<?xml version="1.0" encoding="UTF-8"?>
<?xml-model href="https://xml2rfc.tools.ietf.org/authoring/rfc7991.rnc" type="application/relax-ng-compact-syntax"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-feng-nmrg-ain-architecture-00" category="info" submissionType="IETF" xml:lang="en" version="3">

  <front>
    <title abbrev="Agentic Intent Network (AIN)">Agentic Intent Network (AIN): A Routing-Based Architecture for AI Agent Coordination at Scale</title>

    <seriesInfo name="Internet-Draft" value="draft-feng-nmrg-ain-architecture-00"/>

    <author fullname="Chong Feng" initials="C." surname="Feng">
      <organization>Ruijie Networks</organization>
      <address>
        <email>fengchongllly@gmail.com</email>
      </address>
    </author>

    <date year="2026" month="April" day="17"/>

    <area>Network Management</area>
    <workgroup>Network Management Research Group</workgroup>

    <keyword>AI agents</keyword>
    <keyword>multi-agent coordination</keyword>
    <keyword>intent-based networking</keyword>
    <keyword>capability routing</keyword>
    <keyword>distributed systems</keyword>

    <abstract>
      <t>
        The rapid proliferation of autonomous AI agents across enterprise and Internet-scale deployments creates a structural challenge that existing agent frameworks cannot address: how to enable any agent to discover and invoke any other agent's capabilities without pre-established bilateral integration, across organizational boundaries, at Internet scale. This document presents the Agentic Intent Network (AIN) as an architecture-level model for open, heterogeneous, dynamically evolving multi-agent coordination. It defines problem drivers, architectural and underlay requirements, architectural components, design invariants, scope boundaries, and a research agenda for the NMRG. Engineering protocol details are intentionally out of scope.
      </t>
    </abstract>
  </front>

  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>
        The deployment of autonomous AI agents is transitioning from isolated experimental systems to large-scale production environments. Individual enterprises deploy tens to hundreds of specialized agents; Internet-scale platforms may eventually host millions. Each agent encapsulates bounded capabilities; collaboration among agents is an engineering necessity for accomplishing complex tasks, not an optional feature.
      </t>
      <t>
        The architecture problem is not local orchestration. It is global, open coordination: how can any agent discover and invoke any other agent's capabilities without pre-established bilateral integration, and across heterogeneous frameworks and organizational boundaries? At scale, the pairwise integration cost grows quadratically, quickly overwhelming any system's operational budget. At organizational boundaries, the trust and deployment assumptions embedded in today's frameworks break down: an agent operated by one enterprise cannot discover or invoke an agent operated by another without custom, manually maintained integration agreements.
      </t>
      <t>
        The name "Agentic Intent Network" reflects the three structural commitments of the architecture. "Agentic" denotes that the participating entities are autonomous agents -- systems capable of independent reasoning and action -- rather than passive endpoints or simple services. "Intent" denotes that coordination is expressed as structured, capability-oriented requests, rather than as direct procedure calls or point-to-point messages; an intent captures what the originating agent wants accomplished, abstracted from which specific handler will accomplish it. "Network" denotes that the coordination substrate is organized as a routed network -- with a data plane, a control plane, addressing, and forwarding -- rather than as a registry, a broker, or an orchestration engine. Together, the name captures the core architectural claim: routing-based infrastructure is the appropriate model for open, scalable, heterogeneous agent coordination.
      </t>
      <t>
        AIN proposes a routing-based answer, applying the structural logic of packet networking to inter-agent coordination. This document is an architecture description in the IRTF style: it specifies what AIN is, why it is needed, and what research questions it opens. Engineering protocol mechanisms and algorithmic details are intentionally handled in companion design-consideration documents.
      </t>
    </section>

    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.
      </t>
      <dl newline="true">
        <dt>Intent:</dt>
        <dd>A structured representation of a task request, expressed as a capability class identifier and associated constraints.</dd>

        <dt>Intent Datagram:</dt>
        <dd>The self-contained coordination unit carrying an intent, analogous to an IP datagram.</dd>

        <dt>Intent Class:</dt>
        <dd>A hierarchical identifier used as the routing key for an Intent Datagram.</dd>

        <dt>Intent Class OID (IC-OID):</dt>
        <dd>A globally unique, structured identifier for an Intent Class, suitable for machine processing and prefix aggregation.</dd>

        <dt>Handler Instance Identifier (HID):</dt>
        <dd>A globally unique identifier for a specific Intent Handler instance.</dd>

        <dt>Intent Router:</dt>
        <dd>A deterministic forwarding component that routes Intent Datagrams based on capability routing tables.</dd>

        <dt>Intent Dispatcher:</dt>
        <dd>An application entity that decomposes compound intents into sub-intents and emits routable datagrams.</dd>

        <dt>Intent Handler:</dt>
        <dd>An application entity that executes atomic intents.</dd>

        <dt>Capability Advertisement (CAP):</dt>
        <dd>A control-plane message by which an Intent Handler announces capabilities.</dd>

        <dt>Agent Domain:</dt>
        <dd>A collection of registered entities within a management and policy boundary, analogous to an IP AS.</dd>

        <dt>Semantic Substrate:</dt>
        <dd>Shared naming, capability-description, and matching semantics consumed by AIN control-plane functions.</dd>

        <dt>Capability Routing Table (CRT):</dt>
        <dd>A mapping from IC-OID prefixes to ranked candidate handler sets.</dd>
      </dl>
    </section>

    <section anchor="problem-statement" numbered="true" toc="default">
      <name>Problem Statement</name>

      <section anchor="coordination-gap" numbered="true" toc="default">
        <name>The Multi-Agent Coordination Gap</name>
        <t>
          Current AI ecosystems are rich in model capabilities and local agent frameworks, but poor in open coordination primitives. Systems can orchestrate agents that are already inside the same framework or trust domain, yet lack a common architecture for Internet-scale, cross-domain interaction among independently operated agents.
        </t>
        <t>
          Consider a concrete scenario: an enterprise deploys a customer-service agent (Framework A) that needs to invoke a compliance-checking agent (Framework B, operated by a different business unit) and a logistics-status agent (a third-party API wrapper). Today, each of these connections requires a separate, manually negotiated integration: agreed-upon API schemas, bilateral trust configuration, and per-link lifecycle management. None of the three agents can discover the others dynamically; each new agent added to the ecosystem requires O(existing agents) new integration agreements. This is not an implementation deficiency -- it is a structural absence of shared coordination infrastructure.
        </t>
        <t>
          This creates a coordination gap: autonomous agents can reason and act locally, but cannot reliably discover, select, and invoke remote capabilities in a neutral, scalable, framework-independent way.
        </t>
      </section>

      <section anchor="bilateral-problem" numbered="true" toc="default">
        <name>The O(N^2) Bilateral Integration Problem</name>
        <t>
          Without shared routing infrastructure, N agents require up to N(N-1)/2 bilateral integrations to interoperate. Each integration entails interface mapping, trust negotiation, lifecycle management, and operational monitoring.
        </t>
        <t>
          Engineering mitigations -- common API conventions, shared SDKs, service registries -- reduce implementation friction but do not change the underlying structure: each pair of agents that must interoperate still requires explicit, maintained coordination state. As agent populations grow and cross organizational boundaries, the per-pair cost cannot be engineered away; it must be eliminated architecturally.
        </t>
        <t>
          The Internet solved an identical structural problem for host interconnection. Before shared routing infrastructure, connecting N hosts required bilateral reachability agreements. IP eliminated this by introducing a shared forwarding substrate: any host can reach any other host without pre-arrangement, because routing state is maintained by the network rather than by endpoint pairs. AIN applies the same logic to agent coordination: per-agent integration overhead is reduced from O(N) to O(1) by introducing shared capability routing infrastructure.
        </t>
      </section>

      <section anchor="framework-limitations" numbered="true" toc="default">
        <name>Limitations of Existing Frameworks</name>
        <t>
          Existing frameworks and protocols (e.g., AutoGen <xref target="WU2023"/>, LangGraph, A2A <xref target="A2A2025"/>, MCP <xref target="MCP2024"/>) provide useful local mechanisms but do not, by themselves, satisfy the full set of open architectural needs.
        </t>
        <t>
          AutoGen and LangGraph are intra-framework orchestration systems. They excel at coordinating agents that are co-deployed within the same runtime and trust boundary, but provide no mechanism for an agent in one framework to dynamically discover or invoke an agent in another. Interoperability across framework boundaries requires custom bridging code, reproducing the bilateral integration problem at the framework level.
        </t>
        <t>
          MCP <xref target="MCP2024"/> addresses the connection between LLM-based agents and external tools or data sources. Its scope is LLM-to-resource integration, not agent-to-agent routing. MCP does not define how an agent discovers which other agents exist, selects among candidates, or routes a request across multiple coordination hops.
        </t>
        <t>
          A2A <xref target="A2A2025"/> defines an interaction protocol for pairs of agents. It is analogous to HTTP: it standardizes the exchange format for a single interaction, but it does not address discovery, capability routing, or multi-hop forwarding. Two agents using A2A must still know each other's endpoints in advance; the protocol does not provide the directory or routing substrate needed to find them.
        </t>
        <t>
          They are typically optimized for one or more of:
        </t>
        <ul>
          <li>single-framework ecosystems,</li>
          <li>pre-coordinated trust and deployment assumptions,</li>
          <li>bounded organizational scope, and</li>
          <li>static or manually curated integration surfaces.</li>
        </ul>
        <t>
          These assumptions limit their ability to serve as a shared, Internet-scale coordination substrate for heterogeneous agents. AIN is not a replacement for these frameworks; it is the missing coordination layer above and between them.
        </t>
      </section>

      <section anchor="why-nmrg" numbered="true" toc="default">
        <name>Why This Is a Network Management Research Problem</name>
        <t>
          First, the AIN control plane introduces new convergence challenges that have no direct precedent in IP routing. Capability advertisements carry semantic identifiers (IC-OIDs) rather than topological addresses. Convergence correctness -- the guarantee that every Intent Router's CRT eventually reflects the true handler population without loops or black holes -- must be established over a semantic identifier space whose structure differs fundamentally from IP prefixes. Defining convergence conditions, bounding convergence time, and proving loop-freedom under dynamic handler populations are open research problems of the kind NMRG is positioned to address.
        </t>
        <t>
          Second, the AIN coordination substrate is itself a networked system that requires operational management. As agent populations scale, operators need telemetry on capability routing behavior, anomaly detection for malformed or malicious CAPs, policy controls on which agents may advertise which capabilities, and mechanisms for graceful handler failure and capability withdrawal. These are directly analogous to the network management functions that NMRG has studied for IP infrastructure, now applied to a new class of coordination plane.
        </t>
        <t>
          Third, practical AIN deployment is coupled with the underlying network and system environment in ways that require joint analysis. CAP propagation generates control-plane traffic whose volume and burstiness depend on agent population dynamics. Intent Datagram forwarding latency is bounded by both AIN routing behavior and underlay transport characteristics. Resource allocation across Intent Routers and Handlers must account for both coordination overhead and execution workload. These coupling effects are deployment-engineering questions that sit squarely within the scope of <xref target="NMRG-AI-DEPLOY"/> and related NMRG work.
        </t>
      </section>
    </section>

    <section anchor="requirements" numbered="true" toc="default">
      <name>Requirements</name>

      <section anchor="design-principles" numbered="true" toc="default">
        <name>Design Principles</name>
        <t>
          The requirements in this section are not assembled as a feature wishlist. They are derived from three architectural principles that have proven effective in building open, scalable networked systems, applied here to the agent coordination domain.
        </t>
        <t>
          Principle 1: End-to-End Argument. Saltzer, Reed, and Clark <xref target="SRC1984"/> established that functions requiring application-specific knowledge should be implemented at the endpoints, not in the network substrate. Applied to AIN: task execution, semantic reasoning, and result interpretation belong at Handlers and Dispatchers. The routing fabric must remain thin, deterministic, and execution-agnostic. This principle drives R_local and the design invariants of Networking-Execution Separation and Payload Opacity (<xref target="design-invariants"/>).
        </t>
        <t>
          Principle 2: Narrow Waist Design. The Internet's scalability rests on a minimal common interface -- the IP datagram -- that decouples heterogeneous link technologies below from heterogeneous applications above. AIN adopts the same strategy: the Intent Datagram and IC-OID form a narrow waist enabling any agent framework to participate without requiring coordination fabric redesign. This principle drives R_open and R_hetero.
        </t>
        <t>
          Principle 3: Decentralized Scalability. Centralized coordination introduces bottlenecks, single points of failure, and policy coupling that limit scale. Distributed routing protocols, from OSPF to BGP, demonstrate that local forwarding decisions based on distributed state can achieve global reachability without central oracles. AIN applies this to capability routing. This principle drives R_local and the bounded-convergence constraint in R_dynamic.
        </t>
        <t>
          A fourth consideration -- Policy/Mechanism Separation -- informs the overall design: routing mechanisms are specified to be generic and stable; capability-matching semantics and selection policies are explicitly layered above the forwarding core, allowing them to evolve independently without requiring changes to the routing fabric.
        </t>
      </section>

      <section anchor="architectural-requirements" numbered="true" toc="default">
        <name>Architectural Requirements</name>
        <dl newline="true">
          <dt>R_open (Open Participation):</dt>
          <dd>Any agent, regardless of framework, language, or deployment environment, MUST be able to register capabilities and invoke others without bilateral pre-registration.

Derivation: Follows from the Narrow Waist principle. Requiring bilateral pre-registration reproduces the O(N^2) integration cost documented in <xref target="bilateral-problem"/>. A shared registration and routing substrate eliminates this cost structurally, as IP eliminated the need for pairwise host reachability agreements.</dd>

          <dt>R_local (Local Decision-Making):</dt>
          <dd>Each forwarding decision MUST be made locally using datagram-visible and locally maintained state; no centralized per-request routing oracle is assumed.

Derivation: Follows from the End-to-End Argument and Decentralized Scalability. A centralized routing oracle would become a bottleneck, a single point of failure, and a policy chokepoint -- reproducing architecturally the same problems that distributed routing protocols were designed to eliminate.</dd>

          <dt>R_hetero (Heterogeneous Capability Matching):</dt>
          <dd>The architecture MUST support heterogeneous handler types (LLM-based, deterministic, legacy-wrapped) without requiring routing-fabric redesign.

Derivation: Follows from the Narrow Waist principle and Policy/Mechanism Separation. The routing fabric must remain agnostic to execution substrate. Capability-matching semantics reside in the Semantic Substrate (<xref target="semantic-substrate"/>), not in forwarding components, allowing handler technology to evolve without architectural disruption.</dd>

          <dt>R_dynamic (Dynamic Capability Discovery):</dt>
          <dd>The architecture MUST support dynamic capability additions, updates, and withdrawals with bounded convergence behavior.

Derivation: Follows from Decentralized Scalability and the operational reality of large-scale deployments. Agent populations are not static: handlers are deployed, updated, and retired continuously. The routing fabric must accommodate this dynamism while providing convergence guarantees sufficient for operational stability -- a direct analogue of liveness and loop-freedom requirements in IP routing protocols.</dd>
        </dl>
      </section>

      <section anchor="underlay-requirements" numbered="true" toc="default">
        <name>Underlay Requirements</name>
        <t>
          The architectural requirements above define what the AIN coordination layer must provide. They depend, in turn, on two properties of the underlay transport fabric. These are stated as requirements on the underlay, not as design choices of the AIN architecture itself, consistent with the End-to-End Argument: AIN does not prescribe how reachability is achieved, only that it must be available.
        </t>
        <dl newline="true">
          <dt>R_u1 (Handler Reachability):</dt>
          <dd>Any Intent Router MUST be able to deliver an Intent Datagram to any registered Intent Handler.</dd>

          <dt>R_u2 (Callback Reachability):</dt>
          <dd>Any Intent Handler MUST be able to deliver callback responses to the Originator endpoint indicated by datagram metadata.</dd>
        </dl>
        <t>
          This document intentionally does not mandate specific implementation patterns for satisfying R_u1 and R_u2. Overlay networks, service meshes, and conventional IP transport are all candidate mechanisms.
        </t>
      </section>
    </section>

    <section anchor="ain-architecture" numbered="true" toc="default">
      <name>AIN Architecture</name>

      <section anchor="architecture-overview" numbered="true" toc="default">
        <name>Architecture Overview</name>
        <t>
          AIN is organized into three architectural parts:
        </t>
        <ol spacing="normal">
          <li>(A) Networking: underlay/transport fabric, Intent Routing data plane, Intent Routing control plane, and Semantic Substrate.</li>
          <li>(B) Application Entities: Originator, Dispatcher, and Handler roles.</li>
          <li>(C) Runtime Dependencies: execution runtime and compute infrastructure used by application entities.</li>
        </ol>
        <t>
          Figure 1 illustrates the layered structure and the principal interactions among components.
        </t>
        <figure anchor="fig-architecture">
          <name>AIN Architecture -- Layers and Principal Entities</name>
          <artwork><![CDATA[
     +-----------+     +---------------+     +-----------+
     | Originator|     |  Dispatcher   |     |  Handler  |
     | (emits    |     | (decomposes / |     | (executes |
     |  intents) |     |  coordinates) |     |  intents) |
     +-----+-----+     +-------+-------+     +-----+-----+
           |                   |   (b)              | (a)
           |    Intent         |   sub-intents      | CAP
           |    Datagrams      |                    | (announce)
           +-------------------+--------------------+
                               |
     ==================================================
     |           AIN Networking Substrate             |
     |                                                |
     |  +------------------------------------------+  |
     |  |     Intent Routing Control Plane         |  |
     |  |  (CAP processing, CRT computation,       |  |
     |  |   route-state distribution)              |  |
     |  +------------------+-----------------------+  |
     |           (c)       | CRT updates               |
     |  +------------------v-----------------------+  |
     |  |      Intent Routing Data Plane           |  |
     |  |                                          |  |
     |  |  [IR]-----[IR]-----[IR]-----[IR]         |  |
     |  |   ^   datagram forwarding    |           |  |
     |  |   |  (hop-by-hop, local CRT) v           |  |
     |  +------------------------------------------+  |
     |                    ^                           |
     |           (d)      | naming / matching         |
     |  +-----------------+------------------------+  |
     |  |            Semantic Substrate            |  |
     |  |  (IC-OID namespace, capability-matching  |  |
     |  |   semantics, aggregation consistency)    |  |
     |  +------------------------------------------+  |
     ==================================================
                          |
     +------------------------------------------------+
     |         Underlay / Transport Fabric            |
     |  (provides R_u1: handler reachability and      |
     |   R_u2: callback reachability)                 |
     +------------------------------------------------+

       IR  = Intent Router
       CAP = Capability Advertisement
       CRT = Capability Routing Table
]]></artwork>
        </figure>
        <t>
          The figure is read in two dimensions: vertical layering represents the separation of concerns, and the lettered interactions (a)--(d) represent the two principal information flows through the architecture.
        </t>
        <t>
          Layering. Application Entities (top) sit above the AIN Networking Substrate and consume its services; they are not part of the forwarding core. This boundary enforces the Networking-Execution Separation invariant (<xref target="design-invariants"/>): an Intent Router forwards datagrams but never executes the tasks they carry. Within the Networking Substrate, the Semantic Substrate occupies the base position because it provides the naming and matching semantics that the control plane depends on; it is not a forwarding layer. The Underlay/Transport Fabric is architecturally external: AIN states what reachability properties it requires (R_u1, R_u2) but does not prescribe how they are satisfied.
        </t>
        <t>
          Control flow (interactions (a) and (c)). When a Handler registers or updates its capabilities, it emits a Capability Advertisement (CAP) into the networking substrate (a). The Intent Routing Control Plane processes incoming CAPs, applies matching semantics from the Semantic Substrate, and computes or updates entries in the Capability Routing Table (CRT) at each Intent Router (c). This is the AIN analogue of a routing protocol: CAP propagation drives distributed route-state convergence, so that every Intent Router eventually holds a CRT reflecting the current handler population.
        </t>
        <t>
          Data flow (interactions (b) and forwarding in the data plane). An Originator emits an Intent Datagram carrying an IC-OID in its routing header. A Dispatcher may decompose a compound task into sub-intents and emit multiple datagrams (b). Each Intent Router performs a local CRT lookup on the IC-OID, selects a next hop from the ranked candidate set, and forwards the datagram -- without consulting any central oracle and without inspecting the payload (Payload Opacity, <xref target="design-invariants"/>). Forwarding continues hop-by-hop until the datagram reaches a Handler that accepts and executes the intent. The Handler returns results via a callback path to the Originator endpoint identified in the datagram metadata.
        </t>
        <t>
          Semantic Substrate (interaction (d)). The Semantic Substrate is consumed by the control plane, not the data plane. It provides the shared vocabulary that makes IC-OID prefix aggregation meaningful and capability matching consistent across heterogeneous handler types. Its role is analogous to the addressing and naming conventions that make IP prefix aggregation tractable: without shared semantics, CAP processing would require per-handler bespoke logic and could not scale.
        </t>
        <table anchor="tbl-architecture">
          <name>AIN Architecture Overview (Conceptual)</name>
          <thead>
            <tr>
              <th>Component</th>
              <th>Responsibility</th>
              <th>IP Analogy</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td>Underlay/Transport Fabric</td>
              <td>End-to-end reachability under R_u1 and R_u2</td>
              <td>Physical + Link</td>
            </tr>
            <tr>
              <td>Intent Routing Data Plane</td>
              <td>Stateless forwarding of intent datagrams</td>
              <td>IP data plane</td>
            </tr>
            <tr>
              <td>Intent Routing Control Plane</td>
              <td>Capability advertisement and route-state maintenance</td>
              <td>IP control plane</td>
            </tr>
            <tr>
              <td>Semantic Substrate</td>
              <td>Naming/matching semantics</td>
              <td>Addressing</td>
            </tr>
            <tr>
              <td>Application Entities</td>
              <td>Intent origination, dispatch, and execution</td>
              <td>End hosts</td>
            </tr>
          </tbody>
        </table>
      </section>

      <section anchor="intent-datagram" numbered="true" toc="default">
        <name>Intent Datagram</name>
        <t>
          The Intent Datagram is the fundamental coordination unit. It is conceptually defined as a triple:
        </t>
        <t>
          D = &lt;H, P, M&gt;
        </t>
        <t>
          where H is a routing header (intent class and routing-relevant fields), P is payload (opaque to routing), and M is metadata (e.g., correlation and callback information).
        </t>
      </section>

      <section anchor="intent-routing" numbered="true" toc="default">
        <name>Intent Routing</name>
        <t>
          Intent Routing separates:
        </t>
        <ul>
          <li>Data plane: deterministic per-datagram forwarding based on local route state.</li>
          <li>Control plane: capability advertisement processing and route-state computation/distribution.</li>
        </ul>
        <t>
          This separation mirrors core Internet architectural practice and is central to AIN scalability and explainability.
        </t>
      </section>

      <section anchor="semantic-substrate" numbered="true" toc="default">
        <name>Semantic Substrate</name>
        <t>
          The Semantic Substrate defines shared capability-description and identifier semantics used by control-plane functions. It is a substrate for naming, matching, and aggregation consistency; it is not treated as an independent packet-forwarding layer.
        </t>
      </section>

      <section anchor="application-entities" numbered="true" toc="default">
        <name>Application Entities</name>
        <t>
          AIN distinguishes three application-level roles:
        </t>
        <ul>
          <li>Originator: emits intents.</li>
          <li>Dispatcher: decomposes/coordinates compound tasks.</li>
          <li>Handler: executes atomic capabilities.</li>
        </ul>
        <t>
          These roles are above the networking substrate and consume AIN services; they are not part of the forwarding core. A single physical deployment unit MAY simultaneously fulfill multiple roles (e.g., acting as both Dispatcher and Handler for different intents). Role assignment is decoupled from entity implementation, allowing flexible deployment topologies without requiring changes to the routing fabric or the Semantic Substrate.
        </t>
      </section>

      <section anchor="design-invariants" numbered="true" toc="default">
        <name>Design Invariants</name>
        <t>
          AIN relies on four architectural invariants:
        </t>
        <ol>
          <li>Networking-Execution Separation: forwarding components do not perform task execution.</li>
          <li>Hop-by-Hop Locality: forwarding is local and incremental.</li>
          <li>Payload Opacity: forwarding is based on routing-relevant fields, not payload semantics.</li>
          <li>Datagram Self-Containment: the datagram carries sufficient routing context for forwarding decisions.</li>
        </ol>
      </section>

      <section anchor="ip-correspondence" numbered="true" toc="default">
        <name>Structural Correspondence with IP Networking</name>
        <t>
          AIN intentionally mirrors key Internet architectural primitives:
        </t>
        <ul>
          <li>Intent Datagram ~ IP datagram</li>
          <li>Intent Router ~ IP router</li>
          <li>CRT ~ forwarding table</li>
          <li>Agent Domain ~ AS</li>
          <li>CAP propagation/control ~ routing control behavior</li>
        </ul>
        <t>
          This correspondence is structural, not literal protocol reuse.
        </t>
      </section>

      <section anchor="ibn-relationship" numbered="true" toc="default">
        <name>Relationship to Intent-Based Networking</name>
        <t>
          <xref target="RFC9315"/> defines IBN intents as declarative goals for network behavior management. AIN intents are routable requests for AI-agent capability invocation. The two are complementary: IBN concerns network operation goals; AIN concerns inter-agent coordination routing.
        </t>
      </section>

      <section anchor="scope-boundaries" numbered="true" toc="default">
        <name>Scope Boundaries</name>
        <t>
          AIN is designed for open, dynamic, cross-domain agent coordination at scale. It is not appropriate for all agent interaction scenarios. In particular, AIN is not the intended solution for:
        </t>
        <ul>
          <li>Hard real-time tasks, where coordination latency introduced by capability routing is architecturally unacceptable.</li>
          <li>Fully static and deterministic workflows, where all handler assignments are known and fixed at design time, making dynamic capability discovery unnecessary.</li>
          <li>Closed single-framework deployments, where all participating agents share the same runtime and trust boundary and no cross-domain coordination is required.</li>
        </ul>
        <t>
          Explicitly defining these boundaries is consistent with the End-to-End Argument: functions that do not benefit from routing-based indirection should not be routed. Recognizing these non-goals increases architectural clarity and helps implementers identify when AIN provides structural value.
        </t>
      </section>
    </section>

    <section anchor="nmrg-relationship" numbered="true" toc="default">
      <name>Relationship to Existing NMRG Work</name>

      <section anchor="ai-challenges" numbered="true" toc="default">
        <name>Relationship to draft-irtf-nmrg-ai-challenges</name>
        <t>
          AIN adds a coordination-layer perspective to AI/network-management challenges, including semantic-route convergence, capability authenticity, and explainable multi-agent routing behavior.
        </t>
      </section>

      <section anchor="ai-deploy" numbered="true" toc="default">
        <name>Relationship to draft-irtf-nmrg-ai-deploy</name>
        <t>
          AIN has deployment implications for capability advertisement traffic, convergence dynamics, and coupling between agent-coordination control behavior and network/system deployment choices.
        </t>
      </section>

      <section anchor="third-dimension" numbered="true" toc="default">
        <name>AIN as a Third Research Dimension</name>
        <t>
          AIN frames a third dimension alongside:
        </t>
        <ul>
          <li>AI for network management, and</li>
          <li>network/system support for AI services.</li>
        </ul>
        <t>
          The third dimension is networked infrastructure for AI-agent coordination itself.
        </t>
      </section>
    </section>

    <section anchor="research-problems" numbered="true" toc="default">
      <name>Open Research Problems</name>

      <section anchor="phase1" numbered="true" toc="default">
        <name>Phase 1: Foundations</name>
        <ul>
          <li>Capability description language and matching semantics.</li>
          <li>Intra-domain capability-routing protocol design.</li>
          <li>Minimal interoperable Intent Datagram schema.</li>
          <li>Baseline identity and trust for capability claims.</li>
          <li>Formal convergence and loop-freedom over semantic identifiers.</li>
        </ul>
      </section>

      <section anchor="phase2" numbered="true" toc="default">
        <name>Phase 2: Scaling</name>
        <ul>
          <li>Inter-domain capability-routing policy and aggregation.</li>
          <li>Multi-metric optimization under heterogeneous constraints.</li>
          <li>Stability analysis for feedback-driven route scoring.</li>
          <li>Cross-tier latency and resource budget allocation.</li>
        </ul>
      </section>

      <section anchor="phase3" numbered="true" toc="default">
        <name>Phase 3: Ecosystem</name>
        <ul>
          <li>Governance of global IC-OID taxonomy roots and delegation.</li>
          <li>Security and adversarial robustness at ecosystem scale, including capability-claim fraud, routing-state poisoning, and intent privacy threats.</li>
          <li>Economic settlement and incentive alignment across domains.</li>
        </ul>
      </section>
    </section>

    <section anchor="security" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>
        AIN introduces security concerns at two architectural levels.
      </t>
      <t>
        Control-plane threats affect the integrity and availability of capability routing state. Capability-claim spoofing (a malicious entity advertising capabilities it does not possess) and routing-state poisoning (injection of malformed or adversarial CAPs to corrupt CRTs) are the primary risks. Semantic namespace abuse -- the registration of IC-OIDs intended to shadow or hijack legitimate capability classes -- represents a further control-plane attack surface.
      </t>
      <t>
        Data-plane threats affect the confidentiality and availability of intent traffic. Privacy leakage of intent contents or originator identity and denial-of-service against routing or handler interfaces are the primary concerns.
      </t>
      <t>
        Architecture-level mitigation directions include authenticated capability advertisements, protected control-plane exchanges, deployment of modern transport security, and explicit governance for identifier namespaces. Detailed threat modeling is identified as a Phase 3 research problem (<xref target="phase3"/>).
      </t>
    </section>

    <section anchor="iana" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>
        This document requests no IANA actions.
      </t>
    </section>
  </middle>

  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>

        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date year="1997" month="March"/>
            <abstract>
              <t></t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>

        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date year="2017" month="May"/>
            <abstract>
              <t></t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>

        <reference anchor="RFC9315" target="https://www.rfc-editor.org/info/rfc9315">
          <front>
            <title>Intent-Based Networking - Concepts and Definitions</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="L. Ciavaglia" initials="L." surname="Ciavaglia"/>
            <author fullname="L. Granville" initials="L." surname="Granville" role="editor"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date year="2022" month="October"/>
            <abstract>
              <t></t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9315"/>
          <seriesInfo name="DOI" value="10.17487/RFC9315"/>
        </reference>
      </references>

      <references>
        <name>Informative References</name>

        <reference anchor="A2A2025" target="https://github.com/google-deepmind/agent2agent">
          <front>
            <title>Agent2Agent (A2A) Protocol</title>
            <author>
              <organization>Google DeepMind</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>

        <reference anchor="MCP2024" target="https://modelcontextprotocol.io/">
          <front>
            <title>Model Context Protocol</title>
            <author>
              <organization>Anthropic</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>

        <reference anchor="NMRG-AI-CHALLENGES">
          <front>
            <title>Challenges for Network Automation with AI/ML Techniques</title>
            <author>
              <organization>IRTF NMRG</organization>
            </author>
            <date year="2024"/>
          </front>
          <seriesInfo name="Work in Progress" value="Internet-Draft, draft-irtf-nmrg-ai-challenges"/>
        </reference>

        <reference anchor="NMRG-AI-DEPLOY">
          <front>
            <title>Network and System Considerations for Deploying AI Services</title>
            <author>
              <organization>IRTF NMRG</organization>
            </author>
            <date year="2024"/>
          </front>
          <seriesInfo name="Work in Progress" value="Internet-Draft, draft-irtf-nmrg-ai-deploy"/>
        </reference>

        <reference anchor="RFC7575" target="https://www.rfc-editor.org/info/rfc7575">
          <front>
            <title>Architectural Considerations in Smart Object Networking</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date year="2015" month="July"/>
            <abstract>
              <t></t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7575"/>
          <seriesInfo name="DOI" value="10.17487/RFC7575"/>
        </reference>

        <reference anchor="SRC1984" target="https://doi.org/10.1145/357401.357402">
          <front>
            <title>End-to-End Arguments in System Design</title>
            <author fullname="J. Saltzer" initials="J." surname="Saltzer"/>
            <author fullname="D. Reed" initials="D." surname="Reed"/>
            <author fullname="D. Clark" initials="D." surname="Clark"/>
            <date year="1984" month="November"/>
          </front>
          <seriesInfo name="ACM Transactions on Computer Systems" value="Vol. 2, No. 4, pp. 277-288"/>
        </reference>

        <reference anchor="WU2023">
          <front>
            <title>AutoGen: Enabling Next-Gen LLM Applications via Multi-Agent Conversation</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="G. Bansal" initials="G." surname="Bansal"/>
            <author fullname="J. Zhang" initials="J." surname="Zhang"/>
            <author fullname="Y. Wu" initials="Y." surname="Wu"/>
            <author fullname="B. Li" initials="B." surname="Li"/>
            <author fullname="E. Zhu" initials="E." surname="Zhu"/>
            <author fullname="L. Jiang" initials="L." surname="Jiang"/>
            <author fullname="X. Zhang" initials="X." surname="Zhang"/>
            <author fullname="R. White" initials="R." surname="White"/>
            <author fullname="D. Burger" initials="D." surname="Burger"/>
            <author fullname="V. Lara" initials="V." surname="Lara"/>
            <author fullname="A. Foyer" initials="A." surname="Foyer"/>
            <author fullname="C. Wang" initials="C." surname="Wang"/>
            <date year="2023"/>
          </front>
          <seriesInfo name="arXiv" value="2308.08155"/>
        </reference>
      </references>
    </references>
  </back>

</rfc>
