front>
          <title>Generic Packet Tunneling in IPv6</title>
          <author initials="A." surname="Conta"/>
          <author initials="S." surname="Deering"/>
          <date year="1998" month="December"/>
        </front>
        <seriesInfo name="RFC" value="2473"/>
      </reference>

      <reference anchor="RFC2784" target="https://www.rfc-editor.org/rfc/rfc2784">
        <front>
          <title>Generic Routing Encapsulation (GRE)</title>
          <author initials="D." surname="Farinacci"/>
          <author initials="T." surname="Li"/>
          <author initials="S." surname="Hanks"/>
          <author initials="D." surname="Meyer"/>
          <author initials="P." surname="Traina"/>
          <date year="2000" month="March"/>
        </front>
        <seriesInfo name="RFC" value="2784"/>
      </reference>
    </references>

    <references title="Informative References">
      <reference anchor="RFC6146" target="https://www.rfc-editor.org/rfc/rfc6146">
        <front>
          <title>Stateful NAT64</title>
          <author initials="M." surname="Bagnulo"/>
          <author initials="P." surname="Matthews"/>
          <author initials="I." surname="van Beijnum"/>
          <date year="2011" month="April"/>
        </front>
        <seriesInfo name="RFC" value="6146"/>
      </reference>

      <reference anchor="RFC6877" target="https://www.rfc-editor.org/rfc/rfc6877">
        <front>
          <title>464XLAT: Combination of Stateful and Stateless Translation</title>
          <author initials="M." surname="Mawatari"/>
          <author initials="M." surname="Kawashima"/>
          <author initials="C." surname="Byrne"/>
          <date year="2013" month="April"/>
        </front>
        <seriesInfo name="RFC" value="6877"/>
      </reference>

      <reference anchor="RFC7599" target="https://www.rfc-editor.org/rfc/rfc7599">
        <front>
          <title>Mapping of Address and Port using Translation (MAP-T)</title>
          <author initials="X." surname="Li"/>
          <author initials="C." surname="Bao"/>
          <author initials="F." surname="Baker"/>
          <date year="2015" month="July"/>
        </front>
        <seriesInfo name="RFC" value="7599"/>
      </reference>

      <reference anchor="RFC8925" target="https://www.rfc-editor.org/rfc/rfc8925">
        <front>
          <title>LISP Architecture</title>
          <author initials="D." surname="Farinacci"/>
          <author initials="V." surname="Fuller"/>
          <author initials="D." surname="Meyer"/>
          <author initials="D." surname="Lewis"/>
          <date year="2020" month="October"/>
        </front>
        <seriesInfo name="RFC" value="8925"/>
      </reference>

      <reference anchor="RFC8986" target="https://www.rfc-editor.org/rfc/rfc8986">
        <front>
          <title>Segment Routing over IPv6 (SRv6)</title>
          <author initials="C." surname="Filsfils"/>
          <author initials="J." surname="Leddy"/>
          <author initials="D." surname="Voyer"/>
          <date year="2021" month="February"/>
        </front>
        <seriesInfo name="RFC" value="8986"/>
      </reference>
    </references>

    <section anchor="acks" title="Acknowledgments">
      <t>
        The author would like to thank the members of the operational and research communities whose discussions on
        transition technologies motivated the development of this document. Their practical feedback on coexistence
        mechanisms, routing architectures, and deployment challenges helped shape the UTO design goals.
      </t>
      <t>
        Special appreciation is extended to engineers who contributed insights on encapsulation performance, IPv6
        prefix management, and hardware forwarding behavior. Their operational experience provided valuable context
        for identifying the limitations of translation-based models.
      </t>
    </section>
  </back>
</rfc>