Skip to main content

Agent Communication Framework for Network AIOps
draft-fu-nmop-agent-communication-framework-00

Document Type Active Internet-Draft (individual)
Authors Yu Fu , Sun Qiong , Xin Song , Chongfeng Xie
Last updated 2026-01-24
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-fu-nmop-agent-communication-framework-00
nmop                                                               Y. Fu
Internet-Draft                                                    Q. Sun
Intended status: Standards Track                                 X. Song
Expires: 29 July 2026                                             C. Xie
                                                           China Telecom
                                                         25 January 2026

            Agent Communication Framework for Network AIOps
             draft-fu-nmop-agent-communication-framework-00

Abstract

   As the development of large model and agent technology, it is a trend
   for multi-agent collaboration to solve complex problems.  This
   document proposes an Agent Communication Framework, a multi-agent
   communication and collaboration framework that facilitates the
   coordination of heterogeneous multi-agents and supports intelligent
   network operations and maintenance (AIOps).  Its architecture
   includes an AI gateway and an Agent Name Service, along with
   capabilities such as monitoring and tracking, as well as security
   protection.  Agent Communication Framework provides a comprehensive
   solution for multi-agent communication and collaboration, laying the
   foundation for future interactive, scalable, secure, and controllable
   multi-agent network intelligent operations and maintenance.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 29 July 2026.

Copyright Notice

   Copyright (c) 2026 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

Fu, et al.                Expires 29 July 2026                  [Page 1]
Internet-Draft        Agent Communication Framework         January 2026

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  Requirements Language . . . . . . . . . . . . . . . . . .   3
     1.2.  Definition and Terminology  . . . . . . . . . . . . . . .   3
   2.  Agent Communication Framework and Components  . . . . . . . .   3
     2.1.  AI Gateway  . . . . . . . . . . . . . . . . . . . . . . .   5
     2.2.  Agent Name Service  . . . . . . . . . . . . . . . . . . .   7
       2.2.1.  Agent Accessing . . . . . . . . . . . . . . . . . . .   7
       2.2.2.  Agent Addressing  . . . . . . . . . . . . . . . . . .   8
       2.2.3.  Security Protection . . . . . . . . . . . . . . . . .   9
       2.2.4.  Capabilities Monitoring and Management  . . . . . . .   9
       2.2.5.  Cross-domain synchronization  . . . . . . . . . . . .   9
   3.  Use Case  . . . . . . . . . . . . . . . . . . . . . . . . . .  10
   4.  Security Considerations . . . . . . . . . . . . . . . . . . .  12
   5.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  12
   6.  Normative References  . . . . . . . . . . . . . . . . . . . .  12
   Acknowledgements  . . . . . . . . . . . . . . . . . . . . . . . .  13
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  13

1.  Introduction

   As the rapid development of AI technology, network operations and
   maintenance have evolved from efficiency improvement to automation,
   through the Data-Driven Digital age with the rise of AIOps
   (intelligent network operations and maintenance), now striding
   towards the Agentic AI stage.  In this new phase, the collaborative
   capabilities of intelligent agents will drive operations and
   maintenance toward a higher level of autonomy.  However, current
   multi-agent collaboration still lacks reliable mechanisms for agent
   addressing, communication, and orchestration scheduling.  It
   introduces several requirements as below:

   • Agent registering and discovering:With the rapid developments of
   multi-agent collaborative scenarios, traditional service discovery
   mechanisms face several challenges.  They are unable to adapt to the
   multi-heterogeneous and dynamically changing capability of agents.
   There is a lack of a unified capability of registration and discovery
   framework for the cross-domain and spans different subject agents,

Fu, et al.                Expires 29 July 2026                  [Page 2]
Internet-Draft        Agent Communication Framework         January 2026

   result in low efficiency of task-driven precise collaboration.  There
   is an urgent need to build a global agent capability registration
   mechanism, dynamically maintain the real-time capability database of
   agents across the network, and generate optimal matching strategies
   based on task requirements.

   • Cross-domain interconnection: In some task-oriented collaboration
   scenarios, it may encounter interoperability challenges—both within
   intra-domain and inter-domain use cases.  In inter-domain scenario,
   agents belonging to different domains must discover, access, and
   securely interact with one another to enable effective collaboration.

   • Security Operations: To support large-scale deployment of
   intelligent agents, a comprehensive operation-level security
   framework is required that integrates management, access control,
   traceability, and authentication tailored for agent-centric
   environments., with security mechanisms and capabilities such as zero
   trust, communication encryption and decryption, and supervision
   embedded in the protocol.

1.1.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

1.2.  Definition and Terminology

   • ACF:Agent Communication Framework

   • ANS:Agent Name Service

   • AI Gateway:AI GW

2.  Agent Communication Framework and Components

   To address the requirements described above, we propose an Agent
   Communication Framework for intra-domain and inter-domain agent
   communications.  It consists of two components: AI Gateway and Agent
   Name Service (ANS).  It is the “Connection and control Hub” for agent
   communication.  The overview of the agent communication framework is
   shown in Figure 1.

Fu, et al.                Expires 29 July 2026                  [Page 3]
Internet-Draft        Agent Communication Framework         January 2026

    +---------------------------+     +----------------------------+
    |                           |     |                            |
    |      Domain1:   ACF       |     |      Domain2:   ACF        |
    |                           |     |                            |
    |                           |     |                            |
    |  +--------------------+   |     |  +---------------------+   |
    |  |                    |   |     |  |                     |   |
    |  | Agent Name Service <---+-----+--> Agent Name Service  |   |
    |  |                    |   |     |  |                     |   |
    |  +---------^----------+   |     |  +--------^------------+   |
    |            |              |     |           |                |
    |            |              |     |           |                |
    |      +-----v-----+--<-----+-----+--->--+----v------+         |
    |      |           |        |     |      |           |         |
    |      |           |        |     |      |           |         |
    |  +---v---+   +---v---+    |     |  +---v---+   +---v-- +     |
    |  |       |   |       |    |     |  |       |   |       |     |
    |  | AI GW |   | AI GW |    |     |  | AI GW |   | AI GW |     |
    |  |       |   |       |    |     |  |       |   |       |     |
    |  +---^---+   +---^---+    |     |  +---^---+   +---^---+     |
    |      |           |        |     |      |           |         |
    |      |           |        |     |      |           |         |
    +------+-----------+--------+     +------+-----------+---------+
           |           |                     |           |
           |           |                     |           |
       +---v---+   +---v---+             +---v---+   +---v---+
       |       |   |       |             |       |   |       |
       | Agent |   | Agent |             | Agent |   | Agent |
       |       |   |       |             |       |   |       |
       +-------+   +-------+             +-------+   +-------+

   As described in Section 1, efficient interconnection among agents
   relies on clear identity information and capability-based discovery.
   Therefore, a unified identity identification and agent information
   management mechanism forms the foundation for the secure agent
   interconnection.  Agent Communication Framework issue unique identity
   IDs for each agent and establish an authentication framework to
   ensure the security of mutual visits.  They are capable of managing
   information for a massive number of agents, able to obtain agent
   information through multiple methods to ensure information
   comprehensiveness.  In Agent Communication Framework, a semantics-
   based dynamic agent addressing scheme is proposed to enhance the
   accuracy and flexibility of agent interconnection and collaboration,
   enabling interoperability across different domains.  In Intra-domain
   scenarios, the agent communication framework enables the discovery
   and management within the domain and presents a unified proxy
   externally.  Independent AI gateways realize the unified access and
   mutual discovery of agents within domains such as edge homes and the

Fu, et al.                Expires 29 July 2026                  [Page 4]
Internet-Draft        Agent Communication Framework         January 2026

   Internet of Things.  In inter-domain scenarios, information
   synchronization mechanism needs to be done by designing as an agent
   information repository in Agent Name Service (ANS) between different
   domains, combining with the existing DNS mechanisms for cross-domain
   addressing and discovery of agents.

2.1.  AI Gateway

   An AI Gateway is a reliable, efficient, and secure interconnection
   hub for agents.  The main functions of AI Gateway include:

   *  Service Proxy: Service Proxy function acts as an intelligent
      network address translation (NAT) layer that seamlessly translates
      between internal and external network addresses, enabling secure
      communication between private services and external clients.  By
      masking the identities and IP addresses of internal agents or
      services, it effectively hides the internal network topology from
      external access, thereby enhancing security, reducing exposure to
      potential threats, and simplifying service exposure management.

   *  Traffic forwarding and optimization: The AI Gateway provides
      intelligent traffic forwarding and optimization capabilities,
      including Quality of Service (QoS) guarantees to prioritize
      critical workloads, dynamic multi-channel selection for optimal
      path routing based on real-time network conditions, and packet
      compression to reduce bandwidth consumption and latency.
      Additionally, it leverages AI-driven analytics to adaptively
      manage traffic flows, ensure reliable delivery, and enhance
      overall network efficiency and user experience.

   *  Security protection: It provides comprehensive security protection
      by implementing end-to-end channel encryption to ensure data
      confidentiality and integrity during transmission, coupled with
      advanced traffic security detection and real-time threat
      mitigation mechanisms—such as anomaly detection, intrusion
      prevention, and malicious payload filtering—to safeguard against
      cyberattacks and unauthorized access.

   *  Monitoring and auditing: It provides comprehensive monitoring and
      auditing capabilities by continuously observing and logging all
      interaction behaviors between agents, including request sources,
      destinations, timestamps, data payloads (where permitted), and
      access patterns.

   In addition to the capabilities described above, the AI Gateway also
   supports the requirements of high concurrency, high reliability, as
   well as scalability.

Fu, et al.                Expires 29 July 2026                  [Page 5]
Internet-Draft        Agent Communication Framework         January 2026

   *  The AI Gateway supports persistent, always online sessions for
      heterogeneous agents, enabling seamless dynamic
      participation—where agents can join or leave a session at any time
      without disrupting the workflow.  It ensures session continuity
      through intelligent checkpointing and resumption mechanisms,
      allowing tasks to resume exactly from the point of interruption in
      the event of network disconnections or agent failures, without
      requiring the entire task to be restarted.  This capability
      maintains task integrity, improves resource efficiency, and
      enhances reliability in complex, multi-agent collaborative
      scenarios.

   *  The AI Gateway is designed to deliver highly concurrent, secure,
      and ultra-low-latency asynchronous communication for multi-agent
      systems, supporting scalable workloads with millions of
      simultaneous connections.  It ensures robust security through end-
      to-end encryption and fine-grained access control, while
      optimizing message routing and processing to minimize
      latency—enabling efficient, real-time coordination among large-
      scale heterogeneous agents

   *  The AI Gateway is designed for high scalability, supporting both
      horizontal and vertical expansion to accommodate growing multi-
      agent workloads.  Horizontally, it enables elastic scaling of
      gateways to handle increased traffic and agent density by
      dynamically adding or removing nodes based on demand.  Vertically,
      it implements recursive addressing across hierarchical gateway
      layers, allowing seamless inter-layer communication and efficient
      routing in large-scale, nested, or federated agent architectures.
      Together, these capabilities ensure the system can scale flexibly
      and efficiently—both outward across distributed deployments and
      upward through logical abstraction layers—while maintaining
      performance, consistency, and manageability.

   *  The AI Gateway supports high-reliability requirements for fully
      autonomous, human-intervention-free interactions among agents.  It
      ensures continuously stable and fault-resilient network
      connectivity through redundant pathways, automatic failover
      mechanism—thereby preventing communication disruptions that could
      otherwise trigger cascading failures across the agent ecosystem.
      This reliability is critical to maintaining uninterrupted task
      execution and system-wide stability in mission-critical multi-
      agent environments.

Fu, et al.                Expires 29 July 2026                  [Page 6]
Internet-Draft        Agent Communication Framework         January 2026

2.2.  Agent Name Service

   Agent Name Service provides access and semantic addressing function
   for multi-agents, and combines with the AI Gateway to provide
   security protection and monitoring capabilities.

2.2.1.  Agent Accessing

   *  Registration: The Agent Name Service (ANS) provides a secure and
      structured access mechanism for intelligent agents through an
      integrated registration and identity management mechanism.  It
      begins with the Registration Module, which receives registration
      requests from agents, validates their legitimacy (e.g., through
      credentials, tokens, or domain policies), and initiates the
      enrollment process.  The Security Module then handles
      cryptographic identity provisioning by accepting the agent’s
      Certificate Signing Request (CSR), verifying its authenticity, and
      issuing a signed certificate to establish trusted identity.
      Finally, the Registry securely stores each agent’s
      metadata—including its unique identifier, certificate,
      capabilities—enabling reliable discovery, authentication, and
      secure communication across the multi-agents.  This end-to-end
      workflow ensures that only authorized agents are admitted into the
      system, with verifiable identities and consistent governance.

Fu, et al.                Expires 29 July 2026                  [Page 7]
Internet-Draft        Agent Communication Framework         January 2026

   *  Update, Renewal and Revocation: The Agent Name Service (ANS)
      supports comprehensive lifecycle management for registered agents
      through secure and auditable update, renewal, and revocation
      operations.  For updates, agents may submit requests to modify
      their metadata—such as capabilities, protocols, or agent Card
      information.  The ANS server performs signature verification to
      authenticate the request and ensures backward compatibility; if
      the changes introduce incompatibilities, the agent must update its
      version number and do re-registration.  Upon successful
      validation, the ANS updates the corresponding versioned record in
      its registry.  For certificate renewal, agents initiate a renewal
      request before their current certificate expires.  The ANS
      validates the agent’s identity via cryptographic signature
      verification.  After confirmation, it issues a new signed
      certificate while updating the associated agent entry—ensuring
      uninterrupted, trusted operation without service disruption.  For
      revocation, agents or administrators can request certificate
      invalidation in cases of key expiration.  After verifying the
      authenticity of the revocation request through signature checks,
      the ANS permanently removes the agent’s certificate and associated
      metadata from the registry, immediately terminating its ability to
      access.  All operations are executed under strict cryptographic
      validation and audit logging, ensuring integrity, traceability,
      and continuous security across the agent lifecycle.

2.2.2.  Agent Addressing

   The Agent Name Service (ANS) provides a millisecond-level Semantic
   Addressing Query capability that enables agent discovery—allowing
   users or systems to express intent in plain language (e.g., “Poor
   mobile signal and unstable broadband at home”) and automatically
   resolving it to the most relevant agents (e.g., Home Broadband Agent
   and Wireless Network Optimization Agent).  Semantic-based addressing
   and discovery of agents requires the Agent Name Service (ANS) to
   possess comprehensive, detailed descriptive information for all
   agents.  This functionality is implemented through three coordinated
   components:

   • The Resolution Module receives semantic resolution requests from
   agents and leverages RAG techniques to interpret the query and match
   it to appropriate agent. • The Registry then retrieves the
   corresponding agent’s metadata—including its capabilities, protocol
   details, and certificate—based on the resolved semantic intent. •
   Finally, the Security Module cryptographically signs the retrieved
   agent information and certificate using the private key, ensuring
   authenticity and integrity before returning the signed response to
   the requester.

Fu, et al.                Expires 29 July 2026                  [Page 8]
Internet-Draft        Agent Communication Framework         January 2026

2.2.3.  Security Protection

   The Agent Name Service (ANS) incorporates robust security and
   governance mechanisms to ensure safe and controlled agent
   interactions.  It enforces fine-grained permission control at the
   agent level through a structured workflow that includes registration
   requests, administrative approval, and explicit
   authorization—ensuring that only vetted agents gain access to
   specific capabilities or resources.

   To counter adversarial inputs, ANS integrates prompt injection
   prevention by inspecting all incoming instructions or queries for
   malicious patterns, obfuscated commands, or attempts to hijack agent
   behavior, thereby safeguarding the integrity of agent operations.

   Additionally, it implements tiered content security protection to
   prevent sensitive information leakage, applying data classification
   policies, context-aware filtering, and output sanitization based on
   sensitivity levels.

2.2.4.  Capabilities Monitoring and Management

   The Agent Name Service (ANS) enables real-time monitoring of agent
   reference, dynamically constructs a graph of agent relationships to
   visualize interaction patterns and dependencies across the domain,
   and supports proactive intervention in anomalous or unauthorized
   behaviors.

   The Agent Name Service (ANS) provides intelligent agent capability
   management by systematically evaluating and verifying the functional
   competencies, performance characteristics, and operational boundaries
   of registered agents.  This includes assessing declared capabilities,
   validating actual behavior through runtime evidence or sandboxed
   testing, and maintaining a trusted, up-to-date profile of each
   agent’s verified skills.  By ensuring that advertised capabilities
   accurately reflect real-world functionality, ANS enables reliable
   agent discovery, safe composition, and context-aware orchestration
   within dynamic multi-agent domains.

2.2.5.  Cross-domain synchronization

   The Agent Name Service (ANS) enables cross-domain collaboration among
   intelligent agents by securely synchronizing agent information.  In
   inter-domain scenarios, information synchronization mechanism needs
   to be done by designing as an agent information repository in ANS
   between different domains, and combining with the existing DNS
   mechanisms for cross-domain addressing and discovery of agents.

Fu, et al.                Expires 29 July 2026                  [Page 9]
Internet-Draft        Agent Communication Framework         January 2026

3.  Use Case

   *  Case 1: Home Broadband Service Installation

   In the scenario of handling home broadband service installation, we
   employ a collaborative system comprising 13 agents, including the
   Intent Recognition Agent, Domain-Specific Configuration Agent, Master
   Control Agent, Service Validation Agent etc.

   Phase 1: Service intent recognition

   Agent Used: Intent Recognition Agent; Master Control Agent of service
   installation

   Action: 1.Identify users' service installation requirements by the
   Intention Recognition Agent.  2.Automatically send the structured
   service intent to the Master Control Agent.

   Phase 2: Service Orchestration and Resource Allocation

   Agent Used: Master Control Agent of service installation; Service
   Orchestration and Resource Allocation Agent

   Action: 1.The Master Control Agent sends the service installation
   request to the Service Orchestration and Resource Allocation Agent,
   completes the planning of the service path and the evaluation and
   allocation of resources.  2.The Service Orchestration and Resource
   Allocation Agent feedback the service path and resource allocation
   plan back to the Master Control Agent.

   Phase 3: Data Preparation and Distribution

   Agent Used: Master Control Agent of service installation; Domain-
   Specific Configuration Agent

   Action: 1.The Service installation Master Control Agent initiates
   data preparation and configuration requests based on the plan.  2.The
   Domain-Specific Configuration Agent generates the systems
   corresponding configuration data and completes the automatic
   configuration of network elements (NEs) / network management systems.
   3.As the completion of the configuration, the results are
   automatically back to the Master Control Agent.

   Phase 4: Service Validation

   Agent Used: Master Control Agent of service installation; Domain-
   Specific Configuration Agent; Service Validation Agent

Fu, et al.                Expires 29 July 2026                 [Page 10]
Internet-Draft        Agent Communication Framework         January 2026

   Action: 1.The Master Control Agent triggers the automated service
   validation process.  2.The Service Validation Agent collaborates with
   the Domain-Specific Configuration Agent to query the data of
   configuration and status, and subsequently performs installation
   verification and validation.  3.The validation results are back to
   the Master Control Agent, forming a closed-loop validation cycle.

   Phase 5: Quality monitoring

   Agent Used: Installation and Maintenance Scheduling Agent

   Action: 1.The Installation and Maintenance Scheduling Agent performs
   continuous monitoring of customer services to ensure the quality of
   new installations.

   Phase 6: Customer feedback survey

   Agent Used: Personal Intelligent Assistant Agent

   Action: 1.The Personal Intelligent Assistant Agent schedules the
   installation/maintenance engineers for service follow-up and review.

   *  Case 2: Home Broadband Network Fault Diagnosis

   In the scenario of handling home broadband network fault diagnosis,
   we employ a collaborative system comprising 13 agents, including the
   Intent Recognition Agent, Preprocessing Agent, Single-Domain Root
   Cause Analysis Agent, Knowledge Q&A Agent, Fault Handling Agent etc.

   Phase 1: User Complaint Intent Recognition and Data Sensing

   Agent Used: Intent Recognition Agent; Preprocessing Agent

   Action: 1.Identify the type of user complaint by the Intention
   Recognition Agent.  2.Automatically trigger the data preprocessing
   function of the Preprocessing Agent based on the complaint type to
   collect key information such as user devices, alarms, and networks
   information.  3.Complete unified perception and aggregation of user-
   side data.

   Phase 2: Home Broadband Fault Complaint Handling

   Agent Used: MSingle-Domain Root Cause Analysis Agent; Perception Data
   Collection Agent; Knowledge Q&A Agent; Data Collection Agent

   Action: 1.The Single-Domain Root Cause Analysis Agent performs
   initial root cause analysis based on existing data.
   2.If information is insufficient, it triggers the data recollection

Fu, et al.                Expires 29 July 2026                 [Page 11]
Internet-Draft        Agent Communication Framework         January 2026

   mechanism of the Perception Data Collection Agent.  The Knowledge Q&A
   Agent guides the user to supplement key information.  The Data
   Collection Agent complements the missing data.  3. After multiple
   iterations, it outputs a most likely root cause, impact scope, and
   recommendations.

   Phase 3: Trouble Shooting

   Agent Used: Fault Handling Agent; Installation and Maintenance
   Scheduling Agent

   Action: 1.The Fault Handling Agent supports automatic fault recovery.
   2.If automatic repair fails, it triggers the Installation and
   Maintenance Scheduling Agent to generate the optimal dispatch plan
   based on the location and skills of the installation and maintenance
   engineers, as well as the urgency of the fault.

   Phase 4: Service Validation

   Agent Used: End-to-End Testing Agent

   Action: 1.The End-to-End Testing Agent initiates tests to ensure
   service consistency.

   Phase 5: Quality monitoring

   Agent Used: Installation and Maintenance Scheduling Agent

   Action: 1.The Installation and Maintenance Scheduling Agent performs
   continuous monitoring of customer services to to prevent recurring
   faults.

   Phase 6: Customer feedback survey

   Agent Used: Personal Intelligent Assistant Agent

   Action: 1.The Personal Intelligent Assistant Agent schedules the
   installation/maintenance engineers for service follow-up and review.

4.  Security Considerations

   TBD

5.  IANA Considerations

   This document has no IANA actions.

6.  Normative References

Fu, et al.                Expires 29 July 2026                 [Page 12]
Internet-Draft        Agent Communication Framework         January 2026

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

Acknowledgements

   TBD

Authors' Addresses

   Yu Fu
   China Telecom
   Beijing
   China
   Email: fuy44@chinatelecom.cn

   Qing Sun
   China Telecom
   Beijing
   China
   Email: sunqiong@chinatelecom.cn

   Xin Song
   China Telecom
   Beijing
   China
   Email: songx18@chinatelecom.cn

   Chongfeng Xie
   China Telecom
   Beijing
   China
   Email: xiechf@chinatelecom.cn

Fu, et al.                Expires 29 July 2026                 [Page 13]