<?xml version="1.0" encoding="US-ASCII"?>
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private) -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY rfc2119 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
]>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="std" docName="draft-li-dmsc-macp-00" ipr="trust200902">
  <front>
    <title abbrev="MACP">Multi-agent Collaboration Protocol Suite</title>

    <author fullname="Xueting Li" initials="X" surname="Li">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <region>Beijing</region>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>lixt2@foxmail.com</email>
      </address>
    </author>

    <author fullname="Jun Liu" initials="J" surname="Liu">
      <organization>Beijing University of Posts and
      Telecommunications</organization>

      <address>
        <postal>
          <street>10 Xitucheng Road, Haidian District</street>

          <city>Beijing</city>

          <code>100876</code>

          <country>China</country>
        </postal>

        <email>liujun@bupt.edu.cn</email>
      </address>
    </author>

    <author fullname="Chenguang Du" initials="C" surname="Du">
      <organization>Zhongguancun Laboratory</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <code>100094</code>

          <country>China</country>
        </postal>

        <email>ducg@zgclab.edu.cn</email>
      </address>
    </author>

    <author fullname="Lianhua Zhang" initials="L" surname="Zhang">
      <organization>AsiaInfo Technologies (China) Inc</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <code>100000</code>

          <country>China</country>
        </postal>

        <email>zhanglh2@asiainfo.com</email>
      </address>
    </author>

    <date day="14" month="February" year="2026"/>

    <area>IETF Area</area>

    <workgroup>DMSC Working Group</workgroup>

    <keyword>Agent Gateway, Artificial Intelligence, Protocol Suite</keyword>

    <abstract>
      <t>This document specifies a Multi-agent Collaboration Protocol Suite
      based on Agent Gateway, which enables scalable, secure, and semantically
      driven collaboration among distributed agents across heterogeneous
      networks. The protocol suite introduces Agent Gateways as control-plane
      entities responsible for agent registration, authentication, capability
      management, semantic routing and other functions, while preserving
      direct peer-to-peer semantic interactions among agents.</t>
    </abstract>
  </front>

  <middle>
    <section anchor="intro" title="Introduction">
      <t>As multi-agent systems become increasingly distributed across
      heterogeneous networks and administrative domains, efficient, secure,
      and semantically meaningful collaboration among agents becomes a
      critical challenge. Traditional service-oriented or message-based
      interaction models are insufficient to capture agent-level capabilities,
      dynamic task decomposition, and semantic intent-driven
      communication.</t>

      <t>This document specifies a Multi-agent Collaboration Protocol Suite
      based on Agent Gateway (AGW). The suite defines a set of coordinated
      protocols that enable agent registration, authentication, capability
      synchronization, semantic routing, task-based invocation, and
      peer-to-peer semantic interaction. The architecture leverages Agent
      Gateways as first-class network entities that mediate control, policy
      enforcement, and orchestration, while allowing agents to directly
      exchange semantic information once authorized.</t>

      <t>The protocol suite is aligned with the architectural principles of
      control/forwarding plane separation, least-privilege authorization, and
      session-scoped semantic communication.</t>
    </section>

    <section title="Conventions used in this document">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref target="RFC2119">
      </xref> .</t>
    </section>

    <section title="Terminology">
      <t>The following terms are defined in this draft:<list style="symbols">
          <t>Agent: An Agent is a software entity with autonomous
          decision-making and execution capabilities, capable of perceiving
          the environment, acquiring contextual information, reasoning, and
          performing tasks independently or collaboratively with other
          agents.</t>

          <t>Agent Gateway. The Agent Gateway is the infrastructure service
          that provides interconnection functions for agent collaboration.
          .</t>

          <t>Agent Management Center (AMC): It is the trusted infrastructure
          service responsible for agent identity lifecycle management and
          credential issuance.</t>

          <t>Agent Identity Code (AIC): An Agent Identity Code (AIC) is a
          verifiable, globally unique identifier that represents the identity
          of an Agent.</t>

          <t>Agent Capability Specification (ACS): An Agent Capability
          Specification (ACS) is a structured description of an agent's
          capabilities and service information that can be stored, retrieved,
          and matched.</t>

          <t>Agent Credential: An Agent Credential is a tamper-resistant data
          object issued by an Agent Management Center(or its credential
          authority component), used by an Agent to prove identity attributes
          and/or authorization to a relying party. Examples include X.509
          certificates and security tokens.</t>

          <t>Agent Autonomous Domain: An Agent Autonomous Domain is an
          administrative and governance domain organized and managed by a
          specific IoA service provider. An Agent Autonomous Domain typically
          includes one Agent Management Center, one or more Agent Gateways,
          and the agents registered within its scope.</t>
        </list></t>
    </section>

    <section title="Multi-Agent Collaboration Function Entity Architecture">
      <t>The DMSC architecture defines four functional entities and one
      external actor (User). Each functional entity represents a logical role
      in the IoA architecture; implementations MAY combine multiple entities
      into a single product or distribute a single entity across multiple
      services.</t>

      <figure>
        <artwork><![CDATA[                    +-----------------------+     
                    |Agent Management Center|
                    |     (Identity +       |
                    |      Credential)      |
                    +---------+-------------+
                              |  IF-Sync
                              |
                        +---------------+
                        | Agent Gateway |
                        | (Capability   |
                        |  + Discovery  |
                        |  + Routing    |     +---------------------+
                        |  + Msg Dist.  |     | External Resource   |
                        |  + Trust Pol.)|     | Service             |
                        +--+-----+------+     +----------+----------+
                           |     |                       |
                     IF-Reg|     | IF-Disc               |  IF-Res
                           |     |                       |
             +-----------------------+            +----------------------+
             |        Agent          |  IF-Agent  |        Agent         |
             |      (Role A)         |----------- |      (Role B)        |
             +----------+------------+            +----------------------+
                        |
             +----------+------------+
             |          User         |
             +-----------------------+

            Figure 1 Function Entity Architecture Overview]]></artwork>
      </figure>

      <section title="Agent">
        <t>An Agent is a software entity with autonomous decision-making and
        execution capabilities, capable of perceiving the environment,
        acquiring contextual information, reasoning, and performing tasks
        independently or collaboratively with other agents. Each Agent is
        created by a specific Agent Provider and MUST complete registration
        with an Agent Management Center before providing services in an IoA
        deployment.</t>

        <t>An Agent is responsible for: <list style="symbols">
            <t>Maintaining its own identity information (e.g., AIC) and
            credentials locally.</t>

            <t>Maintaining its capability description (e.g., ACS) and ensuring
            consistency with its current state.</t>

            <t>Performing authentication and authorization checks for
            interconnection, including mutual verification of peer agents and
            validation of presented credentials. - Conducting agent-to-agent
            interaction, including session establishment, message exchange,
            and task/context management.</t>

            <t>Accessing external resources when required to fulfill
            tasks.</t>

            <t>Producing monitoring and logging data for troubleshooting,
            auditing, and governance purposes.</t>
          </list>These are internal agent capabilities described here for
        informational purposes. They are NOT standardized as separate
        architectural functional components. In an interaction, an Agent MAY
        assume different roles depending on the collaboration mode. The DMSC
        architecture does not constrain the set of possible roles; specific
        collaboration protocols MAY define role semantics appropriate to their
        interaction patterns.</t>

        <t>For example, in a task-driven collaboration: <list style="symbols">
            <t>Leader: The Agent that initiates tasks and organizes
            collaboration.</t>

            <t>Partner: The Agent that accepts tasks and provides services,
            executing assigned tasks and returning results to the Leader.</t>
          </list>A single Agent implementation MAY act in different roles
        across different interactions. Role assignment is per-interaction, not
        per-deployment.</t>
      </section>

      <section title="Agent Management Center">
        <t>The Agent Management Center is the trusted infrastructure service
        responsible for agent identity lifecycle management and credential
        issuance. The Agent Authenticationserves as the trust anchor for an
        IoA deployment.</t>

        <t>The Agent Management Center provides the following functions: <list
            style="symbols">
            <t>Credential Management: Issuing, renewing, suspending, revoking,
            and publishing status of Agent Credentials (e.g., X.509
            certificates, security tokens) bound to AICs.</t>

            <t>Credential Validation Support: Providing credential validation
            material (e.g., issuer public keys, certificate revocation lists,
            OCSP endpoints) to relying parties.</t>
          </list>Multiple Agent Management Center MAY exist in an IoA
        deployment, each managing a subset of agents within its administrative
        scope. A deployment MAY realize the identity management function and
        the credential authority function as separate services, provided they
        maintain consistent identity-to-credential binding.</t>
      </section>

      <section title="Agent Gateway">
        <t>The Agent Gateway is the infrastructure service that provides
        interconnection functions for agent collaboration. In the control
        plane / data plane separation model, the Agent Gateway primarily
        operates in the control plane.</t>

        <t>The Agent Gateway provides the following functions: <list
            style="symbols">
            <t>Identity Management: Allocating, updating, and de-registering
            Agent Identity Codes (AICs); defining and enforcing policies for
            uniqueness and governance of issued AICs within its administrative
            scope.</t>

            <t>Capability Directory: Accepting, validating, publishing,
            versioning, and de-listing Agent Capability Specifications (ACSs);
            maintaining the capability directory for agents within its
            administrative scope.</t>

            <t>Discovery and Matching: Receiving discovery queries from
            agents, matching query constraints against available agent
            capability descriptions, and returning ranked candidate sets.
            In-domain discovery SHOULD be supported; cross-domain discovery is
            OPTIONAL within a configured trust scope.</t>

            <t>Routing and Forwarding: Routing agent interaction requests
            based on capability matching results or task requirements. The
            routing function MAY support semantic routing as an extension
            point for future capabilities such as intent-based routing.</t>

            <t>Message Distribution: Providing message distribution services
            for group interactions (e.g., publish/subscribe, queue-based
            delivery) when agents interact in grouping mode.</t>

            <t>Trust Policy: Maintaining trust relationships and federation
            policies between Agent Autonomous Domains (e.g., trusted peer
            domain lists, cross-domain discovery policies) to constrain
            cross-domain discovery and interactions.</t>
          </list>The Agent Gateway SHOULD support synchronization with the
        Agent Management Center to ensure accuracy and timeliness of identity
        and capability information. Multiple Agent Gateways MAY exist in an
        IoA deployment, each serving a defined administrative scope.</t>

        <t>A deployment MAY co-locate the Agent Gateway with the Agent
        Management Center. A deployment MAY also realize the message
        distribution function as a dedicated Message Broker service; in such
        cases, the Agent Gateway retains management responsibility (control
        plane) while the Message Broker handles message transport (data
        plane).</t>
      </section>

      <section title="External Resource Service ">
        <t>The External Resource Service is a device, software component, or
        network-accessible service that provides specific functions to agents.
        Examples include APIs, databases, computation services, and other
        external resources.</t>

        <t>The External Resource Service provides the following functions:
        <list style="symbols">
            <t>Resource Exposure: Registering or exposing available resources
            and their invocation interfaces to authorized agents.</t>

            <t>Invocation Handling: Receiving and processing resource
            invocation requests from agents, executing the requested
            operations, and returning results.</t>

            <t>Access Control: Enforcing access control policies on resource
            invocations, including authentication of requesting agents and
            authorization checks.</t>
          </list>An External Resource Service MAY represent a single resource,
        a resource gateway, or a resource execution environment. Deployments
        MAY use existing resource access protocols (e.g., MCP [Model Context
        Protocol], A2T [Agent-to-Tool Protocol]) for agent-to-resource
        interaction.</t>
      </section>

      <section title="User ">
        <t>A User is a human or organizational entity that initiates tasks,
        provides authorization and policy input, and consumes results
        delivered by agents. A User interacts with agents but does not
        participate directly in agent-to-agent protocols defined by DMSC.</t>
      </section>

      <section title="Data Objects">
        <t>The following are protocol data objects referenced by the
        functional entities. They are not functional entities themselves.</t>

        <t>Agent Identity Code (AIC): An Agent Identity Code (AIC) is a
        verifiable, globally unique identifier that represents the identity of
        an Agent. An AIC is allocated by an Agent Gateway during agent
        registration. An AIC MAY encode information such as the issuing
        registry, the Agent Provider, a serial number, and a check code.</t>

        <t>Agent Capability Specification (ACS): An Agent Capability
        Specification (ACS) is a structured description of an agent's
        capabilities and service information that can be stored, retrieved,
        and matched. An ACS MAY use the JSON [RFC8259] <xref
        target="RFC8259"/> format, typically including: the agent's AIC,
        functional capabilities, technical characteristics, service
        interfaces, and security requirements.</t>

        <t>Agent Credential: An Agent Credential is a tamper-resistant data
        object issued by an Agent Authentication (or its credential authority
        component), used by an Agent to prove identity attributes and/or
        authorization to a relying party. Examples include X.509 certificates
        and security tokens.</t>

        <t>Agent Autonomous Domain: An Agent Autonomous Domain is an
        administrative and governance domain organized and managed by a
        specific IoA service provider. An Agent Autonomous Domain typically
        includes one Agent Authentication, one or more Agent Gateways, and the
        agents registered within its scope.</t>
      </section>

      <section title="Entity Summary ">
        <t>The following table provides a summary of all functional entities
        and external actors in the simplified DMSC architecture.</t>

        <t><figure>
            <artwork><![CDATA[| #  | Entity                    | Type              | Role in Architecture                                  |
|----|---------------------------|-------------------|-------------------------------------------------------|
| 1  | Agent                     | Core entity       | Autonomous task execution and collaboration           |
| 2  | Agent Management Center   | Infrastructure    | Identity lifecycle management and credential issuance |
| 3  | Agent Gateway             | Infrastructure    | Capability directory, discovery, routing, message distribution, trust policy |
| 4  | External Resource Service | Infrastructure    | External resource exposure and invocation handling    |
| 5  | User                      | External actor    | Task initiation, authorization, and result consumption|

Figure 2  A summary of all functional entities]]></artwork>
          </figure></t>
      </section>
    </section>

    <section title="Multi-Agent Collaboration Protocol Suite Overview">
      <t>The Multi-Agent Collaboration Protocol Suite based on Agent Gateway
      defines a set of coordinated protocols as shown in figure 1 that
      collectively enable secure agent onboarding, ,distributed capability
      visibility, semantic request resolution, peer-to-peer semantic
      interaction, and task-oriented multi-agent orchestration. Rather than
      operating independently, these protocols are designed to be executed in
      a tightly coupled manner along the agent lifecycle and collaboration
      workflows. The Agent Gateway (AG) serves as the anchoring point for
      control-plane coordination, while semantic interactions are
      progressively delegated to agents once resolution and authorization are
      completed.</t>

      <t>The protocol suite consists of the following categories:<list
          style="symbols">
          <t>Agent Registration Protocol (ARP) and Agent Authentication and
          Authorization Protocol (AAAP), which jointly establish agent
          identity, trust, and operational scope.</t>

          <t>Capability Synchronization Protocol (CSP), which maintains
          distributed visibility of agent capability digest across
          gateways.</t>

          <t>Semantic Resolution and Routing Protocol (SRRP), which enables
          semantic request discovery and routing across gateway domains.</t>

          <t>Task-based Invocation Protocol (TIP), which extends semantic
          routing to multi-agent task decomposition and orchestration.</t>

          <t>Agent-to-Agent Semantic Session Protocol (A2ASP), which completes
          the collaboration lifecycle by enabling autonomous, peer-to-peer
          semantic interaction.</t>
        </list></t>

      <t>Each protocol operates at a specific phase of the collaboration
      lifecycle and may be invoked independently or in combination with
      others. The following sections describe how these protocols are
      integrated into coherent operational flows.</t>

      <figure align="center">
        <artwork><![CDATA[
 User        Agent A      AG 1          AG 3              AMC           AG 2        Agent B    Agent C
  |             |            |             |               |              |<--------------Register|
  |             |Register--->|             |               |              |<--Register|           |       
  |             |            |--Auth Req------------------>|<---Auth Req--|           |           |         
  |             |            |<-----------------Auth Grant |--Auth Grant->|           |           |
  |             |<-Local Bind|             |               |              |           |           |    
  |             |            |             |               |              |--Local Bind (B,C)---->|
  |             |            |             |               |              |           |           |
  |             |            |             |               |              |           |           |    
  |             |            |<----------->|<-----Capa Digest and Sync -->|           |           |
  |             |            |             |               |              |           |           |    
  |             |            |             |               |              |           |           |
  |             |            |             |               |              |           |           |
  |             |            |             |               |              |           |           |
  | --Req-----> |-SemR Req-->|             |               |              |           |           |
  |             |            |             |               |              |           |           |
  |             |            |---SemR Req->|----------------------------->|           |           |
  |             |            |<------------|<------SemR Resp--------------|           |           |
  |             |<-SemR Resp |             |               |              |           |           |    
  |             |============================ Semantic Session========================|           |
  |             |>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>|           |  
  |             |<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<|           |
  |             |            |             |               |              |           |           |
  |             |            |             |               |              |           |           |
  |             |            |             |               |              |           |           |
  |--Task Req-->|               +-----------------------------+           |           |           |
  |             | ---------->   | Semantic Routing process    |---------->|           |           |
  |             |               + ----------------------------+           |           |           |    
  |             |--------------------------------------Invoke------------------------------------>|
  |             |<--------------------------------------Executing---------------------------------|   
  |             |            |             |               |              |           |           |                                                                                               

                           Figure 3 The overall sequence diagram of MACP  
]]></artwork>
      </figure>

      <section title="Agent Registration and Authorization Process">
        <t>An agent MUST register with its locally attached Agent Gateway
        before participating in any collaboration. This process is governed
        jointly by ARP and AAAP and establishes the agent&rsquo;s identity,
        trust status, and capability binding. Upon receiving a registration
        request, the Agent Gateway performs preliminary validation of the
        agent&rsquo;s identity attributes and initial capability description.
        The gateway then initiates an authentication and authorization request
        to the Central Authentication Service, conveying the agent identity,
        gateway identity, and requested operational scope.</t>

        <t>The Central Authentication Service evaluates the request and
        returns an authorization grant or denial. Upon successful
        authorization, the Agent Management Center issues an Agent Credential.
        And the Agent Gateway finalizes the registration by assigning the
        agent a globally unique Agent Identity Code (AIC) and Capability
        Identifier(s). The AIC represents the agent&rsquo;s persistent
        identifier within the architecture. The AIC is allocated by the Agent
        Gateway only after successful authentication and authorization.</t>
      </section>

      <section title="Capability Digest and Synchronization Process">
        <t>Each Agent Gateway maintains detailed capability information only
        for its locally registered agents, and generates a structured Agent
        Capability Specification (ACS). The ACS is a gateway-generated
        representation that normalizes and organizes authorized capabilities
        associated with the assigned AIC. It reflects only those capabilities
        permitted within the approved operational scope. Gateways do not
        synchronize full agent capability states with each other. Instead, to
        support inter-gateway semantic resolution, gateways exchange
        capability digests using the Capability Synchronization Protocol
        (CSP). A capability digest is a locally generated, abstract summary of
        available capabilities, designed solely to indicate what kinds of
        capabilities exist behind a gateway, rather than how those
        capabilities are internally implemented or executed by agents.The
        structure and semantics of capability digests are intentionally
        decoupled from agent-internal capability representations, allowing
        gateways to evolve local capability models without impacting
        inter-gateway interoperability.</t>

        <t>CSP distributes these capability digests incrementally. An initial
        exchange establishes basic inter-gateway visibility, while subsequent
        updates convey only digest changes, such as newly advertised
        capabilities, capability updates, or withdrawals. Digest updates are
        versioned and acknowledged to support consistency and conflict
        resolution. Through this digest-based mechanism, gateways maintain a
        scalable and privacy-preserving view of distributed agent capabilities
        without requiring centralized directories or full capability
        replication.</t>
      </section>

      <section title="Semantic Resolution and Routing Process">
        <t>When a user issues a request to an agent (e.g., Agent A), the agent
        abstracts the request into a semantic request and submits it to its
        locally attached Agent Gateway (AG1). This interaction is governed by
        the Semantic Resolution and Routing Protocol (SRRP). Upon receiving
        the semantic request, AG1 performs semantic parsing and normalization
        and consults its local capability directory. If no matching capability
        identifier is found, AG1 forwards the semantic request to a peer or
        upstream gateway (e.g., AG3), which repeats the same resolution
        procedure. If the request remains unresolved, it is further forwarded
        to another gateway (e.g., AG2).</t>

        <t>When a gateway identifies a matching capability in its local
        directory, it generates a semantic resolution response containing the
        resolved capability identifier and the corresponding target agent
        information. This response is propagated hop-by-hop back to the
        originating gateway and ultimately delivered to Agent A.</t>

        <t>Following successful resolution, Agent A and the target agent
        (e.g., Agent B) directly establish a semantic session. During the
        lifetime of this session, semantic data is exchanged directly between
        agents in a peer-to-peer manner, while gateways remain responsible for
        resolution, authorization scope enforcement, and security policy
        application during session establishment.</t>
      </section>

      <section title="Task-based Multi-Agent Invocation Process ">
        <t>Task-based collaboration extends semantic resolution to scenarios
        requiring multiple agents and coordinated execution, as defined by the
        Task-based Invocation Protocol (TIP). When a user initiates a task
        request, the request is delivered to Agent A, which performs semantic
        understanding of the task and decomposes it into one or more sub-tasks
        along with the required capabilities. If Agent A does not possess task
        decomposition capabilities, its attached Agent Gateway MAY act as a
        proxy to analyze and decompose the task on behalf of the agent.</t>

        <t>For each sub-task, Agent A submits a semantic request to its local
        gateway, triggering the same multi-hop semantic resolution process
        defined by SRRP. Unlike pure point-to-point semantic communication,
        gateways additionally apply task-level constraints, policy
        considerations, and capability selection logic to identify suitable
        target agents.</t>

        <t>The resolved results are returned to Agent A, which then directly
        invokes the selected agents and establishes the necessary semantic
        sessions for execution. Through this mechanism, multiple agents can be
        dynamically selected and coordinated to collaboratively execute
        complex tasks, while maintaining consistent authorization and security
        enforcement through gateway-mediated control-plane functions.</t>
      </section>

      <section title="Agent-to-Agent Semantic Session Process">
        <t>The Agent-to-Agent Semantic Session Protocol (A2ASP) defines how
        two authorized agents establish, maintain, and terminate a semantic
        session for peer-to-peer semantic communication. A2ASP operates
        entirely between agents in the data plane. Distributed nodes
        participate only during session authorization and parameter
        provisioning phases and are not required in the semantic data path
        once the session is established.</t>

        <t>A2ASP consists of four phases: <list style="symbols">
            <t>Session Initiation: A semantic session is initiated when an
            agent, having obtained a valid resolution result, sends a session
            initiation message to the target agent. The message includes the
            Agent Identifiers, a proposed Session Identifier, the resolved
            Capability Identifier, and a verifiable authorization artifact
            derived from prior control-plane procedures. Upon transmission,
            the initiating agent awaits confirmation from the target
            agent.</t>

            <t>Mutual Verification and Session Establishment: Upon receiving
            the initiation request, the target agent verifies the
            initiator&rsquo;s identity, validates the authorization context,
            and confirms that the referenced capability is locally bound and
            permitted by policy. If validation succeeds, the target agent
            returns a session acceptance message, and both agents transition
            to an established state. If validation fails, the request is
            rejected and no session is created.</t>

            <t>Semantic Interaction: Once established, semantic data is
            exchanged directly between the agents and is explicitly bound to
            the Session Identifier and Capability Identifier. Each agent
            enforces the authorized capability scope locally. The protocol
            does not mandate a specific transport, but confidentiality and
            integrity protection are expected to be ensured by the underlying
            secure channel.</t>

            <t>Session Update: If session parameters require adjustment,
            either agent may request an update. Any modification must remain
            within the originally authorized scope unless additional
            authorization is obtained. Updated parameters take effect upon
            mutual agreement.</t>

            <t>Session Termination: A session is terminated when either agent
            sends a termination message or when authorization expires. Upon
            termination, both agents release associated resources and reject
            further messages referencing the Session Identifier.</t>
          </list></t>

        <t><figure>
            <artwork><![CDATA[  Agent A                             Agent B
   |                                     |
   |---- SESSION_INIT ------------------>|
   |                                     |
   |<--- SESSION_ACCEPT -----------------|
   |                                     |
   |========== Semantic Data ===========>|
   |<========= Semantic Data ============|
   |                                     |
   |---- SESSION_TERMINATE ------------->|
   |                                     |
 Figure 4  Agent-to-Agent Semantic Session Process
]]></artwork>
          </figure></t>
      </section>
    </section>

    <section title="Layered Responsibility and Protocol Positioning">
      <t>From the perspective of an end agent, the architecture can be
      understood as a layered responsibility model in which different
      functional concerns are clearly separated, as shown in figure 4. This
      document does not attempt to standardize all layers; rather, it focuses
      on a specific interaction and coordination layer within the overall
      system.</t>

      <t>The protocols specified in this document primarily belong to the
      Interaction Layer. This layer governs how agents register, discover each
      other, resolve capabilities, establish sessions, and execute
      collaborative tasks. Specifically, the Agent Registration Protocol (ARP)
      and Agent Authentication and Authorization Protocol (AAAP) address
      identity and trust establishment. The Capability Digest and
      Synchronization Protocol (CDSP) and Semantic Resolution and Routing
      Protocol (SRRP) support capability visibility and intent resolution. The
      Task-based Invocation Protocol (TIP) manages coordinated multi-agent
      invocation. The Agent-to-Agent Semantic Session Protocol (A2ASP) enables
      direct semantic interaction once authorization is established. These
      protocols collectively form the standardized coordination and
      interaction control framework between agents.</t>

      <t><figure>
          <artwork><![CDATA[+------------------------------------------------------------------+
|                    Application Layer                             |
|                                                                  |
| +------------------+ +------------------+ +------------------+   |
| | Task             | | Policy and       | | HITL and         |   |
| | Orchestration    | | Governance       | | Failure Handling |   |
| | - decomposition  | | - policy rules   | | - escalation     |   |
| | - state model    | | - dynamic CBAC   | | - fallback/retry |   |
| +------------------+ +------------------+ +------------------+   |
+-----------------------------+------------------------------------+
                              |
                              | Application-to-Semantic Contract
                              v
+------------------------------------------------------------------+
|                      Semantic Layer                              |
|                                                                  |
| +------------------+ +------------------+ +------------------+   |
| | Ontology and     | | Validation and   | | Natural-Language |   |
| | Profile Model    | | Rules            | | Intent           |   |
| | - classes and    | | - consistency    | | Normalization    |   |
| |   properties     | | - applicability  | | - text to intent |   |
| | - constraints    | | - deterministic  | | - confidence and |   |
| +------------------+ +------------------+ |   ambiguity      |   |
|                                           +------------------+   |
| +------------------+ +------------------+                        |
| | Alignment and    | | Knowledge        |                        |
| | Version          | | Resources        |                        |
| | Governance       | | - glossary/codes |                        |
| | - mapping        | | - remediation    |                        |
| |   confidence     | |   knowledge      |                        |
| | - compatibility  | |                  |                        |
| |                  | |                  |                        |
| +------------------+ +------------------+                        |
+-----------------------------+------------------------------------+
                              |
                              | Semantic-to-Interaction Contract
                              v
+------------------------------------------------------------------+
|                     Interaction Layer                            |
|                                                                  |
| +------------------+ +------------------+ +------------------+   |
| | Identity and     | | Session and      | | Intent Routing   |   |
| | Discovery        | | Group Messaging  | | - parse/filter   |   |
| | - identity       | | - request/event  | | - rank/select    |   |
| |   lifecycle      | | - distribution   | | - fallback/loop  |   |
| | - trust scope    | |                  | |                  |   |
| +------------------+ +------------------+ +------------------+   |
| +------------------+ +------------------+                        |
| | Invocation and   | | Feedback and     |                        |
| | Tool Control     | | Observability    |                        |
| | - policy/quota   | | - outcome report |                        |
| | - timeout/cancel | | - trace/audit    |                        |
| +------------------+ +------------------+                        |
+------------------------------------------------------------------+
                              |
                              v
+------------------------------------------------------------------+
|       Transport Connectivity + Security Enforcement              |
+------------------------------------------------------------------+
  Figure 5 Unified Layered Architecture and Modules
]]></artwork>
        </figure></t>
    </section>

    <section title="Deployment Example: Fixed Network with Agent Gateway Realization">
      <t>This section provides a deployment example illustrating how the
      proposed architecture can be realized in a fixed network environment.
      The purpose of this example is not to constrain implementation choices,
      but to demonstrate how distributed nodes defined in the architecture may
      be instantiated using existing or enhanced network elements.</t>

      <t>In a fixed broadband network, distributed nodes can be realized as
      enhanced Agent Gateway functions deployed at aggregation layers, metro
      nodes, or service edge points. These nodes are positioned logically
      between access networks and service domains, enabling them to perform
      registration, authorization mediation, capability abstraction, and
      semantic routing functions without requiring changes to end-user access
      infrastructure.</t>

      <t>In such deployments as shown in figure 3: <list style="symbols">
          <t>Agent registration is performed via the local AG.</t>

          <t>Capability digest exchange occurs between AGs.</t>

          <t>Semantic resolution is handled hop-by-hop across AGs.</t>

          <t>Authorization policies are enforced at the gateway boundary.</t>

          <t>Agents establish peer-to-peer semantic sessions after
          gateway-mediated coordination.</t>
        </list>This example demonstrates that the architecture does not
      mandate a centralized control entity. Instead, distributed nodes
      represent logical coordination functions that can be embedded into
      gateway platforms within fixed networks. Other deployment environments,
      such as mobile networks or enterprise networks, may realize the same
      logical functions using different network elements while preserving
      protocol behavior and architectural principles.</t>

      <t><figure>
          <artwork><![CDATA[
 
 
                                            +--------------+                             
                                            |     AMC      |                             
                                            +--------------+                             
                                       /         /   \          \
      +----------+       +----------+          /       \            +---------+   +---------+
      | Agent C  | ----  | AG 1     |<- -----/-----------\--------->|  AG 2   |---| Agent D |
      +----------+       +----------+      /               \        +---------+   +---------+
                                      \  /                   \   /
                                       /     +------------+    \
                                     /       |  Routers   |      \
                                   /         +------------+        \
                                 /      /                      \     \
                          +----------+                            +---------+     
                          | AG 3     |<-------------------------->|  AG 4   |
                          +----------+                            +---------+ 
                               |                                       |
                          +----------+                            +---------+
                          | Agent A  |                            | Agent B |
                          +----------+                            +---------+
                     Figure 6  Deployment Example: Fixed Network with Agent Gateway Realization
]]></artwork>
        </figure></t>
    </section>

    <section title="Deployment Example: Mobile Network ">
      <t>TBD</t>
    </section>

    <section anchor="iana" title="IANA Considerations">
      <t>TBD</t>
    </section>

    <section title="Acknowledgement">
      <t>TBD</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.2119"?>

      <?rfc include="reference.RFC.8259"?>
    </references>
  </back>
</rfc>
