<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-liu-dmsc-gw-requirements-00" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="DMSC Gateway Requirements">Gateway Requirements for Dynamic Multi-agents Secured Collaboration</title>
    <seriesInfo name="Internet-Draft" value="draft-liu-dmsc-gw-requirements-00"/>
    <author initials="B." surname="Liu" fullname="Bing Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>No. 156 Beiqing Road</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>leo.liubing@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="16"/>
    <area>art</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 31?>

<t>This document discusses the requirements for introducing Gateways into Dynamic Multi-agents Secured Collaboration for better scalability, communication efficiency, and security etc. This document also discusses the gaps of current hardware/software gateways that could not fulfil the task, so that a new kind of entity, e.g. DMSC Gateway, is needed.</t>
    </abstract>
  </front>
  <middle>
    <?line 35?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The Internet of Agents (IoA) is driving a shift in the communication model from the traditional host-to-host (or client-server) model to an Agent-to-Agent interaction model.</t>
      <t>One of the core characteristics of an Agent is autonomy, which consequently generates a demand for highly dynamic networking. Introducing DMSC Gateways that acting as a crucial intermediary layer is a good approach to enable efficient Agent discovery, information distribution among Agents, Quality of Service (QoS) and security assurance for Agent communications.</t>
      <t>This document discusses the requirements for introducing DMSC Gateways into Agent-to-Agent communications in terms of what benefits could be brought by the DMSC Gateways.</t>
      <t>In theory, Agents could be interconnected without any intermidiate Agent-specific gateways. However, significant chanllenges (including issues of scalability, security, communication efficiency etc.) could rise if Agents just interconnect in a fully open and un-managed way.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="functional-requirements-of-dmsc-gateway">
      <name>Functional Requirements of DMSC Gateway</name>
      <section anchor="delegated-agent-discovery">
        <name>Delegated Agent Discovery</name>
        <t>In dynamic, heterogeneous, and variable-scale AI Agent environments, traditional discovery and addressing mechanisms based on static configuration or simple service names are no longer sufficient to meet the demand.</t>
        <t>The complexity of Agent communication requires the DMSC Gateway to provide higher levels of abstraction and intelligent services. This subsection discusses two critical enhanced discovery and addressing mechanisms: Agent ID based addressing and task decomposition based Agent discovery.</t>
        <section anchor="id-based-agent-location-resolution">
          <name>ID-based Agent Location Resolution</name>
          <t>In an Agent network, every Agent should be assigned a globally unique, persistent, and infrastructure-agnostic identifier, known as the Agent ID. One of the core functions of the DMSC Gateway is to act as the resolver for this unified namespace, providing transparent addressing services for Agents:</t>
          <ul spacing="normal">
            <li>
              <t>Agent ID Registration (Optional): Each Agent, upon startup, can delegate the ID registration task to the DMSC Gateway, thereby eliminating the need to specially implement a set of protocols and logic for communicating with a registration server.</t>
            </li>
            <li>
              <t>Addressing Request: When an Initiator Agent needs to communicate with a Target Agent, it does not need to know any network details of the target, such as its IP address. It only needs to specify the Target Agent's ID in the communication request.</t>
            </li>
            <li>
              <t>Address Resolution: The DMSC Gateway receives the request and queries its local or external servers for the latest reachability information corresponding to the Agent ID.</t>
            </li>
          </ul>
          <t>This mechanism offers the following benefits:</t>
          <ul spacing="normal">
            <li>
              <t>Decoupling and Simplification: Agent developers can focus on their business logic without having to deal with network-layer IP address resolution, achieving complete decoupling between business logic and the communication infrastructure.</t>
            </li>
            <li>
              <t>Security and Policy Enforcement: The Gateway, acting as a central control point, can enforce security policies during the addressing resolution phase, such as verifying whether the initiator has permission to communicate with the target, thereby embedding security control at the very beginning of communication establishment.</t>
            </li>
          </ul>
        </section>
        <section anchor="task-based-agent-searching">
          <name>Task-based Agent Searching</name>
          <t>In many collaborative scenarios, the Initiator Agent may not know which specific Agent it needs to interact with but rather has a high-level task objective to accomplish. This necessitates the DMSC Gateway providing an Intent-Based or Capability-Based discovery mechanism:</t>
          <ul spacing="normal">
            <li>
              <t>Capability Registration (Optional): In addition to the Agent ID, each Agent must declare a set of "capabilities" it provides to the Gateway upon registration. These capabilities can be described using structured attributes and should follow a common capability model schema.</t>
            </li>
            <li>
              <t>Task Declaration: The Initiator Agent submits a task request to the Gateway, such as "translate this Chinese document into English" or "analyze the buildings in this satellite image." This request is a declaration of the desired outcome, rather than a call to a specific service.</t>
            </li>
            <li>
              <t>Task Decomposition and Capability Matching: The DMSC Gateway either contains or can access a task decomposition engine. For complex tasks, the gateway can break them down into a series of sub-tasks (e.g., "document parsing" -&gt; "Chinese-to-English translation" -&gt; "format re-structuring"). Subsequently, the gateway searches its registration repository for Agents whose capability descriptions match each (sub) task.</t>
            </li>
            <li>
              <t>Agent Recommendation or Orchestration: The Gateway returns the list of discovered Agents that can satisfy the task requirements to the Initiator Agent, which then selects one. In a more automated mode, the Gateway can directly act as an Orchestrator, routing the task request to the most suitable Agent, or even coordinating multiple Agents to collectively complete a complex task chain.</t>
            </li>
          </ul>
          <t>Gateway-based mechanism offers the following benefits:</t>
          <ul spacing="normal">
            <li>
              <t>Flexibility for Local Collaboration: For Agents to break away from statically orchestrated workflows or service call chains, they usually rely on the inference and orchestration capabilities of Large Language Models (LLMs). However, in certain security/privacy-sensitive or highly localized scenarios, some Agents may only be available locally. LLMs cannot discover these Agents and thus cannot orchestrate their tasks. By using a locally deployed Gateway, local Agents, once their capabilities are registered, can be automatically included in the scope of task consideration. This allows Agent ecosystems that are only deployed locally to dynamically adapt and evolve.</t>
            </li>
            <li>
              <t>Increased Abstraction Level: The interaction between Agents is elevated from the level of "how to call" to "what needs to be done," significantly simplifying the programming model for complex tasks. This is equivalent to an Agentic upgrade of the traditional TCP/IP Socket interface.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="agent-communication-access-control">
        <name>Agent Communication Access Control</name>
        <t>The DMSC Gateway can implement fine-grained, context-based access control policies, ensuring that interactions only occur between authorized Agents and in permitted ways. The execution of access control policies is based on context information across multiple dimensions:</t>
        <ul spacing="normal">
          <li>
            <t>Identity-Based Access Control (IBAC): This is the most fundamental policy. Policy rules can be defined as: "Agent A is allowed to communicate with Agent B," or "Agents belonging to 'Department X' are allowed to access Agents of 'Database Y'." Before routing a message, the Gateway verifies whether the initiator ID and the target ID are within the allowed communication matrix.</t>
          </li>
          <li>
            <t>Capability-Based Access Control (CBAC): This policy introduces the dimensions of intent and capability on top of identity. Policy rules can be more dynamic and semantic, for example: 
      - Only Agents with the 'Financial Data Analysis' capability can access the 'Core Financial Database' Agent.
      - An Agent requesting the 'Medical Diagnosis' capability must itself possess the capability tag for 'Compliant Patient Data Handling' before it can call the corresponding diagnosis Agent. This approach ensures that Agents are not only discoverable but are also used within the correct, authorized context.</t>
          </li>
          <li>
            <t>Attribute-Based Access Control (ABAC): This is a more generalized model that can make dynamic decisions by combining identity, capability, and environmental attributes (such as time, communication frequency, data sensitivity tags of the request, etc.). For example: "Only Agents with 'High-Level' security certification, coming from a secure internal network, and operating during working hours, are allowed to call system administration Agents."</t>
          </li>
        </ul>
        <t>Gateway-based mechanism offers the following benefits:</t>
        <ul spacing="normal">
          <li>
            <t>Principle of Least Privilege: Through fine-grained policy definition, it is ensured that each Agent only possesses the minimum communication privileges necessary to complete its task, significantly reducing the attack surface.</t>
          </li>
          <li>
            <t>Dynamic Policy Enforcement: The Gateway, as the policy enforcement point, can intercept and evaluate every communication attempt in real-time, ensuring policy consistency in a dynamic environment.</t>
          </li>
          <li>
            <t>Enhanced Ecosystem Security: By shifting access control from the application layer down to the communication layer, a security perimeter near the edge is provided for the entire AI Agent ecosystem. This manages risks at the source, thereby enhancing the security of the Agent network and simultaneously reducing the overall cost of protection.</t>
          </li>
        </ul>
      </section>
      <section anchor="information-distribution-among-agents">
        <name>Information Distribution among Agents</name>
        <t>This section describes the information distribution of AI agents from two dimensions. One dimension is the number of communication participants, which is divided into Point-to-Point Communication (2 AI agents) and Group Communication (3 or more AI agents), and the section is divided into two sub-sections based on this dimension.</t>
        <t>This section specifically discusses the content that DMSC Gateways are involved in both cases.</t>
        <section anchor="point-to-point-distribution">
          <name>Point-to-Point Distribution</name>
          <t>In the Point-to-Point information distribution process, the typical processing performed by a gateway includes, but is not limited to:</t>
          <ul spacing="normal">
            <li>
              <t>Application Layer Proxy (to facilitate monitoring/auditing of AI agent communication behavior, or to hide AI agent identity, etc.)</t>
            </li>
            <li>
              <t>Relay (to forward communication messages, making cross-domain communication easier, etc.)</t>
            </li>
            <li>
              <t>Traffic aggregation (to provide a tree-structured traffic regulation, improving communication efficiency).</t>
            </li>
          </ul>
        </section>
        <section anchor="pubsub">
          <name>Pub/Sub</name>
          <t>One AI agent publishes the information to the gateway, and the gateway then distributes the information to the subscribing Agents based on their Subscribe status. At the application layer, Pub/Sub is a common and efficient method of information distribution, especially suitable for large-scale group communication scenarios.</t>
        </section>
      </section>
    </section>
    <section anchor="gap-analysis-of-current-gateways">
      <name>Gap Analysis of Current Gateways</name>
      <t>Despite the existence of various forms of gateway devices and software in current networks, their primary design goals revolve around traditional network forwarding, network protocol translation, security isolation, and load balancing. When faced with the unique requirements of AI Agent communication, these existing solutions exhibit significant shortcomings in both architecture and functionality. This chapter will analyze why existing hardware and software gateways fail to meet the aforementioned Agent communication needs.</t>
      <section anchor="hardware-form-gateways">
        <name>Hardware form Gateways</name>
        <t>Common hardware gateway forms include, but are not limited to: network routers/switches, firewalls, dedicated protocol translation gateways, and broadband access equipment (BRAS/BNG). These devices are typically deployed as dedicated hardware, focusing on processing at the Network and Transport layers.</t>
        <t>The core limitation of hardware gateways lies in their low processing layer. They focus on network packets rather than Agent entities possessing identity and intent, and thus lack the necessary abstraction and computational power to handle high-level semantics and dynamic relationships. Hardware gateways often utilize processor architectures, such as Network Processors (NPs), that are optimized for network-layer computation. Consequently, they are difficult, if not impossible, to extend to support the high-level, semantic-based logical operations required for Agent communication.</t>
      </section>
      <section anchor="software-form-gateways">
        <name>Software form Gateways</name>
        <t>Common software gateway forms include: API Gateways and Cloud Load Balancers. These gateways are widely used in cloud-native environments and operate closer to the application layer, but their design paradigm remains tightly coupled with the architecture of services or API microservices.</t>
        <t>Software gateways are closer to meeting the requirements than hardware gateways, but their fundamental problem lies in the limitations of the fixed "service" paradigm. They treat backends as relatively static services defined by APIs, rather than a dynamic collective of Agents possessing intent and collaborative capabilities. Their security model and discovery mechanisms lack native support for the Agent's autonomy, dynamism, and capability semantics.</t>
      </section>
    </section>
    <section anchor="dmsc-gateway-implementation-considerations">
      <name>DMSC Gateway Implementation Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 184?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
