| Internet-Draft | Applicability of A2A Protocol for Networ | December 2025 |
| Yan | Expires 24 June 2026 | [Page] |
The evolution of network management towards autonomic operation requires the deployment of AI agents at various hierarchical layers, including directly on network elements. This transformation shifts network devices from passively managed resources to autonomous entities capable of local decision-making and collaborative problem-solving.¶
This document discusses the applicability of the Agent-to-Agent (A2A) Protocol to the network management plane, specifically for communication between Controller Agents (CAs) and Device Agents (DAs). This indicates that the inherent characteristics of Device Agents necessitate the adoption of the agent-to-agent communication paradigm. The document further explores generic workflows, deployment scenarios, and the relationship of A2A with existing network management protocols like NETCONF, RESTCONF, gNMI,and the Model Context Protocol (MCP).¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 24 June 2026.¶
Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
The management of large-scale networks is undergoing a significant transition, moving from centralized, imperative control to distributed, intent-based autonomic operation. A key enabler of this shift is the deployment of AI Agents on network elements. These Device Agents (DAs) transform network devices from passive, managed resources into autonomous entities that can perceive their local environment, make decisions, and act to achieve goals delegated by a higher-level Controller Agent (CA).¶
This transformation necessitates a re-evaluation of the communication protocols utilized. Traditional network management protocols are typically based on a client-server, request-response model where a controller directly manipulates data on a device. While this model remains effective for certain interactions, it may not fully support the collaborative needs of autonomous agents.¶
This document examines the applicability of the Agent-to-Agent (A2A) Protocol[A2A-SPEC] for communication between Controller Agents and Device Agents. The objectives of this document are to:¶
This document aims to provide a conceptual framework for applying the base A2A protocol to the network management domain.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
This document uses the following terms:¶
Agent-to-Agent (A2A) Protocol: An open standard protocol for enabling secure communication and collaboration between autonomous AI Agents, as specified in [A2A-SPEC].¶
Controller Agent (CA): An AI Agent operating in a network controller or domain management system.¶
Device Agent (DA): An AI Agent deployed on or embedded within a network element, possessing a degree of autonomy.¶
Agent-to-Tool (A2T) Paradigm: A communication model where an agent invokes a tool, which is a passive entity that performs a specific, well-defined function and returns a result.¶
Agent-to-Agent (A2A) Paradigm: A communication model where autonomous agents collaborate as peers to achieve a shared or delegated goal.¶
The deployment of AI Agents in network management typically follows a three-layer hierarchical model. This architecture is illustrated in Figure 1.¶
+--------------------------------------------------------------------+
| Service Orchestration Layer |
| |
| +--------------------------------------------------------------+ |
| | Service Orchestration Agent (SOA) | |
| +--------------------------------------------------------------+ |
+--------------------------------------------------------------------+
|
| A2A Protocol
v
+--------------------------------------------------------------------+
| Network Controller Layer |
| |
| +--------------------------------------------------------------+ |
| | Controller Agent (CA) | |
| +--------------------------------------------------------------+ |
+--------------------------------------------------------------------+
|
| A2A Protocol
|
v
+--------------------------------------------------------------------+
| Network Element Layer |
| |
| +----------------+ +----------------+ +----------------+ |
| | Device Agent | | Device Agent | | Device Agent | |
| | (Router) | | (Switch) | | (Base Station) | |
| +----------------+ +----------------+ +----------------+ |
+--------------------------------------------------------------------+
Traditional network management protocols like SNMP, NETCONF, and gNMI are built on a paradigm where the network element is a passive repository of state and configuration data. Intelligence resides solely in the controller, which exerts imperative control through explicit operations:¶
In dynamic, large-scale networks, these limitations hinder scalability, resilience, and advanced automation.¶
Integrating a DA redefines a network element as an intelligent, autonomous entity with:¶
These traits differentiate DA interactions from those with traditional devices.¶
Distinguishing agents from tools is essential for paradigm selection. Both A2A and A2T have roles in network management and can complement each other based on autonomy levels.¶
In an Agent-to-Tool (A2T) model, an agent interacts with a tool. A tool is a passive component that:¶
MCP exemplifies this, standardizing function calls and responses. It suits simple interactions, including with advanced agents for imperative tasks, or wrapping legacy interfaces like NETCONF.¶
In A2A, agents collaborate as peers. As outlined in Section 3.3, agents are autonomous, stateful, proactive, and goal-driven. Interactions encompass:¶
Protocols designed for this model, such as the A2A Protocol, provide primitives for task lifecycle management, stateful conversations, and peer-to-peer discovery.¶
Given the characteristics of a Device Agent (Section 3.3), a DA is typically an "agent" rather than a "tool." The A2A paradigm leverages these capabilities effectively for collaborative scenarios.¶
Exclusive A2T use might constrain proactiveness and intent delegation, reducing interactions to basic calls. However, A2T can serve as a building block within an A2A framework—for example, a DA might expose certain functions via A2T while engaging in broader collaboration via A2A. This hybrid approach allows for flexibility, ensuring that simpler operations can use efficient A2T mechanisms without forgoing the benefits of A2A for more complex, intent-driven tasks.¶
Therefore, while communication between a Controller Agent and a Device Agent is often best served by an agent-to-agent interaction, incorporating A2T elements can enhance efficiency in specific contexts. For examples of how A2A enables agent-to-agent collaboration in network management, see Section 6, particularly Section 6.1 and Section 6.2.¶
The A2A Protocol's core features align well with CA-DA needs.¶
Network management operations are naturally expressed as tasks (e.g., service configuration, fault diagnosis). The A2A protocol's task management primitives are well-suited to these requirements:¶
Many network management operations are often long-running, involve multiple steps, produce incremental results, or require human intervention. A2A provides mechanisms for managing such asynchronous interactions, ensuring that clients receive updates effectively, whether they remain continuously connected or operate in a more disconnected fashion.¶
The peer-to-peer nature of A2A allows a DA to be proactive.¶
The A2A Agent Card provides a standardized mechanism for a DA to advertise its capabilities.¶
This workflow shifts from imperative command execution to intent-based delegation:¶
This workflow demonstrates the value of DA autonomy.¶
+---------------+-------------------------+-------------------------+ | Property | On-Box | Off-Box | +---------------+-------------------------+-------------------------+ | Description | DA runs on device | DA on adjacent | | | hardware, in NOS or | hardware, managing | | | container/VM. | via NETCONF/gNMI | | | | as proxy. | +---------------+-------------------------+-------------------------+ | Advantages | Lowest latency; | Legacy support; | | | direct state access | easier scaling | +---------------+-------------------------+-------------------------+ | Considera- | Resource limits; | Added latency; | | tions | update challenges | proxy complexity | +---------------+-------------------------+-------------------------+
A2A complements these protocols; it does not replace them. They operate at different levels of abstraction.¶
A Device Agent will often utilize NETCONF or gNMI as internal "tools" to interact with the underlying device's configuration datastore and hardware.¶
A2A and MCP address different needs and are also complementary.¶
In the context of network management:¶
This complementarity enables a gradual transition, where A2T via MCP handles basic operations, while A2A manages higher-level autonomy.¶
Applying the A2A model to network management introduces important security considerations. Since DAs have a degree of autonomy, the trust relationship between a CA and a DA is critical.¶
This document has no IANA actions.¶
TBD.¶
This appendix provides a concrete, though simplified, example of how the A2A protocol can be applied to a network energy efficiency scenario. The JSON examples are simplified for readability and are compliant with the A2A Protocol Specification v0.3.0.¶
A network operator wants to reduce the power consumption of its edge routers during off-peak hours (e.g., 01:00 to 06:00) without impacting service availability. The high-level business intent is: "Reduce energy consumption by at least 15% during the night while ensuring link capacity is always sufficient for demand."¶
The Controller Agent (CA) translates this intent into a policy for its Device Agents (DAs). The policy allows DAs to autonomously put underutilized line cards or ports into a low-power (sleep) state and wake them up when traffic demand increases.¶
The Device Agent on an edge router advertises its energy-saving capabilities via its A2A Agent Card. It exposes a skill named "network.energy.optimize".¶
{
"protocol_version": "0.3.0",
"name": "Edge Router 01 DA",
"description": "Device Agent for edge router energy management",
"version": "1.2.0",
"supported_interfaces": [
{
"url": "https://da-edge-router-01.example.com/a2a",
"protocol": "HTTP+json"
}
],
"capabilities": {
"streaming": true,
"push_notifications": true
},
"default_input_modes": ["text/plain", "application/json"],
"default_output_modes": ["text/plain", "application/json"],
"skills": [
{
"id": "skill-energy-opt",
"name": "network.energy.optimize",
"description": "Autonomously manages device power state. Accepts time_window (start/end) and min_power_reduction_pct as parameters.",
"tags": ["energy", "optimization", "power-management"],
"examples": [
"Reduce energy by 15% during 01:00-06:00"
]
}
]
}
¶
The following steps illustrate the A2A interaction between the CA and DA.¶
Step 1: CA Delegates the Task¶
The CA initiates a task to delegate the energy-saving goal to the DA. It sends a `SendMessage` request.¶
POST /v1/message:send HTTP/1.1
Host: da-edge-router-01.example.com
Content-Type: application/json
Authorization: Bearer token
A2A-Version: 0.3
{
"message": {
"message_id": "msg-01",
"role": "user",
"parts": [
{
"text": "Execute skill network.energy.optimize with time_window from 01:00:00 to 06:00:00 and min_power_reduction_pct of 15%"
}
]
},
"configuration": {
"pushNotificationConfig": {
"url": "https://ca.example.com/a2a/webhook",
"authentication": {
"schemes": ["Bearer"],
}
}
}
}
¶
Step 2: DA Acknowledges the Task¶
The DA receives the message, validates the parameters, and creates the task. It responds with a `SendMessageResponse` including the task details. The DA generates a new `context_id` for this interaction.¶
HTTP/1.1 200 OK
Content-Type: application/a2a+json
{
"task": {
"id": "task-energy-01",
"contextId": "ctx-01",
"status": {
"state": "submitted",
"timestamp": "2025-12-05T01:00:00Z"
}
}
}
¶
Step 3: DA Performs Autonomous Action¶
At 02:15, the DA's internal monitoring detects that traffic on line card 3 has been below 5% for the last 30 minutes. Based on its internal logic for achieving the 15% power reduction goal, it decides to put the line card into a low-power state.¶
Step 4: DA Proactively Notifies the CA¶
After successfully putting the line card to sleep, the DA proactively informs the CA of the action taken.In this simplified example, the DA sends a message to the CA. In a production implementation, this could be delivered via A2A's push notification mechanism (TaskStatusUpdateEvent) or streaming (Subscribe to Task).¶
POST https://ca.example.com/a2a/webhook HTTP/1.1
Host: ca.example.com
Content-Type: application/a2a+json
Authorization: Bearer shared-secret-token
X-A2A-Notification-Token: da-edge-router-01-token
{
"statusUpdate": {
"taskId": "task-energy-01",
"contextId": "ctx-01",
"status": {
"state": "working",
"timestamp": "2025-12-05T02:15:00Z",
"message": {
"role": "agent",
"parts": [
{
"text": "Autonomous action taken for task task-energy-01: Line card 3 placed in low-power state due to low utilization. Current power savings: 18%."
}
]
}
},
"final": false
}
}
¶
Step 5: DA Reacts to Changing Conditions¶
At 05:30, traffic demand begins to increase. The DA's predictive traffic model forecasts that existing active line cards will exceed 80% utilization within the next 10 minutes. To prevent potential congestion, it autonomously wakes up line card 3.¶
Step 6: DA Sends Another Proactive Notification¶
The DA again informs the CA of its reactive, autonomous action.¶
POST https://ca.example.com/a2a/webhook HTTP/1.1
Host: ca.example.com
Content-Type: application/a2a+json
Authorization: Bearer shared-secret-token
X-A2A-Notification-Token: da-edge-router-01-token
{
"statusUpdate": {
"taskId": "task-energy-01",
"contextId": "ctx-01",
"status": {
"state": "working",
"timestamp": "2025-12-05T05:30:00Z",
"message": {
"role": "agent",
"parts": [
{
"text": "Proactive action taken for task task-energy-01: Line card 3 awakened to meet anticipated traffic demand. Current power savings: 5%."
}
]
}
},
"final": false
}
}
¶
Step 7: DA Completes the Task¶
At the end of the time window (06:00), the DA concludes the optimization task and sends a final message to indicate the task is complete.¶
POST https://ca.example.com/a2a/webhook HTTP/1.1
Host: ca.example.com
Content-Type: application/a2a+json
Authorization: Bearer shared-secret-token
X-A2A-Notification-Token: da-edge-router-01-token
{
"statusUpdate": {
"taskId": "task-energy-01",
"contextId": "ctx-01",
"status": {
"state": "completed",
"timestamp": "2025-12-05T06:00:00Z",
"message": {
"role": "agent",
"parts": [
{
"data": {
"final_savings_percent": 16.2,
"actions_taken": ["line_card_3_slept", "line_card_3_woken"]
}
}
]
}
},
"final": true
}
}
¶