<?xml version="1.0" encoding="US-ASCII"?>
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private) -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY rfc2119 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
]>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="std" docName="draft-li-dmsc-macp-02" ipr="trust200902">
  <front>
    <title abbrev="MACP">Multi-agent Collaboration Protocol Suite</title>

    <author fullname="Xueting Li" initials="X" surname="Li">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <region>Beijing</region>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>lixt2@foxmail.com</email>
      </address>
    </author>

    <author fullname="Jun Liu" initials="J" surname="Liu">
      <organization>Beijing University of Posts and
      Telecommunications</organization>

      <address>
        <postal>
          <street>10 Xitucheng Road, Haidian District</street>

          <city>Beijing</city>

          <code>100876</code>

          <country>China</country>
        </postal>

        <email>liujun@bupt.edu.cn</email>
      </address>
    </author>

    <author fullname="Chenguang Du" initials="C" surname="Du">
      <organization>Zhongguancun Laboratory</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <code>100094</code>

          <country>China</country>
        </postal>

        <email>ducg@zgclab.edu.cn</email>
      </address>
    </author>

    <author fullname="Lianhua Zhang" initials="L" surname="Zhang">
      <organization>AsiaInfo Technologies (China) Inc</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <code>100000</code>

          <country>China</country>
        </postal>

        <email>zhanglh2@asiainfo.com</email>
      </address>
    </author>

    <date day="28" month="February" year="2026"/>

    <area>IETF Area</area>

    <workgroup>DMSC Working Group</workgroup>

    <keyword>Agent Gateway, Artificial Intelligence, Protocol Suite</keyword>

    <abstract>
      <t>This document specifies a Multi-agent Collaboration Protocol Suite,
      which enables scalable, secure, and semantically driven collaboration
      among distributed agents across heterogeneous networks. The protocol
      suite introduces Agent Gateways as key entities responsible for agent
      registration, authentication, capability management and other functions,
      while preserving direct peer-to-peer semantic interactions among
      agents.</t>
    </abstract>
  </front>

  <middle>
    <section anchor="intro" title="Introduction">
      <t>As multi-agent systems become increasingly distributed across
      heterogeneous networks and administrative domains, efficient, secure,
      and semantically meaningful collaboration among agents becomes a
      critical challenge. Traditional service-oriented or message-based
      interaction models are insufficient to capture agent-level capabilities,
      dynamic task decomposition, and semantic intent-driven
      communication.</t>

      <t>This document specifies a Multi-agent Collaboration Protocol Suite.
      The suite defines a set of coordinated protocols that enable agent
      registration, authentication, capability synchronization, task-based
      invocation, and peer-to-peer semantic interaction. The Agent Gateway is
      a functional entity that serves as the infrastructure that provides
      interconnection functions for agent collaboration, mediates control,
      policy enforcement, and orchestration, and enables authorized agents to
      directly exchange semantic information.</t>

      <t>The protocol suite is aligned with the architectural principles of
      control/forwarding plane separation, least-privilege authorization, and
      session-scoped semantic communication.</t>
    </section>

    <section title="Conventions used in this document">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref target="RFC2119">
      </xref> .</t>
    </section>

    <section title="Terminology">
      <t>The following terms are defined in this draft:<list style="symbols">
          <t>Agent: An Agent is a software entity with autonomous
          decision-making and execution capabilities, capable of perceiving
          the environment, acquiring contextual information, reasoning, and
          performing tasks independently or collaboratively with other
          agents.</t>

          <t>Agent Gateway: The Agent Gateway is a functional entity that
          serves as the infrastructure for enabling interconnection and
          collaboration among agents. While its core role remains consistent,
          it is inherently flexible in deployment and can be realized in
          various forms&mdash;ranging from a network service to a dedicated
          gateway&mdash;depending on the architectural and operational
          requirements of different network environments.</t>

          <t>Agent Management Center (AMC): It is the trusted infrastructure
          service responsible for agent identity lifecycle management and
          credential issuance.</t>

          <t>Agent Identity Code (AIC): An Agent Identity Code (AIC) is a
          verifiable, globally unique identifier that represents the identity
          of an Agent.</t>

          <t>Agent Capability Specification (ACS): An Agent Capability
          Specification (ACS) is a structured description of an agent's
          capabilities and service information that can be stored, retrieved,
          and matched.</t>

          <t>Agent Credential: An Agent Credential is a tamper-resistant data
          object issued by an Agent Management Center(or its credential
          authority component), used by an Agent to prove identity attributes
          and/or authorization to a relying party. Examples include X.509
          certificates and security tokens.</t>

          <t>Agent Autonomous Domain: An Agent Autonomous Domain is an
          administrative and governance domain organized and managed by a
          specific IoA service provider. An Agent Autonomous Domain typically
          includes one Agent Management Center, one or more Agent Gateways,
          and the agents registered within its scope.</t>

          <t>Agent Registration Protocol (ARP): The ARP governs how an agent
          formally registers with a locally attached agent gateway.</t>

          <t>Agent Authentication and Authorization Protocol (AAAP): The AAAP
          defines how authentication and authorization decisions are requested
          and enforced.</t>

          <t>Capability Digest and Synchronization Protocol (CDSP): The CDSP
          synchronizes abstracted capability digest information across agent
          gateways based on gateway-generated ACS records.</t>

          <t>Task-based Invocation Protocol (TIP): The TIP defines how tasks,
          once decomposed by the application logic, are coordinated across
          agents.</t>
        </list></t>
    </section>

    <section title="Multi-Agent Collaboration Function Entity Architecture">
      <t>The DMSC architecture defines four functional entities and one
      external actor (User). Each functional entity represents a logical role
      in the IoA architecture; implementations MAY combine multiple entities
      into a single product or distribute a single entity across multiple
      services.</t>

      <figure>
        <artwork><![CDATA[                    +-----------------------+     
                    |Agent Management Center|
                    |     (Identity +       |
                    |      Credential)      |
                    +---------+-------------+
                              |  AAAP
                              |
                        +-------------------+
                        |   Agent Gateway   |
                        |   (Capability     |
                        | + Discovery       |
                        | + Registration    |     +---------------------+
                        | + Msg Distribution|     | External Resource   |
                        | + Trust Policy)   |     | Service             |
                        +--+-----+----------+     +----------+----------+
                           |     |                       |
                     ARP   |     | TIP                   |  MCP
                           |     |                       |
             +-----------------------+            +----------------------+
             |        Agent          |     A2A    |        Agent         |
             |      (Role A)         |----------- |      (Role B)        |
             +----------+------------+            +----------------------+
                        |
             +----------+------------+
             |          User         |
             +-----------------------+

            Figure 1 Function Entity Architecture Overview]]></artwork>
      </figure>

      <section title="Agent">
        <t>An Agent is a software entity with autonomous decision-making and
        execution capabilities, capable of perceiving the environment,
        acquiring contextual information, reasoning, and performing tasks
        independently or collaboratively with other agents. Each Agent is
        created by a specific Agent Provider and MUST complete registration
        with an Agent Management Center before providing services in an IoA
        deployment.</t>

        <t>An Agent is responsible for: <list style="symbols">
            <t>Maintaining its own identity information (e.g., AIC) and
            credentials locally.</t>

            <t>Maintaining its capability description (e.g., ACS) and ensuring
            consistency with its current state.</t>

            <t>Performing authentication and authorization checks for
            interconnection, including mutual verification of peer agents and
            validation of presented credentials. - Conducting agent-to-agent
            interaction, including session establishment, message exchange,
            and task/context management.</t>

            <t>Accessing external resources when required to fulfill
            tasks.</t>

            <t>Producing monitoring and logging data for troubleshooting,
            auditing, and governance purposes.</t>
          </list>These are internal agent capabilities described here for
        informational purposes. They are NOT standardized as separate
        architectural functional components. In an interaction, an Agent MAY
        assume different roles depending on the collaboration mode. The DMSC
        architecture does not constrain the set of possible roles; specific
        collaboration protocols MAY define role semantics appropriate to their
        interaction patterns.</t>

        <t>For example, in a task-driven collaboration: <list style="symbols">
            <t>Leader: The Agent that initiates tasks and organizes
            collaboration.</t>

            <t>Partner: The Agent that accepts tasks and provides services,
            executing assigned tasks and returning results to the Leader.</t>
          </list>A single Agent implementation MAY act in different roles
        across different interactions. Role assignment is per-interaction, not
        per-deployment.</t>
      </section>

      <section title="Agent Management Center">
        <t>The Agent Management Center is the trusted infrastructure service
        responsible for agent identity lifecycle management and credential
        issuance. The Agent Authentication serves as the trust anchor for an
        IoA deployment.</t>

        <t>The Agent Management Center provides the following functions: <list
            style="symbols">
            <t>Credential Management: Issuing, renewing, suspending, revoking,
            and publishing status of Agent Credentials (e.g., X.509
            certificates, security tokens) bound to AICs.</t>

            <t>Credential Validation Support: Providing credential validation
            material (e.g., issuer public keys, certificate revocation lists,
            OCSP endpoints) to relying parties.</t>
          </list>Multiple Agent Management Center MAY exist in an IoA
        deployment, each managing a subset of agents within its administrative
        scope. A deployment MAY realize the identity management function and
        the credential authority function as separate services, provided they
        maintain consistent identity-to-credential binding.</t>
      </section>

      <section title="Agent Gateway">
        <t>The Agent Gateway is a functional entity that serves as the
        infrastructure for enabling interconnection and collaboration among
        agents. While its core role remains consistent, it is inherently
        flexible in deployment and can be realized in various
        forms&mdash;ranging from a network service to a dedicated
        gateway&mdash;depending on the architectural and operational
        requirements of different network environments. </t>

        <t>The Agent Gateway provides the following functions: identity
        management, agent registration, capability directory, capability
        discovery, semantic routing, message distribution and so on. The Agent
        Gateway SHOULD support synchronization with the Agent Management
        Center to ensure accuracy and timeliness of identity and capability
        information. Multiple Agent Gateways MAY exist in an IoA deployment,
        each serving a defined administrative scope. A deployment MAY
        co-locate the Agent Gateway with the Agent Management Center. More
        specific requirements are specified in
        [draft-liu-dmsc-gw-requirements]<xref target="GW-REQ"/>. </t>
      </section>

      <section title="External Resource Service ">
        <t>The External Resource Service is a device, software component, or
        network-accessible service that provides specific functions to agents.
        Examples include APIs, databases, computation services, and other
        external resources.</t>

        <t>The External Resource Service provides the following functions:
        <list style="symbols">
            <t>Resource Exposure: Registering or exposing available resources
            and their invocation interfaces to authorized agents.</t>

            <t>Invocation Handling: Receiving and processing resource
            invocation requests from agents, executing the requested
            operations, and returning results.</t>

            <t>Access Control: Enforcing access control policies on resource
            invocations, including authentication of requesting agents and
            authorization checks.</t>
          </list>An External Resource Service MAY represent a single resource,
        a resource gateway, or a resource execution environment. Deployments
        MAY use existing resource access protocols (e.g., MCP [Model Context
        Protocol], A2T [Agent-to-Tool Protocol]) for agent-to-resource
        interaction.</t>
      </section>

      <section title="Data Objects">
        <t>The following are protocol data objects referenced by the
        functional entities. They are not functional entities themselves.</t>

        <t>Agent Identity Code (AIC): An Agent Identity Code (AIC) is a
        verifiable, globally unique identifier that represents the identity of
        an Agent. An AIC is allocated by an Agent Gateway during agent
        registration.</t>

        <t>Agent Capability Specification (ACS): An Agent Capability
        Specification (ACS) is a structured description of an agent's
        capabilities and service information that can be stored, retrieved,
        and matched. An ACS MAY use the JSON [RFC8259] <xref
        target="RFC8259"/> format, typically including: the agent's AIC,
        functional capabilities, technical characteristics, service
        interfaces, and security requirements.</t>

        <t>Agent Credential: An Agent Credential is a tamper-resistant data
        object issued by an Agent Authentication (or its credential authority
        component), used by an Agent to prove identity attributes and/or
        authorization to a relying party. Examples include X.509 certificates
        and security tokens.</t>

        <t>Agent Autonomous Domain: An Agent Autonomous Domain is an
        administrative and governance domain organized and managed by a
        specific IoA service provider. An Agent Autonomous Domain typically
        includes one Agent Authentication, one or more Agent Gateways, and the
        agents registered within its scope.</t>
      </section>

      <section title="Entity Summary ">
        <t>The following table provides a summary of all functional entities
        and external actors in the simplified DMSC architecture.</t>

        <t><figure>
            <artwork><![CDATA[| #  | Entity                    | Type              | Role in Architecture                                  |
|----|---------------------------|-------------------|-------------------------------------------------------|
| 1  | Agent                     | Core entity       | Autonomous task execution and collaboration           |
| 2  | Agent Management Center   | Infrastructure    | Identity lifecycle management and credential issuance |
| 3  | Agent Gateway             | Infrastructure    | Capability directory, discovery, routing, message distribution, trust policy |
| 4  | External Resource Service | Infrastructure    | External resource exposure and invocation handling    |
| 5  | User                      | External actor    | Task initiation, authorization, and result consumption|

Figure 2  A summary of all functional entities]]></artwork>
          </figure></t>
      </section>
    </section>

    <section title="Multi-Agent Collaboration Protocol Suite Overview">
      <t>The Multi-Agent Collaboration Protocol Suite defines a set of
      interaction processes as shown in the figure below that collectively
      enable secure agent onboarding, distributed capability visibility,
      semantic request resolution, peer-to-peer semantic interaction, and
      task-oriented multi-agent orchestration. Rather than operating
      independently, these protocols are designed to be executed in a tightly
      coupled manner along the agent lifecycle and collaboration workflows.
      The Agent Gateway (AG) serves as the anchoring point for control-plane
      coordination.</t>

      <figure align="center">
        <artwork><![CDATA[
 User        Agent A      AG 1          AG 3              AMC           AG 2        Agent B    Agent C
  |             |            |             |               |              |<--------------Register|
  |             |Register--->|             |               |              |<--Register|           |       
  |             |            |--Auth Req------------------>|<---Auth Req--|           |           |         
  |             |            |<-----------------Auth Grant |--Auth Grant->|           |           |
  |             |<-Local Bind|             |               |              |           |           |    
  |             |            |             |               |              |--Local Bind (B,C)---->|
  |             |            |             |               |              |           |           |
  |             |            |             |               |              |           |           |    
  |             |            |<----------->|<-----Capa Digest and Sync -->|           |           |
  |             |            |             |               |              |           |           |    
  |             |            |             |               |              |           |           |
  |             |            |             |               |              |           |           |
  |             |            |             |               |              |           |           |
  | --Req-----> |-SemR Req-->|             |               |              |           |           |
  |             |            |             |               |              |           |           |
  |             |            |---SemR Req->|----------------------------->|           |           |
  |             |            |<------------|<------SemR Resp--------------|           |           |
  |             |<-SemR Resp |             |               |              |           |           |    
  |             |============================ Semantic Session========================|           |
  |             |>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>|           |  
  |             |<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<|           |
  |             |            |             |               |              |           |           |
  |             |            |             |               |              |           |           |
  |             |            |             |               |              |           |           |
  |--Task Req-->|               +-----------------------------+           |           |           |
  |             | ---------->   | Semantic Routing process    |---------->|           |           |
  |             |               + ----------------------------+           |           |           |    
  |             |--------------------------------------Invoke------------------------------------>|
  |             |<--------------------------------------Executing---------------------------------|   
  |             |            |             |               |              |           |           |                                                                                               

                           Figure 3 The overall sequence diagram of MACP  
]]></artwork>
      </figure>

      <section title="Agent Registration and Authorization Process">
        <t>An agent MUST register with its locally attached Agent Gateway
        before participating in any collaboration. This process is governed
        jointly by ARP and AAAP and establishes the agent&rsquo;s identity,
        trust status, and capability binding. Upon receiving a registration
        request, the Agent Gateway performs preliminary validation of the
        agent&rsquo;s identity attributes and initial capability description.
        The gateway then initiates an authentication and authorization request
        to the Central Authentication Service, conveying the agent identity,
        gateway identity, and requested operational scope.</t>

        <t>The Central Authentication Service evaluates the request and
        returns an authorization grant or denial. Upon successful
        authorization, the Agent Management Center issues an Agent Credential.
        And the Agent Gateway finalizes the registration by assigning the
        agent a globally unique Agent Identity Code (AIC) and Capability
        Identifier(s). The AIC represents the agent&rsquo;s persistent
        identifier within the architecture. The AIC is allocated by the Agent
        Gateway only after successful authentication and authorization.</t>
      </section>

      <section title="Capability Digest and Synchronization Process">
        <t>Each Agent Gateway maintains detailed capability information only
        for its locally registered agents, and generates a structured Agent
        Capability Specification (ACS). The ACS is a gateway-generated
        representation that normalizes and organizes authorized capabilities
        associated with the assigned AIC. It reflects only those capabilities
        permitted within the approved operational scope. Gateways do not
        synchronize full agent capability states with each other. Instead, to
        support inter-gateway semantic resolution, gateways exchange
        capability digests using the Capability Digest Synchronization
        Protocol (CDSP). A capability digest is a locally generated, abstract
        summary of available capabilities, designed solely to indicate what
        kinds of capabilities exist behind a gateway, rather than how those
        capabilities are internally implemented or executed by agents.The
        structure and semantics of capability digests are intentionally
        decoupled from agent-internal capability representations, allowing
        gateways to evolve local capability models without impacting
        inter-gateway interoperability.</t>

        <t>CDSP distributes these capability digests incrementally. An initial
        exchange establishes basic inter-gateway visibility, while subsequent
        updates convey only digest changes, such as newly advertised
        capabilities, capability updates, or withdrawals. Digest updates are
        versioned and acknowledged to support consistency and conflict
        resolution. Through this digest-based mechanism, gateways maintain a
        scalable and privacy-preserving view of distributed agent capabilities
        without requiring centralized directories or full capability
        replication.</t>
      </section>

      <section title="Semantic Resolution and Routing Process">
        <t>When a user issues a request to an agent (e.g., Agent A), the agent
        abstracts the request into a semantic request and submits it to its
        locally attached Agent Gateway (AG1). Upon receiving the semantic
        request, AG1 performs semantic parsing and normalization and consults
        its local capability directory. If no matching capability identifier
        is found, AG1 forwards the semantic request to a peer or upstream
        gateway (e.g., AG3), which repeats the same resolution procedure. If
        the request remains unresolved, it is further forwarded to another
        gateway (e.g., AG2).</t>

        <t>When a gateway identifies a matching capability in its local
        directory, it generates a semantic resolution response containing the
        resolved capability identifier and the corresponding target agent
        information. This response is propagated hop-by-hop back to the
        originating gateway and ultimately delivered to Agent A.</t>

        <t>Following successful resolution, Agent A and the target agent
        (e.g., Agent B) directly establish a semantic session. During the
        lifetime of this session, semantic data is exchanged directly between
        agents in a peer-to-peer manner, while gateways remain responsible for
        resolution, authorization scope enforcement, and security policy
        application during session establishment.</t>
      </section>

      <section title="Task-based Multi-Agent Invocation Process ">
        <t>Task-based collaboration extends semantic resolution to scenarios
        requiring multiple agents and coordinated execution. When a user
        initiates a task request, the request is delivered to Agent A, which
        performs semantic understanding of the task and decomposes it into one
        or more sub-tasks along with the required capabilities. If Agent A
        does not possess task decomposition capabilities, its attached Agent
        Gateway MAY act as a proxy to analyze and decompose the task on behalf
        of the agent.</t>

        <t>For each sub-task, Agent A submits a semantic request to its local
        gateway, triggering the semantic resolution and routing process.
        Unlike pure point-to-point semantic communication, gateways
        additionally apply task-level constraints, policy considerations, and
        capability selection logic to identify suitable target agents.</t>

        <t>The resolved results are returned to Agent A, which then directly
        invokes the selected agents and establishes the necessary semantic
        sessions for execution. Through this mechanism, multiple agents can be
        dynamically selected and coordinated to collaboratively execute
        complex tasks.</t>
      </section>

      <section title="Agent-to-Agent Process">
        <t>The Agent-to-Agent Protocol (A2A) defines how two authorized agents
        establish, maintain, and terminate a semantic session for peer-to-peer
        semantic communication. A2A operates entirely between agents in the
        data plane. Agent gateways participate only during session
        authorization and parameter provisioning phases and are not required
        in the semantic data path once the session is established.</t>

        <t>A2A process consists of four phases: <list style="symbols">
            <t>Session Initiation: A semantic session is initiated when an
            agent, having obtained a valid resolution result, sends a session
            initiation message to the target agent. The message includes the
            Agent Identifiers, a proposed Session Identifier, the resolved
            Capability Identifier, and a verifiable authorization artifact
            derived from prior control-plane procedures. Upon transmission,
            the initiating agent awaits confirmation from the target
            agent.</t>

            <t>Mutual Verification and Session Establishment: Upon receiving
            the initiation request, the target agent verifies the
            initiator&rsquo;s identity, validates the authorization context,
            and confirms that the referenced capability is locally bound and
            permitted by policy. If validation succeeds, the target agent
            returns a session acceptance message, and both agents transition
            to an established state. If validation fails, the request is
            rejected and no session is created.</t>

            <t>Semantic Interaction: Once established, semantic data is
            exchanged directly between the agents and is explicitly bound to
            the Session Identifier and Capability Identifier. Each agent
            enforces the authorized capability scope locally. The protocol
            does not mandate a specific transport, but confidentiality and
            integrity protection are expected to be ensured by the underlying
            secure channel.</t>

            <t>Session Update: If session parameters require adjustment,
            either agent may request an update. Any modification must remain
            within the originally authorized scope unless additional
            authorization is obtained. Updated parameters take effect upon
            mutual agreement.</t>

            <t>Session Termination: A session is terminated when either agent
            sends a termination message or when authorization expires. Upon
            termination, both agents release associated resources and reject
            further messages referencing the Session Identifier.</t>
          </list></t>

        <t><figure>
            <artwork><![CDATA[  Agent A                             Agent B
   |                                     |
   |---- SESSION_INIT ------------------>|
   |                                     |
   |<--- SESSION_ACCEPT -----------------|
   |                                     |
   |========== Semantic Data ===========>|
   |<========= Semantic Data ============|
   |                                     |
   |---- SESSION_TERMINATE ------------->|
   |                                     |
 Figure 4  Agent-to-Agent Semantic Session Process
]]></artwork>
          </figure></t>
      </section>

      <section title="Agent to External Resource Service Process">
        <t>When an agent requires capabilities that are not internally
        available within the agent collaboration domain, it interacts with an
        External Resource Service (ERS) through a standardized
        agent-to-resource access protocol. The agent first resolves the target
        resource endpoint and determines whether the requested operation falls
        within its authorized trust scope. The agent then establishes a secure
        session with the External Resource Service using an existing resource
        access protocol, such as MCP (Model Context Protocol), A2T
        (Agent-to-Tool Protocol), or other deployment-specific interfaces.</t>

        <t>The agent includes its identity reference (e.g., AIC or associated
        credential) in the invocation request. The External Resource Service
        performs authentication and authorization checks based on its local
        access control policies. If approved, the requested operation is
        executed and the result is returned to the agent.</t>
      </section>
    </section>

    <section title="Requirements for the protocol suite">
      <t>The protocol suite defined in this document supports the complete
      interaction lifecycle of multi-agent collaboration. Each stage of
      collaboration &mdash; including registration, authorization, capability
      visibility, semantic resolution, task coordination, and session
      establishment &mdash; requires specific protocol. From an end-agent
      perspective, the corresponding protocols collectively form a Interaction
      Layer, as shown in the figure below.</t>

      <t>Before an agent can participate in any collaboration, it must
      establish a recognized identity and authorized operational scope within
      the system. This requirement leads to the definition of the Agent
      Registration Protocol (ARP) and the Agent Authentication and
      Authorization Protocol (AAAP). ARP governs how an agent formally
      registers with a locally attached distributed node, while AAAP defines
      how authentication and authorization decisions are requested and
      enforced.</t>

      <t>Once identity and authorization are established, the system should
      enable capability visibility across agent gateways. This introduces the
      need for the Capability Digest and Synchronization Protocol (CDSP),
      which synchronizes abstracted capability digest information across agent
      gateways based on gateway-generated ACS records.</t>

      <t>For multi-agent task execution, the Task-based Invocation Protocol
      (TIP) defines how tasks, once decomposed by the application logic, are
      coordinated across agents. TIP standardizes task state signaling,
      invocation ordering, and execution control across distributed
      participants. Importantly, task decomposition algorithms and business
      workflow reasoning remain within the Application Layer; TIP only governs
      the distributed coordination of already-defined tasks.</t>

      <t>Finally, once authorization and routing decisions have been
      completed, direct semantic interaction between agents requires session
      establishment and execution control. This is addressed by the
      Agent-to-Agent Protocol (A2A), which governs session creation,
      capability-scoped execution, and termination. A2A enables direct
      semantic exchange without redefining application logic or semantic
      interpretation.</t>

      <t>Based on the above, the protocol suite consists of the following
      categories:<list style="symbols">
          <t>Agent Registration Protocol (ARP) and Agent Authentication and
          Authorization Protocol (AAAP), which jointly establish agent
          identity, trust, and operational scope.</t>

          <t>Capability Digest Synchronization Protocol (CDSP), which
          maintains distributed visibility of agent capability digest across
          gateways.</t>

          <t>Task-based Invocation Protocol (TIP), which extends semantic
          routing to multi-agent task decomposition and orchestration.</t>

          <t>Agent-to-Agent Protocol (A2A), which completes the collaboration
          lifecycle by enabling autonomous, peer-to-peer semantic
          interaction.</t>

          <t>Agent to External Resource Service Protocol, which will use
          existing protocol, such as MCP (Model Context Protocol), A2T
          (Agent-to-Tool Protocol), or other deployment-specific
          interfaces.</t>
        </list></t>

      <t><figure>
          <artwork><![CDATA[+------------------------------------------------------------------+
|                    Application Layer                             |
|                                                                  |
| +------------------+ +------------------+ +------------------+   |
| | Task             | | Policy and       | | HITL and         |   |
| | Orchestration    | | Governance       | | Failure Handling |   |
| | - decomposition  | | - policy rules   | | - escalation     |   |
| | - state model    | | - dynamic CBAC   | | - fallback/retry |   |
| +------------------+ +------------------+ +------------------+   |
+-----------------------------+------------------------------------+
                              |
                              | Application-to-Semantic Contract
                              v
+------------------------------------------------------------------+
|                      Semantic Layer                              |
|                                                                  |
| +------------------+ +------------------+ +------------------+   |
| | Ontology and     | | Validation and   | | Natural-Language |   |
| | Profile Model    | | Rules            | | Intent           |   |
| | - classes and    | | - consistency    | | Normalization    |   |
| |   properties     | | - applicability  | | - text to intent |   |
| | - constraints    | | - deterministic  | | - confidence and |   |
| +------------------+ +------------------+ |   ambiguity      |   |
|                                           +------------------+   |
| +------------------+ +------------------+                        |
| | Alignment and    | | Knowledge        |                        |
| | Version          | | Resources        |                        |
| | Governance       | | - glossary/codes |                        |
| | - mapping        | | - remediation    |                        |
| |   confidence     | |   knowledge      |                        |
| | - compatibility  | |                  |                        |
| |                  | |                  |                        |
| +------------------+ +------------------+                        |
+-----------------------------+------------------------------------+
                              |
                              | Semantic-to-Interaction Contract
                              v
+------------------------------------------------------------------+
|                   Coordination Layer                             |
|       +---------------------+   +---------------------+          |
|       | Register & Identity |   |  Authentication     |          |
|       | - ARP               |   |  & Authorization    |          |
|       |                     |   |  - AAAP             |          |
|       +---------------------+   +---------------------+          |
|       +---------------------+   +---------------------+          |
|       | Invocation & Session|   | Sync & Resolution   |          | 
|       | - TIP               |   | & Routing           |          |
|       | - A2A               |   | - CDSP              |          |
|       +---------------------+   +---------------------+          |
+------------------------------------------------------------------+
                              |
                              v
+------------------------------------------------------------------+
|       Transport Connectivity + Security Enforcement              |
+------------------------------------------------------------------+
  Figure 5 Unified Layered Architecture and Modules
]]></artwork>
        </figure></t>
    </section>

    <section title="Deployment Example: Fixed Network with Agent Gateway Realization">
      <t>This section provides a deployment example illustrating how the
      proposed architecture can be realized in a fixed network environment.
      The purpose of this example is not to constrain implementation choices,
      but to demonstrate how distributed nodes defined in the architecture may
      be instantiated using existing or enhanced network elements.</t>

      <t>In a fixed broadband network, distributed nodes can be realized as
      enhanced Agent Gateway functions deployed at aggregation layers, or
      service edge points. These nodes are positioned logically between access
      networks and service domains, enabling them to perform registration,
      authorization mediation, capability abstraction, and semantic routing
      functions without requiring changes to end-user access
      infrastructure.</t>

      <t>In such deployments as shown in figure 6: <list style="symbols">
          <t>Agent registration and authentication are performed via the AG
          and Agent Management Center (AMC).</t>

          <t>Capability digest exchange occurs between AGs.</t>

          <t>Semantic resolution is handled hop-by-hop across AGs.</t>

          <t>Agents establish peer-to-peer semantic sessions after
          gateway-mediated coordination.</t>
        </list>This example demonstrates that distributed nodes, which
      encapsulate logical coordination functions, can be embedded into agent
      gateways in fixed networks.</t>

      <t><figure>
          <artwork><![CDATA[
 
 
                                    +------------------------------+                             
                               +----|    Agent Management Center   |------+                             
                               |    +------------------------------+      |                 
                               |                                          |
      +----------+      +---------+                                  +---------+   +---------+
      | Agent A  | ---- | AG 1    |<-------------+    +------------->|  AG 2   |---| Agent B |
      +----------+      +---------+              |    |              +---------+   +---------+
                                                 |    |         
                                             +------------+     
                                             |  Routers   |     
                                             +------------+       

                     Figure 6  Deployment Example: Fixed Network with Agent Gateway Realization
]]></artwork>
        </figure></t>
    </section>

    <section title="Deployment Example: Mobile Operator Network ">
      <t>In a mobile operator network (e.g., a 6G network), AI capabilities
      and technologies are expected to be leveraged subject to operator
      policies and configurations. AI Agents, which refer generally to agents
      that autonomously perform tasks on behalf of users, systems, and/or
      applications, can understand complex requests and improve network
      efficiency. In addition, capabilities and services such as sensing,
      real-time data processing, telemetry, analytics, and others within a 6G
      network may also be provided as &ldquo;Tools&rdquo; to third-party
      applications.</t>

      <t>Below figure shows an example of AI agents, an Agent Management
      Center and an Agent Gateway deployed in the mobile operator network. The
      architecture of 6G is still in discussion, thus some functionalities are
      described by using some 5G NFs as typical examples.</t>

      <t>User initiates intent in nature language and receive human-readable
      result. Intent analysis takes place at two stages:<list style="symbols">
          <t>(Optional, based on UE capabilities) The UE converts
          natural-language intent to operator-defined intent and also
          translates operator-defined results to human-readable results based
          on internal implementation.</t>

          <t>(Mandatory) The network function (NF) with agent capability in
          the mobile operator core network comprehends and analyzes the
          intent. Based on the analyzed intent, a subsequent workflow is
          generated. Typically, the NF that terminates NAS messages (e.g., AMF
          in 5G) can either comprehend the intent (when the AMF includes agent
          capability) or forward the intent to an agent-enabled NF in the core
          network (when the AMF does not include agent capability).</t>
        </list>Agent-enabled NFs request AIC allocation from the Agent
      Gateway. The NF (e.g., AMF in 5G) that terminates NAS messages and
      manages UE registration may request AIC from the Agent Gateway on behalf
      of the agent in the UE. The Agent Management Center is responsible for
      agent authentication and authorization. The authentication and
      authorization procedure for agents (Agents &harr; Agent Gateway &harr;
      Agent Management Center) may reference the authentication and
      authorization procedure for UEs (e.g., UEs &lt;-&gt; AMF &lt;-&gt; UDM
      &lt;-&gt; AUSF in 5G).</t>

      <t>Agent-enabled NFs register with the Agent Gateway and discover each
      other by querying the Agent Gateway. The registration and discovery
      mechanism is similar to the functionality provided by the NRF in 5G
      networks. However, standardization of agent capabilities is essential
      for the accuracy and efficiency of agent discovery. The NF (e.g., AMF in
      5G) that terminates NAS messages and manages UE registration may
      interact with the Agent Gateway on behalf of the agent in the UE.
      However, the discovery of the agent on the UE takes the UE connection
      state into account.</t>

      <t>Service-based interfaces may be enhanced to support agent
      communication, or agent-based interfaces may be introduced to support AI
      traffic carrying Agent-to-Agent semantic data. The AI capabilities
      supported by the mobile operator network may be exposed as agent tools
      and invoked by third-party AI agents via the Agent Gateway, which
      performs protocol conversion for different agent communication protocols
      if necessary, while AI traffic transmitted through the mobile operator
      network may be identified to guarantee performance requirements.</t>

      <t>The NF supporting session management (e.g., SMF in 5G) can be
      enhanced, or a new NF may be introduced to support the management of
      Agent-to-Agent semantic sessions between the agent residing in the UE
      and the agent residing in the operator core network.</t>

      <t><figure>
          <artwork><![CDATA[     +-------+                                                                                                                             
     |  Uesr |                                                                                                                             
     +-+-----+                                                                                                                             
       |  ^                                                                                                                                
       |  |                                                                                                                                
       |  |                                                                                                                                
+------+--+-------+                 +----------------------------------------------------------------------+                +------------+ 
|      |  |       |                 |                                                   Mobile Operator    |                | Third Party| 
|      v  |       |                 |                                                      Corenetwork     |                |            | 
|  +------+----+  | Operator-defined|                                                                      |                |            | 
|  |  UE APP   |  | <-------------> |    +--------+    +-----------+    +----------+                       |<-------------> |  +------+  | 
|  +--+--------+  |                 |    |   NF   |    | NF with   |    |   Agent  |                       |                |  | Agent|  | 
|     |   ^       |                 |    |        |    |   Agent   |    |  Gateway |                       |                |  +------+  | 
|     v   |       |                 |    +---+----+    +-----+-----+    +-----+----+                       |                |            | 
|  +------+----+  |                 |        |               |                |                            |                |  +------+  |
|  | UE OS Layer  |                 |        |               |                |                            |                |  | Agent|  |
|  |   Agent   |  |                 |        |               |                |     Service Based Interface|                |  +------+  | 
|  +--+--------+  | Intent Execution|        |               |                |      (Agent Enhancement)   |                |            | 
|     |   ^       | <-------------> |--------+----+----------+----+-----------+----+------------------     | <------------->|     .      | 
|     |   |       |      Result     |             |               |                |                       |                |     .      | 
|     |   |       |                 |             |               |                |                       |                |     .      | 
|     v   |       |                 |             |               |                |                       |                |     .      | 
|  +------+----+  |                 |      +------+----+     +----+---+    +-------+-----+                 |                |     .      | 
|  | UE Modem  |  |                 |      |  NF with  |     |   NF   |    |    Agent    |                 |                |            | 
|  |           |  |                 |      |   Agent   |     |        |    | Management  |                 |                |  +------+  | 
|  +-----------+  |   AI traffic    |      +-----------+     +--------+    |    Center   |                 |    AI Traffic  |  | Agent|  | 
|                 | <-------------> |                                      +-------------+                 | <------------->|  +------+  | 
|                 |     Transfer    |                                                                      |     Transfer   |            | 
| UE              |                 |                                                                      |                |            | 
+-----------------+                 +----------------------------------------------------------------------+                +------------+ 
                                              Figure 7 Deployment Example: Mobile Operator Network 
]]></artwork>
        </figure></t>
    </section>

    <section anchor="iana" title="IANA Considerations">
      <t>TBD</t>
    </section>

    <section title="Acknowledgement">
      <t>TBD</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.2119"?>

      <?rfc include="reference.RFC.8259"
?>

      <reference anchor="GW-REQ">
        <front>
          <title>Gateway Requirements for Dynamic Multi-agents Secured
          Collaboration. draft-liu-dmsc-gw-requirements.
          &lt;https://datatracker.ietf.org/doc/draft-liu-dmsc-gw-requirements/&gt;</title>

          <author fullname="Bing Liu" initials="B" surname="L">
            <organization/>
          </author>

          <date day="16" month="January" year="2026"/>
        </front>
      </reference>
    </references>
  </back>
</rfc>
