<?xml version="1.0" encoding="US-ASCII"?>
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private) -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY rfc2119 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
]>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="std" docName="draft-li-dmsc-inf-architecture-07"
     ipr="trust200902">
  <front>
    <title abbrev="DMSC Architecture">Dynamic Multi-agent Secured
    Collaboration Infrastructure Architecture</title>

    <author fullname="Xueting Li" initials="X" surname="Li">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <region>Beijing</region>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>lixt2@foxmail.com</email>
      </address>
    </author>

    <author fullname="Aijun Wang" initials="A" surname="Wang">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <region>Beijing</region>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>wangaj3@chinatelecom.cn</email>
      </address>
    </author>

    <author fullname="Bing Liu" initials="B" surname="Liu">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street>No. 156 Beiqing Road</street>

          <city>Beijing</city>

          <country>China</country>
        </postal>

        <email>leo.liubing@huawei.com</email>
      </address>
    </author>

    <author fullname="Changwang Lin" initials="C" surname="Lin">
      <organization>New H3C Technologies</organization>

      <address>
        <postal>
          <street>8 Yongjia North Road</street>

          <city>Beijing</city>

          <region>Haidian District</region>

          <code>100094</code>

          <country>China</country>
        </postal>

        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>

    <date day="22" month="May" year="2026"/>

    <area>IETF Area</area>

    <workgroup>DMSC Working Group</workgroup>

    <keyword>Dynamic Multi-agent, Artificial Intelligence, Infrastructure
    Architecture</keyword>

    <abstract>
      <t>This document presents an architectural framework for dynamic
      multi-agent collaboration from an infrastructure perspective. It
      outlines the network requirements introduced by large-scale agents
      collaboration, and proposes a systematic approach to enabling Dynamic
      Multi-agent Secured Collaboration (DMSC) through infrastructure
      capabilities. The architecture focuses on how network control and
      forwarding functions can actively participate in agent
      collaboration.</t>
    </abstract>
  </front>

  <middle>
    <section anchor="intro" title="Introduction">
      <t>Intelligent agents have evolved rapidly in recent years, driven by
      advances in artificial intelligence models, computing platforms, and
      network connectivity. Early forms of agents were typically embedded
      within isolated systems and designed to perform narrowly defined tasks
      under predefined conditions. Their interactions with external entities
      were limited and often mediated by tightly coupled application logic
      <xref target="IoA"/>.</t>

      <t>With the increasing availability of large-scale AI models, edge
      computing resources, and programmable network infrastructures, agents
      are becoming more autonomous, adaptive, and capable of operating across
      distributed environments. Modern agents can perceive changes in their
      environment, make decisions based on local or shared information, and
      interact with other agents and tools in order to achieve complex
      objectives. These interactions are no longer confined to static
      configurations or single administrative domains, but increasingly span
      devices, networks, and application platforms.</t>

      <t>As agents continue to proliferate, they are forming large-scale
      collaborative systems in which multiple agents dynamically discover each
      other, exchange information, and coordinate actions. Such systems
      exhibit highly dynamic behavior, including frequent changes in agent
      population, roles, and interaction patterns. The resulting agent
      ecosystems resemble an open, interconnected environment rather than a
      collection of isolated applications.</t>

      <t>The evolution toward large-scale, dynamic agent ecosystems introduces
      new challenges for the underlying network infrastructure. While agents
      are capable of sophisticated reasoning and decision-making, their
      ability to collaborate effectively depends on the availability of
      common, scalable, and interoperable networking support.</t>

      <t>This document focuses on the architectural aspects of enabling
      dynamic multi-agent collaboration from a network and infrastructure
      perspective. It examines how network control and forwarding functions
      can be extended to recognize agents as first-class entities and provide
      generic support for agent identification, discovery, semantic routing,
      and coordination. The architecture is intended to support a wide range
      of agent types, including on-device agents, network-resident agents, and
      third-party agents, without imposing assumptions about their internal
      implementation.</t>

      <t>The scope of this document is limited to architectural concepts and
      functional building blocks. It does not define specific protocols, data
      models, or security mechanisms, nor does it prescribe particular
      deployment scenarios or application workflows. Instead, it provides a
      foundational framework upon which more detailed specifications,
      including protocol designs and security architectures, can be developed
      in subsequent documents.</t>
    </section>

    <section title="Conventions used in this document">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref target="RFC2119">
      </xref> .</t>
    </section>

    <section title="Terminology">
      <t>The following terms are defined in this draft:<list style="symbols">
          <t>DMSC: Dynamic Multi-agent Secured Collaboration. The framework
          and infrastructure enabling secure and efficient collaboration among
          dynamic agents.</t>

          <t>Agent: An automated intelligent entity capable of e.g interacting
          with its environment, acquiring contextual information, reasoning,
          self-learning, decision-making, executing tasks (autonomously or in
          collaboration with other Al Agents) to achieve a specific goal.</t>

          <t>Agent Gateway: The Agent Gateway is a functional entity that
          serves as the infrastructure for enabling interconnection and
          collaboration among agents. While its core role remains consistent,
          it is inherently flexible in deployment and can be realized in
          various forms&mdash;ranging from a network service to a dedicated
          gateway&mdash;depending on the architectural and operational
          requirements of different network environments.</t>

          <t>Agent Management Center (AMC): It is the trusted infrastructure
          service responsible for agent identity lifecycle management and
          credential issuance.</t>
        </list></t>
    </section>

    <section title="Network Requirements ">
      <t>The proliferation of intelligent agents fundamentally reshapes
      interaction patterns and control dynamics in future networks. Agent
      interactions are typically short-lived, context-dependent, and driven by
      task semantics rather than static endpoints. Moreover, agents may
      dynamically join or leave collaborative groups, migrate across
      administrative domains, or change roles over time. These characteristics
      introduce new requirements for network infrastructures, including
      agent-level identity management, capability-aware communication,
      scalable registration and discovery, cross-domain collaboration support,
      and adaptive routing, as also reflected in
      [draft-yu-ai-agent-use-cases-in-6g].<xref target="usecase"/></t>

      <t>Collectively, these requirements indicate that future networks must
      go beyond passive connectivity and actively support dynamic multi-agent
      collaboration. The core idea of Dynamic Multi-agent Secured
      Collaboration (DMSC) is to elevate key collaboration-related functions
      into the network infrastructure. Instead of embedding all coordination
      logic within applications or agent frameworks, DMSC leverages
      infrastructure-level capabilities exposed through control-plane and
      forwarding-plane functions. This approach enables the network to
      recognize agents as first-class entities, maintain high-level
      collaboration context, and make informed decisions on discovery,
      routing, and coordination support in a scalable and interoperable
      manner.</t>
    </section>

    <section title="DMSC Architecture Overview">
      <section title="DMSC Infrastructure Architecture">
        <t>Figure 1 illustrates the overall architecture for dynamic
        multi-agent collaboration from an infrastructure-centric perspective.
        The architecture positions the network infrastructure as an active
        participant in agent collaboration, while preserving the autonomy and
        task-level reasoning of individual agents. In this architecture, the
        network does not execute agent logic or interpret task semantics.
        Instead, it provides generic support functions that enable agents to
        collaborate more efficiently and reliably. Agents remain autonomous,
        while the network supplies shared infrastructure capabilities.</t>

        <t>From an infrastructure perspective, the architecture is organized
        into three logical layers: <list style="symbols">
            <t>Management Plane: governs authentication, capability taxonomy,
            observability and policy aspects.</t>

            <t>Control Plane: Manages agent registration, discovery,
            invocation, lifecycle, and capability information maintenance and
            so on.</t>

            <t>Forwarding Plane: Supports semantic routing for agent
            interactions.</t>
          </list></t>

        <figure align="center">
          <artwork><![CDATA[

   +------------------------------------------------------------------------------------+
   |                         Management & Orchestration Plane                           |
   |  +--------------+   +-------------------+   +-----------------+  +--------------+  |
   |  |  Agent       |   |Capability Taxonomy|   | Observability & |  |Policy Manager|  |
   |  |Authentication|   |(Agent,Capability) |   | Analytics       |  | (Rules...)   |  |
   |  +--------------+   +-------------------+   +-----------------+  +--------------+  |
   +------------------------------------------------------------------------------------+
                                       |        ^  
                                       v        |
+-------------------------------------------------------------------------------------------+ 
|                                  Network Infrastructure                                   |                                 
| +---------------------------------------------------------------------------------------+ |
| |         AGW 1                              AGW 2                      AGW 3 ...       | |
| | +-------------------------+    +-------------------------+     +--------------------+ | |
| | |      Control Plane      |    |      Control Plane      |     | Control Plane      | | |
| | |-------------------------|    |-------------------------|     |--------------------| | |
| | | - Agent Registration    |<-->| - Agent Registration    |<--> | ...                | | |
| | | - Agent Invocation      |    | - Agent Invocation      |     |                    | | |
| | | - Agent Discovery       |    | - Agent Discovery       |     |                    | | |
| | | - Capability Directory  |    | - Capability Directory  |     |                    | | |
| | +-------------------------+    +-------------------------+     +--------------------+ | |
| |            | Control & Policy               | Control                   | Control     | |   
| |            v                                v & Policy                  v & Policy    | |   
| | +------------------------+     +-------------------------+      +-------------------+ | |
| | | Forwarding Plane       |     |      Forwarding Plane   |      | Forwarding Plane  | | |
| | |------------------------+     +-------------------------+      +-------------------+ | |
| | | - Semantic  Routing    |     |    ...                  |      |  ...              | | |
| | | - ...                  |     |                         |      |                   | | |
| | +------------------------+     +-------------------------+      +-------------------+ | |
| +---------------------------------------------------------------------------------------+ |                                                                                                                                   
+------------------^  ------------------------^ ------------------------------^ ------------+
                   |Registration              |  Registration                 |Registration
                   |                          |                               |        
         +--------------------+     +--------------------+         +--------------------+ 
         |        Agent A     |     |        Agent B     |         |        Agent C     | 
         |--------------------|     |--------------------|         |--------------------|            
         | - Capabilities     |     | - Capabilities     |         | - Capabilities     |   ...    
         | - Local Reasoning  |     | - Local Reasoning  |         | - Local Reasoning  |    
         +--------------------+     +--------------------+         +--------------------+    
   Figure 1 The infrastructure architecture of dynamic multi-agent collaboration  
]]></artwork>
        </figure>

        <t>On top of this architecture, agents engage in collaborative
        activities driven by task intents, shared goals, and capability
        information. Agents are responsible for local reasoning,
        decision-making, and execution of task-specific logic. The network
        does not interpret agent semantics or execute agent logic; instead, it
        provides common infrastructure capabilities that support efficient and
        scalable collaboration among agents. Above the network infrastructure,
        a Management and Orchestration Plane provides non-real-time management
        functions, including agent authentication, agent capability taxonomy
        management, policy management, observability and analytics. This plane
        supplies policy, trust, and state-related inputs to the network
        infrastructure.</t>

        <t>The network infrastructure itself is composed of multiple agent
        gateways, each implementing a common set of logical functions, and the
        gateways support hierarchical deployment. Within each gateway, the
        Control Plane provides agent-aware control functions, including agent
        identity management, capability directory maintenance, registration,
        and discovery control. These functions enable the network to recognize
        agents as first-class entities and maintain a consistent view of
        agent-related information across the infrastructure. By decoupling
        agent identity from physical location through capability identifiers,
        the control plane supports dynamic agent lifecycle events such as
        mobility, instantiation, and termination.</t>

        <t>The Forwarding Plane supports semantic routing by forwarding
        requests based on capability identifiers&mdash;such as
        /capability/ocr&mdash;rather than static IP addresses. When multiple
        instances of a capability are available, the forwarding plane may
        select a target based on real-time health and availability
        information&mdash;such as liveness or load&mdash;provided by the
        control plane. In the event of failure, it can perform fast failover
        to an alternative instance within the same capability group, ensuring
        continuity of service.</t>

        <t>When an agent joins the network, it authenticates and obtains
        trusted authorization through network controller; only verified agents
        may register their capabilities&mdash;such as &ldquo;supports
        high-precision OCR&rdquo; or &ldquo;performs GDPR-compliant
        de-identification&rdquo;&mdash;which are stored locally to form a
        capability directory. When another agent issues a capability-based
        discovery request (e.g., &ldquo;find an OCR agent&rdquo;), the local
        agent gateway either responds directly or securely synchronizes
        capability information with other agent gateways&mdash;including
        across domains or clouds&mdash;to locate eligible candidates. Once a
        target is identified, the request is forwarded via semantic routing
        (e.g., using /capability/ocr) to the appropriate instance.</t>

        <t>Overall, this architecture establishes a clear division of
        responsibilities: agents focus on intelligent behavior and task
        execution, while the network infrastructure provides capability-based
        control, semantic forwarding, and secure coordination mechanisms. This
        separation enables dynamic multi-agent collaboration to scale across
        heterogeneous environments&mdash;on-premises, at the edge, or in the
        cloud&mdash;while allowing agents and the network to evolve
        independently.</t>
      </section>
    </section>

    <section title="Infrastructure Functions Enabling Active Network Participation">
      <section title="Agent Identification and Capability Directory">
        <t>In large-scale dynamic multi-agent environments, agents cannot be
        effectively supported using traditional host- or service-based
        identifiers alone. Agents may be instantiated dynamically, migrate
        across network locations, or operate concurrently on the same physical
        node. As a result, the network requires a mechanism to identify agents
        as logical entities that are decoupled from network topology.</t>

        <t>The proposed architecture introduces network-visible agent
        identifiers that represent agents independently of their physical
        location or hosting environment. These identifiers enable the network
        to consistently recognize agents across control and forwarding
        functions, even as underlying network bindings change. Beyond basic
        identification, the architecture supports forming an agent capability
        directory on agent gateways.</t>
      </section>

      <section title="Infrastructure-Level Agent Discovery">
        <t>Agent discovery is a fundamental prerequisite for collaboration,
        yet traditional discovery mechanisms are typically designed for
        relatively static services or tightly scoped environments. In
        contrast, multi-agent collaboration requires discovery mechanisms that
        can operate across heterogeneous platforms, adapt to dynamic agent
        populations, and respect administrative boundaries.</t>

        <t>In DMSC architecture, agent discovery is provided as an
        infrastructure-level function, rather than being entirely implemented
        within agent frameworks. The network supports discovery queries based
        on agent identifiers, advertised capabilities. This allows agents to
        locate suitable collaborators without requiring global knowledge or
        centralized coordination.</t>
      </section>

      <section title="Semantic Routing">
        <t>Traditional routing mechanisms forward packets based on destination
        addresses without awareness of application intent. In dynamic
        multi-agent collaboration, however, interactions are driven by *what*
        is needed&mdash;such as a specific capability&mdash;rather than
        *where* a fixed endpoint resides. The DMSC architecture addresses this
        by introducing semantic routing: requests are expressed in terms of
        agent capabilities (e.g., "/capability/ocr").</t>

        <t>Semantic routing enables flexible agent invocation without
        hard-coded endpoints. A request for a given capability can be routed
        to any authorized and available instance that has declared that
        capability. If the selected instance becomes unavailable, the network
        may fail over to another instance within the same capability group,
        provided such redundancy exists.</t>
      </section>

      <section title="Secure Collaboration Capability and Policy">
        <t>Effective collaboration among dynamic agents requires consistent
        handling of capabilities and policies, especially when interactions
        span multiple domains or network segments. The DMSC architecture
        supports secure synchronization of capability declarations and policy
        constraints at the infrastructure level.</t>

        <t>Capability information associated with an agent&mdash;such as its
        declared functions (e.g., OCR, payment validation) and security
        attributes (e.g., GDPR compliance, authentication
        requirements)&mdash;can be registered with the control plane and
        synchronized across domains. Where appropriate, these capability
        descriptions may be bound to policy rules that govern access and
        interaction. Security-related attributes, such as authorization scope
        or domain-specific constraints, can be attached to capability entries
        to ensure that interactions remain compliant with local regulations
        and trust boundaries. In cross-domain scenarios, policy abstraction
        mechanisms support controlled translation or normalization to enable
        interoperability while respecting local governance.</t>
      </section>

      <section title="Operational Visibility">
        <t>As multi-agent systems scale, gaining visibility into
        collaboration-level behavior becomes essential for effective operation
        and troubleshooting. Traditional network observability focuses on
        flows and endpoints, offering limited insight into agent interactions
        and coordination dynamics. The DMSC architecture introduces
        operational visibility at the collaboration level by enabling
        controlled observation of key interaction events.</t>

        <t>Observable entities may include: <list style="symbols">
            <t>Agent registration and abstract capability advertisements.</t>

            <t>Capability-based discovery activities and outcomes.</t>

            <t>Semantic routing decisions and high-level invocation
            outcomes.</t>

            <t>Association with network resources and applied policy
            controls.</t>
          </list>This visibility is not intended to expose agent internals or
        infer application logic, but to provide sufficient information for
        monitoring, auditing, root cause analysis, and performance
        optimization. The collected telemetry can be used by management and
        orchestration systems to support long-term optimization&mdash;such as
        identifying underutilized capabilities or detecting policy violations.
        It may also inform policy refinement and infrastructure planning, but
        does not drive real-time control-plane decisions or forwarding-plane
        behavior. To address privacy and security concerns, exposure of
        observable data is controlled through policy mechanisms, ensuring that
        only authorized parties can access relevant information.</t>
      </section>
    </section>

    <section title="Deployment Usecases">
      <t>This section presents two deployment cases for fixed network and
      mobile network environments respectively, illustrating the practical
      implementation of the proposed architecture. This is not intended to
      restrict implementation solutions, but to demonstrate how network
      infrastructure defined in the architecture can be deployed by leveraging
      existing or upgraded network elements.</t>

      <section title="Fixed Network ">
        <t>In a fixed broadband network, gateways can be implemented as
        enhanced agent gateways deployed at aggregation layers or service edge
        nodes. These AGWs are positioned logically between access networks and
        service domains, enabling them to perform registration, authorization
        mediation, capability abstraction, and semantic routing functions
        without requiring changes to end-user access infrastructure.</t>

        <t>In such deployments as shown in figure 6: <list style="symbols">
            <t>Agent registration and authentication are performed via the AGW
            and Agent Management Center (AMC).</t>

            <t>Capability digest exchange occurs between AGWs.</t>

            <t>Semantic resolution is handled hop-by-hop across AGWs.</t>

            <t>Agents establish peer-to-peer semantic sessions after
            gateway-mediated coordination.</t>
          </list>This example shows that agent gateways in fixed network can
        be equipped with logical coordination functions to serve as functional
        gateways, enabling agent registration, synchronization, scheduling and
        other related operations.</t>

        <t><figure>
            <artwork><![CDATA[
 
 
                                    +------------------------------+                             
                               +----|    Agent Management Center   |------+                             
                               |    +------------------------------+      |                 
                               |                                          |
      +----------+      +---------+                                  +---------+   +---------+
      | Agent A  | ---- | AGW 1   |<-------------+    +------------->|  AGW 2  |---| Agent B |
      +----------+      +---------+              |    |              +---------+   +---------+
                                                 |    |         
                                             +------------+     
                                             |  Routers   |     
                                             +------------+       

                     Figure 2  Deployment Example: Fixed Network with Agent Gateway Realization
]]></artwork>
          </figure></t>
      </section>

      <section title="Mobile Operator Network ">
        <t>In a mobile operator network (e.g., a 6G network), AI capabilities
        and technologies are expected to be leveraged subject to operator
        policies and configurations. AI Agents, which refer generally to
        agents that autonomously perform tasks on behalf of users, systems,
        and/or applications, can understand complex requests and improve
        network efficiency. In addition, capabilities and services such as
        sensing, real-time data processing, telemetry, analytics, and others
        within a 6G network may also be provided as &ldquo;Tools&rdquo; to
        third-party applications.</t>

        <t>Below figure shows an example of AI agents, an Agent Management
        Center and an Agent Gateway deployed in the mobile operator network.
        The architecture of 6G is still in discussion, thus some
        functionalities are described by using some 5G NFs as typical
        examples.</t>

        <t>User initiates intent in nature language and receive human-readable
        result. Intent analysis takes place at two stages:<list
            style="symbols">
            <t>(Optional, based on UE capabilities) The UE converts
            natural-language intent to operator-defined intent and also
            translates operator-defined results to human-readable results
            based on internal implementation.</t>

            <t>(Mandatory) The network function (NF) with agent capability in
            the mobile operator core network comprehends and analyzes the
            intent. Based on the analyzed intent, a subsequent workflow is
            generated. Typically, the NF that terminates NAS messages (e.g.,
            AMF in 5G) can either comprehend the intent (when the AMF includes
            agent capability) or forward the intent to an agent-enabled NF in
            the core network (when the AMF does not include agent
            capability).</t>
          </list>Agent-enabled NFs request AIC allocation from the Agent
        Gateway. The NF (e.g., AMF in 5G) that terminates NAS messages and
        manages UE registration may request AIC from the Agent Gateway on
        behalf of the agent in the UE. The Agent Management Center is
        responsible for agent authentication and authorization. The
        authentication and authorization procedure for agents (Agents &harr;
        Agent Gateway &harr; Agent Management Center) may reference the
        authentication and authorization procedure for UEs (e.g., UEs
        &lt;-&gt; AMF &lt;-&gt; UDM &lt;-&gt; AUSF in 5G).</t>

        <t>Agent-enabled NFs register with the Agent Gateway and discover each
        other by querying the Agent Gateway. The registration and discovery
        mechanism is similar to the functionality provided by the NRF in 5G
        networks. However, standardization of agent capabilities is essential
        for the accuracy and efficiency of agent discovery. The NF (e.g., AMF
        in 5G) that terminates NAS messages and manages UE registration may
        interact with the Agent Gateway on behalf of the agent in the UE.
        However, the discovery of the agent on the UE takes the UE connection
        state into account.</t>

        <t>Service-based interfaces may be enhanced to support agent
        communication, or agent-based interfaces may be introduced to support
        AI traffic carrying Agent-to-Agent semantic data. The AI capabilities
        supported by the mobile operator network may be exposed as agent tools
        and invoked by third-party AI agents via the Agent Gateway, which
        performs protocol conversion for different agent communication
        protocols if necessary, while AI traffic transmitted through the
        mobile operator network may be identified to guarantee performance
        requirements.</t>

        <t>The NF supporting session management (e.g., SMF in 5G) can be
        enhanced, or a new NF may be introduced to support the management of
        Agent-to-Agent semantic sessions between the agent residing in the UE
        and the agent residing in the operator core network.</t>

        <t><figure>
            <artwork><![CDATA[     +-------+                                                                                                                             
     |  Uesr |                                                                                                                             
     +-+-----+                                                                                                                             
       |  ^                                                                                                                                
       |  |                                                                                                                                
       |  |                                                                                                                                
+------+--+-------+                 +----------------------------------------------------------------------+                +------------+ 
|      |  |       |                 |                                                   Mobile Operator    |                | Third Party| 
|      v  |       |                 |                                                      Corenetwork     |                |            | 
|  +------+----+  | Operator-defined|                                                                      |                |            | 
|  |  UE APP   |  | <-------------> |    +--------+    +-----------+    +----------+                       |<-------------> |  +------+  | 
|  +--+--------+  |                 |    |   NF   |    | NF with   |    |   Agent  |                       |                |  | Agent|  | 
|     |   ^       |                 |    |        |    |   Agent   |    |  Gateway |                       |                |  +------+  | 
|     v   |       |                 |    +---+----+    +-----+-----+    +-----+----+                       |                |            | 
|  +------+----+  |                 |        |               |                |                            |                |  +------+  |
|  | UE OS Layer  |                 |        |               |                |                            |                |  | Agent|  |
|  |   Agent   |  |                 |        |               |                |     Service Based Interface|                |  +------+  | 
|  +--+--------+  | Intent Execution|        |               |                |      (Agent Enhancement)   |                |            | 
|     |   ^       | <-------------> |--------+----+----------+----+-----------+----+------------------     | <------------->|     .      | 
|     |   |       |      Result     |             |               |                |                       |                |     .      | 
|     |   |       |                 |             |               |                |                       |                |     .      | 
|     v   |       |                 |             |               |                |                       |                |     .      | 
|  +------+----+  |                 |      +------+----+     +----+---+    +-------+-----+                 |                |     .      | 
|  | UE Modem  |  |                 |      |  NF with  |     |   NF   |    |    Agent    |                 |                |            | 
|  |           |  |                 |      |   Agent   |     |        |    | Management  |                 |                |  +------+  | 
|  +-----------+  |   AI traffic    |      +-----------+     +--------+    |    Center   |                 |    AI Traffic  |  | Agent|  | 
|                 | <-------------> |                                      +-------------+                 | <------------->|  +------+  | 
|                 |     Transfer    |                                                                      |     Transfer   |            | 
| UE              |                 |                                                                      |                |            | 
+-----------------+                 +----------------------------------------------------------------------+                +------------+ 
                                              Figure 3 Deployment Example: Mobile Operator Network 
]]></artwork>
          </figure></t>
      </section>
    </section>

    <section title="Security Considerations">
      <t>This architecture introduces several security considerations,
      including risks related to agent identity spoofing, capability
      misrepresentation, semantic routing manipulation, cross-domain trust
      inconsistencies, and information leakage through enhanced observability.
      Detailed security mechanisms are outside the scope of this document.</t>
    </section>

    <section anchor="iana" title="IANA Considerations">
      <t>TBD</t>
    </section>

    <section title="Acknowledgement">
      <t>TBD</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.2119"?>

      <reference anchor="IoA">
        <front>
          <title>Internet of Agents &ndash; Definition, Architecture and
          Applications.
          https://aip.openatom.tech/explore/journalism/detail/501037383572131840</title>

          <author fullname="Jun Liu" initials="J" surname="L">
            <organization/>
          </author>

          <date month="October" year="2025"/>
        </front>
      </reference>

      <reference anchor="usecase">
        <front>
          <title>AI Agent Use Cases and Requirements in 6G Network.
          draft-yu-ai-agent-use-cases-in-6g.
          &lt;https://datatracker.ietf.org/doc/html/draft-yu-dmsc-ai-agent-use-cases-in-6g&gt;</title>

          <author fullname="Menghan Yu" initials="M" surname="Y">
            <organization/>
          </author>

          <date month="July" year="2025"/>
        </front>
      </reference>
    </references>
  </back>
</rfc>
