Skip to main content

Agent Collaboration Protocols Architecture for Internet of Agents
draft-liu-dmsc-acps-arc-00

Document Type Active Internet-Draft (individual)
Authors Jun Liu , Ke Yu , Ke Li , Keliang Chen
Last updated 2026-01-14
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-liu-dmsc-acps-arc-00
DMSC Working Group                                                J. Liu
Internet-Draft                                                     K. Yu
Intended status: Informational                                     K. Li
Expires: 19 July 2026                                            K. Chen
                      Beijing University of Posts and Telecommunications
                                                         15 January 2026

   Agent Collaboration Protocols Architecture for Internet of Agents
                       draft-liu-dmsc-acps-arc-00

Abstract

   Internet of Agent (IoA) aims to facilitate interconnection and
   collaboration among heterogeneous agents to address complex tasks and
   support various applications.

   This IETF draft proposes the Agent Collaboration Protocols (ACPs)
   architecture, which outlines the key components and functionalities
   required for agent interoperability.  ACPs cover all stages of agents
   in the network, from their access to collaboration, including: Agent
   Trusted Registration (ATR), Agent Identity Authentication (AIA),
   Agent Discovery (ADP), Agent Interaction (AIP), Tool Invocation
   (TIP), and Agent Monitoring (AMP).  The long-term vision of ACPs is
   to support the future large-scale interconnected agents and construct
   the key infrastructure for IoA.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 19 July 2026.

Copyright Notice

   Copyright (c) 2026 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

Liu, et al.               Expires 19 July 2026                  [Page 1]
Internet-Draft              ACPs Architecture               January 2026

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   4
   3.  ACPs Architecture . . . . . . . . . . . . . . . . . . . . . .   4
   4.  Agent Trusted Registration (ATR)  . . . . . . . . . . . . . .   7
     4.1.  Basic Workflow of Agent Trusted Registration  . . . . . .   7
   5.  Agent Identity Authentication (AIA) . . . . . . . . . . . . .   8
     5.1.  Phase 1: Key Exchange . . . . . . . . . . . . . . . . . .   8
     5.2.  Phase 2: Server Parameters Transmission . . . . . . . . .   9
     5.3.  Phase 3: Authentication . . . . . . . . . . . . . . . . .   9
   6.  Agent Discovery (ADP) . . . . . . . . . . . . . . . . . . . .   9
     6.1.  Core Roles in Agent Discovery . . . . . . . . . . . . . .   9
     6.2.  Data Sources for Agent Discovery Servers  . . . . . . . .   9
       6.2.1.  Data Synchronization  . . . . . . . . . . . . . . . .  10
     6.3.  Basic Workflow of Agent Discovery . . . . . . . . . . . .  10
     6.4.  Different Agent Discovery Methods . . . . . . . . . . . .  11
   7.  Agent Interaction (AIP) . . . . . . . . . . . . . . . . . . .  11
     7.1.  Core Roles in Agent Interaction . . . . . . . . . . . . .  11
     7.2.  Interaction mode in AIP . . . . . . . . . . . . . . . . .  12
     7.3.  Messaging in AIP  . . . . . . . . . . . . . . . . . . . .  12
   8.  Tool Invocation (TIP) . . . . . . . . . . . . . . . . . . . .  13
     8.1.  Core Roles in Tool Inbocation . . . . . . . . . . . . . .  13
     8.2.  Basic Workflow of Tool Invocation . . . . . . . . . . . .  13
   9.  Agent Monitoring (AMP)  . . . . . . . . . . . . . . . . . . .  14
     9.1.  Log File Categories . . . . . . . . . . . . . . . . . . .  14
     9.2.  Log Collection and Storage  . . . . . . . . . . . . . . .  15
     9.3.  The Use of Logs . . . . . . . . . . . . . . . . . . . . .  15
   10. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . .  16
   11. Conventions and Definitions . . . . . . . . . . . . . . . . .  16
   12. Security Considerations . . . . . . . . . . . . . . . . . . .  16
   13. IANA Considerations . . . . . . . . . . . . . . . . . . . . .  16
   14. References  . . . . . . . . . . . . . . . . . . . . . . . . .  16
     14.1.  Normative References . . . . . . . . . . . . . . . . . .  16
     14.2.  Informative References . . . . . . . . . . . . . . . . .  17
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  17

Liu, et al.               Expires 19 July 2026                  [Page 2]
Internet-Draft              ACPs Architecture               January 2026

1.  Introduction

   With the rapid development of artificial intelligence (AI),
   particularly large language model (LLM) technology, the number of AI
   agents has grown dramatically.  With the capability of autonomous
   perception, decision-making, and execution, agents' applications are
   becoming increasingly widespread.

   To overcome the limitations of single-agent systems, and to break
   free from the constraints of proprietary multi-agent frameworks
   developed by various vendors, the Internet of Agents (IoA) has
   emerged.  IoA aims to enable seamless connectivity and efficient
   collaboration among agents, through standardized communication
   protocols and interfaces.

   This draft proposes the Agent Collaboration Protocols (ACPs)
   [ACPs-Github], which is a standardized protocol suite for IoA to
   enable wide-area connectivity, cross-domain interoperability, and
   secure collaboration among heterogeneous agents.  The main
   characteristics of ACPs are as follows:

   *  Multi-centralized architecture, which consists of multiple
      autonomous domains, each domain containing its own management
      nodes (such as registration, authentication, and discovery
      servers), to support efficient, reliable, and manageable large-
      scale agent interconnection scenarios.

   *  Standardized communication mechanisms with peer to peer and
      grouping mode, allowing agents to self-organize and negotiate
      autonomously, to facilitate rapid and accurate information
      exchange, as well as efficient task Collaboration.

   *  Robust registration and authentication mechanisms, to ensure the
      trusted access of agents and prevent unauthorized access and data
      breaches.

   *  Reliable registration and management of agent capability, along
      with intra-domain and cross-domain discovery based on capability
      matching, to support universal and efficient discovery of
      collaborative agents.

   *  Real-time monitoring of agent status and behavior, to support more
      complex application requirements such as agent auditing and
      transactions.

   ACPs cover all stages of agents in the IoA, from their access to
   collaboration, to construct the key infrastructure for agent
   communication, task collaboration and resource allocation.

Liu, et al.               Expires 19 July 2026                  [Page 3]
Internet-Draft              ACPs Architecture               January 2026

2.  Terminology

   Agent:An agent is a software or hardware entity with autonomous
   decision-making and execution capabilities, capable of perceiving the
   environment, acquiring contextual information, reasoning, and
   learning.  Agent can independently or collaboratively with other
   agents to perform tasks.  Each agent is created by a specific agent
   provider and needs to complete processes such as registration and
   authentication before providing services to obtain a legitimate
   identity and relevant credentials.

   Agent Identity Code (AIC): AIC is a certifiable, globally unique
   identity that represents the identity of an agent.  AIC MAY contain
   the following infomation: the registration service center, the agent
   provider, the serial number of agent entity and instance, and the
   check code.

   Agent Capability Specification (ACS): ACS is a detailed description
   of an agent's capabilities and information that can be saved and
   retrieved.  ACS MAY use the JSON [RFC8259] format, typically
   including the following information: AIC, the functional capabilities
   of agent, the technical characteristics, and the service interfaces.

   Agent Registration Server (ARS): ARS is a service entity recognized
   by consensus, responsible for the registration of agents, the
   distribution of AICs, and the maintenance of the agent's availability
   status.

   Certificate Authority Server (CAS): CAS is a service entity that is
   responsible for verifying the detailed information of agents and
   issuing, managing agent certificates, establishing communication
   identity trust.

   Agent Discovery Server (ADS): ADS is a service entity responsible for
   discovering available collaborative intelligent agents for specific
   task requirement.

   Agent Autonomous Domain: Agent Autonomous Domain is a collaborative
   network domain organized and managed by specific IoA service
   provider.  It may include multiple different entities, such as ARS,
   CAS, ADS, and agents.

3.  ACPs Architecture

   Agent Collaboration Protocols (ACPs) is a standardized protocol suite
   for IoA, which consists of the following protocols built on HTTPS:

Liu, et al.               Expires 19 July 2026                  [Page 4]
Internet-Draft              ACPs Architecture               January 2026

   (1) Agent Trusted Registration (ATR) protocol: Defines the
   requirements and process for agents to register with a registration
   service provider.

   (2) Agent Identity Authentication (AIA) protocol: Defines the
   mechanisms for agents to obtain digital identity credentials and
   perform authentication during communication.

   (3) Agent Discovery Protocol (ADP): Defines the mechanisms for agents
   to discover potential collaboration partners in an open environment,
   including query formats, matching processes, and result feedback.

   (4) Agent Interaction Protocol (AIP): Defines the communication
   protocol for agents to establish sessions and exchange messages,
   serving as the core communication layer of ACPs.

   (5) Tool Invocation Protocol (TIP): Provides a standard way for
   agents to invoke external tools or services.

   (6) Agent Monitoring Protocol (AMP): Provides a framework for
   monitoring and measuring agent behavior and performance.

     APPLICATION LAYER
     +-------------------------------------------------------------+
     |              Agent Collaboration Protocols (ACPs)           |
     |                                                             |
     |   Control Sublayer:      +-------+   +-------+   +-------+  |
     |                          |  ADP  |   |  AIP  |   |  AMP  |  |
     |                          +-------+   +-------+   +-------+  |
     |                                                             |
     |   --------------------------------------------------------- |
     |                                                             |
     |   Interaction Sublayer:  +-------+   +-------+   +-------+  |
     |                          |  ADP  |   |  AIP  |   |  TIP  |  |
     |                          +-------+   +-------+   +-------+  |
     +-------------------------------------------------------------+
     |          HTTP               HTTPS                DNS        |
     +-------------------------------------------------------------+

     TRANSPORT LAYER
     +-------------------------------------------------------------+
     |                  TCP                  UDP                   |
     +-------------------------------------------------------------+

     INTERNET LAYER
     +-------------------------------------------------------------+
     |                  IPv4                 IPv6                  |
     +-------------------------------------------------------------+

Liu, et al.               Expires 19 July 2026                  [Page 5]
Internet-Draft              ACPs Architecture               January 2026

                       Figure 1: ACPs Protocol Stack

   The ACPs-based Internet of Agents consists of multiple autonomous
   domains, each domain containing registration, authentication, and
   discovery servers, as well as agents.  The overall architecture is as
   follows.

   +------------------------------+     +------------------------------+
   |     Autonomous Domain 1      |     |     Autonomous Domain 2      |
   |  +------+         +------+   |     |    +------+         +------+ |
   |  | ARS1 | <-----> | CAS1 |   |     |    | CAS2 | <-----> | ARS2 | |
   |  +------+         +------+   |     |    +------+         +------+ |
   |     ^                        |     |                         ^    |
   |     |ATR                     |     |                         |ATR |
   |     v                        |     |                         v    |
   |  +------+  ADP   +------+    |     |    +------+   ADP  +------+  |
   |  | PAA1 | <----> | ADS1 | <--+-----+--> | ADS2 | <----> | PAA2 |  |
   |  +------+        +------+    |     |    +------+        +------+  |
   |    |   AIP,AIA   +--------+  |     |  +--------+   AIP,AIA  |     |
   |    |-----------> | Agent1 |  |     |  | Agent3 | <----------|     |
   |    |             +--------+  |     |  +--------+            |     |
   |    |   AIP,AIA   +--------+  |     |  +--------+   AIP,AIA  |     |
   |    |-----------> | Agent2 |  |     |  | Agent4 | <----------|     |
   |    |             +--------+  |     |  +--------+            |     |
   |    |   AIP,AIA   +---------+ |     |  +--------+   AIP,AIA  |     |
   |    |-----------> |ToolAgent| |     |  | Agent5 | <----------|     |
   |    |             +---------+ |     |  +--------+            |     |
   |    |                   ^     |     |                        |     |
   |    |AMP             TIP|     |     |                     AMP|     |
   |    v                   v     |     |                        v     |
   |  +-------+        +-------+  |     |                   +-------+  |
   |  | Logs  |        | Tools |  |     |                   | Logs  |  |
   |  +-------+        +-------+  |     |                   +-------+  |
   +------------------------------+     +------------------------------+

   Legend:
     ARS  = Agent Registration Server
     CAS  = Certificate Authority Server
     ADS  = Agent Discovery Server
     PAA  = Personal Assistant Agent
     ATR  = Agent Trusted Registration
     AIA  = Agent Identity Authentication
     ADP  = Agent Discovery Protocol
     AIP  = Agent Interaction Protocol
     TIP  = Tool Invocation Protocol
     AMP  = Agent Monitoring Protocol

Liu, et al.               Expires 19 July 2026                  [Page 6]
Internet-Draft              ACPs Architecture               January 2026

                        Figure 2: ACPs Architecture

   The ACPs-based IoA operates based on the following fundamental rules:

   (1) All agents are required to follow the ATR to register with the
   Trusted Agent Registry Server.

   (2) An agent must comply with AIA verification to ensure the
   reliability of the collaborator's identity before collaboration.

   (3) When a user proposes a task request, the personal assistant agent
   decomposes the task and queries the ADS, in accordance with the ADP,
   to identify collaborative agents whose capabilities match the task
   requirements.

   (4) Agents follow AIP to form agent collaboration networks to
   complete complex tasks.  When an external tool is needed, Agent
   contacts the tool agengt and invokes the appropriate tool.

4.  Agent Trusted Registration (ATR)

   The IoA should be a safe and reliable agent ecosystem, and the agents
   running in it with the ability to perform tasks independently should
   be reliable entities.  To achieve this, each agent should have the
   following two necessary conditions:

   *  Obtain a globally unique identity from the ARS, which is an AIC.

   *  Obtain a digital certificate from the CAS designated by the ARS
      that can be used for authentication, called a Certificate of Agent
      Identity (CAI).

   Each agent should have a unique AIC from the ARS on which the agent
   first registered.  In the IoA, there can be multiple ARS, each of
   which should be a service entity that has been recognized by
   consensus (e.g., certified by a governing body).  Each agent can
   choose a different ARS to register with and receive an assigned AIC
   based on their needs.

   After the agent obtains the AIC, it also needs to obtain the CAI from
   the CAS.  In the IoA, there can be multiple CAS, and each CAS should
   be a service entity recognized by consensus (such as certification by
   a management agency).

4.1.  Basic Workflow of Agent Trusted Registration

   The basic workflow of agent trusted registration includes the
   following steps:

Liu, et al.               Expires 19 July 2026                  [Page 7]
Internet-Draft              ACPs Architecture               January 2026

   (1) The agent provider sends a registration request to the ARS to
   register the agent, which must include all or part of the ACS
   information.  Apply for AIC;

   (2) The ARS manually reviews the content of the registration request;

   (3) After the ARS approves the approval, the agent is assigned an
   AIC;

   (4) The agent provider applies for an CAI from CAS, and the request
   must be accompanied by an AIC;

   (5) CAS requests the ARS to obtain the agent's details based on the
   AIC;

   (6) The ARS returns the agent details to the CAS based on the AIC;

   (7) CAS reconciles the agent details;

   (8) The CAS issues an ACME HTTP-01 challenge to the agent provider
   for domain validation and issues a CAI upon successful verification.

5.  Agent Identity Authentication (AIA)

   In the basic workflow of agent trusted registration, agent get the
   necessary AIC and CAI.

   Agent Identity Authentication supports multiple security protocols.
   TLS 1.3 mutual TLS (mTLS) [RFC8446] is recommended.  In this process,
   the connection-initiating agent acts as the TLS client, while the
   receiving agent serves as the TLS server.  The mutual TLS handshake
   comprises three phases: Key Exchange, Server Parameters, and
   Authentication.  All communications beyond the key exchange phase are
   encrypted.

5.1.  Phase 1: Key Exchange

   (1) Client sends ClientHello message with supported cipher suites and
   ephemeral public key;

   (2) Server responds with ServerHello message, selecting cipher suites
   and returning ephemeral public key;

   (3) Both parties derive a pre-master secret using ECDHE with the
   peer's ephemeral public key and their own ephemeral private key, then
   generate session keys and handshake keys via HKDF.  All subsequent
   messages are encrypted;

Liu, et al.               Expires 19 July 2026                  [Page 8]
Internet-Draft              ACPs Architecture               January 2026

5.2.  Phase 2: Server Parameters Transmission

   (4) Server transmits CertificateRequest (requesting client
   certificate) and Encrypted Extensions messages;

5.3.  Phase 3: Authentication

   (5) Server sends CAI, CertificateVerify (signing all previous
   handshake messages hash using signature algorithm from ClientHello's
   signature_algorithms extension and server's private key), and
   Finished message;

   (6) Client sends CAI, CertificateVerify, and Finished message;

   (7) Both parties validate peer's CAI and CertificateVerify.

   (8) Upon successful mutual verification, encrypted data transfer
   begins.

6.  Agent Discovery (ADP)

   Agent discovery refers to the process of dynamically identifying and
   matching the functions and services provided by distributed agents
   according to the requirements of a user task.  Agent capability
   discovery enables dispersed agents to be efficiently searched and
   invoked.  It is the prerequisite and foundation for large-scale
   collaboration among agents.

6.1.  Core Roles in Agent Discovery

   *  Leader: Agent who issues tasks and organizes interactions.  Leader
      is the initiator of agent discovery requests.

   *  Partner: Agent who accepts tasks and provides services.

   *  Agent Discovery Server: Receives agent discovery requests and
      returns discovery results.  Each agent discovery server must
      establish and maintain mutual trust relationships with external
      discovery servers, maintain a trusted discovery server list, and
      perform agent discovery within the trusted scope.

6.2.  Data Sources for Agent Discovery Servers

   Agent discovery in the IoA relies on a multi-level agent discovery
   architecture.  Through synchronization mechanisms, it obtains
   authoritative registration data from Agent Registration Servers, to
   support capability-based search, matching, and decision-making.

Liu, et al.               Expires 19 July 2026                  [Page 9]
Internet-Draft              ACPs Architecture               January 2026

   An Agent Registration Server is responsible for the submission,
   verification, approval, revocation, and version management of agent
   identities, to ensure data integrity, legitimacy, and consistency.
   It also maintains the agent’s AIC and version history as the reliable
   baseline for discovery.  After obtaining registration data, the
   discovery server stores it in a local database and builds customized
   indexes to enable efficient handling of discovery requests.  A
   discovery server may synchronize with multiple registration servers
   to support multi-source registration scenarios.

6.2.1.  Data Synchronization

   The primary data synchronization methods between discovery servers
   and registration/monitoring servers include:

   *  Full Snapshot: Used to obtain a complete data view for
      initialization or reconstruction when starting up for the first
      time, when data is lost, or when consistency is compromised;

   *  Incremental Changes: Used after synchronization becomes stable to
      continuously synchronize newly added or updated data at low cost,
      to maintain nearly real-time consistency;

   *  Active Push: For stricter timeliness requirements, the data
      provider may proactively push changes instead.

   Note that the discovery server may obtain operational status data
   from agent monitoring related servers, which will be elaborated in
   Section 9.  They may use the same data synchronization mechanism.

6.3.  Basic Workflow of Agent Discovery

   The basic workflow of agent discovery includes the following steps:

   (1) The Leader receives a user task and analyzes it to determine the
   required capabilities (skills) of Partners;

   (2) The Leader sends an agent discovery request to the Agent
   Discovery Server, where the request contains explicit query
   information or constrained query conditions;

   (3) The Agent Discovery Server matches the query conditions with the
   available agent descriptions;

   (4) The Agent Discovery Server returns a list of candidate agents
   that satisfy the requirements to the Leader;

Liu, et al.               Expires 19 July 2026                 [Page 10]
Internet-Draft              ACPs Architecture               January 2026

   (5) The Leader selects Partners from the candidate list according to
   its own strategy, performs identity verification, and collaborates
   with them to complete the task.

6.4.  Different Agent Discovery Methods

   *  In-Domain Discovery: Upon receiving a discovery request, the
      discovery server performs matching, ranking, and filtering of
      available Partners within the local domain; if the Leader’s
      requirements are met, it directly returns the candidate list of
      serving agents.

   *  Cross-Domain Discovery: Discovery servers across multiple
      autonomous domains can establish connections based on trust
      relationships between agent providers.  If the discovery request
      for an agent cannot be fulfilled within one autonomous domain, the
      discovery server in one domain may forward the discovery request
      to the discovery servers in the neighboring domain.  If the
      neighboring discovery server locates a suitable agent, it returns
      a discovery response.

   There are two cross-domain discover mechanisms: the chained
   forwarding and the aggregated forwarding.  For the chained
   forwarding, the discovery request is forwarded hop-by-hop along a
   trusted chain, and the continued forwarding process is constrained by
   a maximum hop count limit.  For the aggregated forwarding, the
   upstream discovery server can select multiple downstream discovery
   servers from the trusted list to initiate parallel discovery
   requests, and the continued forwarding process is constrained by a
   maximum participant limit.  During agent discovery, each discovery
   server must ensure that the forwarding depth or parallel fanout do
   not exceed the configured limits.  The AICs of all discovery servers
   along the route must be recorded, to ensure that the discovery
   results are trustworthy and that the discovery process is
   controllable and traceable.

7.  Agent Interaction (AIP)

   In the Internet of Agents, agents may form different collaborative
   networks under various task scenarios.  To ensure that agents can
   communicate safely and effectively across different scenarios, AIP
   defines standardized mechanisms and processes to promote deep
   collaboration between agents.

7.1.  Core Roles in Agent Interaction

   In AIP, the interaction between agents are task-driven, based on
   which agents can be divided into two roles:

Liu, et al.               Expires 19 July 2026                 [Page 11]
Internet-Draft              ACPs Architecture               January 2026

   *  Leader: Agent who issues tasks and organizes interactions.  There
      should only be one Leader in a complete task execution process.

   *  Partner: Agent who accepts tasks and provides services.  After
      Partner receives a task from the Leader, it executes and returns
      the execution result.

7.2.  Interaction mode in AIP

   In AIP, there are three interaction modes between the Leader and the
   Partner: peer to peer mode, grouping mode and hybrid mode.

   *  Peer to peer mode: In this mode, the Leader maintains separate
      communication connections with each Partner, ensuring context
      isolation.  Each message in this mode has only one sender and
      receiver.

   *  Grouping mode: In this mode, interaction messages between agents
      are distributed through a message queue.  Message in this mode has
      only one sender but may has multiple receivers.

   *  Hybrid mode: In this mode, the Leader and Partner may interact
      directly or through the message queue according to the Leader's
      task planning.

   Agents in the existing agent collaboration network can interact with
   other agents as Leaders through the interaction mode defined in AIP
   to introduce them into the agent domain, forming a more complex agent
   collaboration network.

7.3.  Messaging in AIP

   Messaging in AIP includes three types: RPC, streaming, and
   notification.

   *  RPC: For instant scenarios like synchronous messages, managing
      task states, or performing actions requiring immediate responses.

   *  Streaming: For scenarios such as chunking large files, real-time
      log pushes, or long-running data transfer operations.

   *  Notification: Event-driven asynchronous callback methods for
      agents to send notifications to other agents when specific
      conditions are met.

Liu, et al.               Expires 19 July 2026                 [Page 12]
Internet-Draft              ACPs Architecture               January 2026

8.  Tool Invocation (TIP)

   In the Internet of Agents, to accomplish users' complex tasks, agent
   collaboration often involves calling external tools and accessing
   external data.  TIP provides a standardized interface for agents to
   call tools, enabling different agents to use various external tools
   or services through a unified method.

8.1.  Core Roles in Tool Inbocation

   TIP follows a client-host-server architecture:

   *  Tool Agent (TA): Tool Agent is the agent that uses the TIP to call
      tool, which usually acts as a Partner to interact with the Leader
      through AIP, and autonomously planning to call tools to complete
      the tasks published by the Leader.

   *  TIP Host: The TIP Host process is typically created and managed by
      the Tool Agent, serving as a container and coordinator for TIP
      Clients, and managing cross-client context aggregation.

   *  TIP Client: Each TIP Client maintains an isolated TIP Server
      connection, handle protocol negotiation and feature exchange
      between both parties, and send requests to the TIP Server to use
      its corresponding features.

   *  TIP Server: The TIP Server provides specialized context and
      functionality, exposing tools through TIP primitives, which call
      tools based on received requests and return execution results.

8.2.  Basic Workflow of Tool Invocation

   The basic workflow of tool invocation includes the following steps:

   (1) Tool Agent creates a connection between TIP Client and TIP
   Server;

   (2) Tool Agent autonomously discovers available tools and invokes
   them as needed;

   (3) Tool Agent proactively disconnects from the TIP Server once the
   desired result is obtained and it is confirmed that no further tool
   calls are needed.

Liu, et al.               Expires 19 July 2026                 [Page 13]
Internet-Draft              ACPs Architecture               January 2026

9.  Agent Monitoring (AMP)

   To ensure that agents’ status information can be aggregated in real
   time and distributed in an orderly manner under a unified
   specification, AMP adopts log files as the data carrier for agents’
   states and behaviors.  Through standardized mechanisms for log
   collection and storage, it enables centralized retention and
   controlled distribution of agent information, thereby providing agent
   registration servers, discovery servers, and other agents with
   capabilities for status querying and traceability.

9.1.  Log File Categories

   The raw log data is generated by agents.  Logs include the following
   types, and different types of logs are stored in different files:

   *  Heartbeat Logs: Periodically record an agent’s operational status
      and health condition.  The core purpose of heartbeat logs is to
      express the fact that “the agent is still alive.” They are
      typically generated at a fixed interval (e.g., every 10 to 60
      seconds) and usually contain only lightweight information such as
      status indicators and brief metric summaries.

   *  Metrics Logs: Record an agent’s performance metrics and resource
      utilization, focusing on “how the agent is performing,” presented
      in structured numerical form.  Typical contents include task queue
      status, latency percentiles (P50/P90/P99), and CPU/memory/disk/
      network utilization.

   *  Access Logs: Record every interaction between an agent and
      external systems, including requests, responses, errors, debugging
      information, and tracing data.  Access logs are “generalized
      interaction logs,” covering traditional request logs, error logs,
      debug logs, and distributed tracing logs.

   *  Message Logs: Record sending and receiving behaviors of an agent
      through messaging channels (queues, topics, streams), focusing on
      reliable delivery, ordering, and retry status in message-driven
      architectures.  They help diagnose issues such as message
      backlogs, out-of-order delivery, and duplicate delivery.

Liu, et al.               Expires 19 July 2026                 [Page 14]
Internet-Draft              ACPs Architecture               January 2026

   *  Auditing Logs: Record security-related operations and access
      activities of an agent.  Auditing logs serve security compliance
      and post-incident forensics needs, typically including fields such
      as operator, target, operation type, and operation result.
      Auditing logs usually have a long retention period (depending on
      regulatory requirements) and impose high requirements on integrity
      and tamper resistance.  Transaction logs of billing systems can
      also be categorized as a special form of auditing logs.

   *  System Logs: Record status information of the agent runtime
      environment and related services.  System logs help diagnose
      issues in the agent runtime environment, and are typically used
      together with access logs and metrics logs to provide a
      comprehensive troubleshooting perspective.

9.2.  Log Collection and Storage

   Log Collection Layer: Various logs (heartbeat, access, metrics,
   audit, message, system, etc.) are written by agents into local log
   files by type.  After necessary steps such as parsing, filtering, and
   labeling, this layer delivers logs by type to the log storage layer
   in a reliable and controllable manner.

   Log Storage Layer: This layer provides unified storage for different
   log information from different agents.  According to the structural
   characteristics, access patterns, and lifecycle requirements of
   different log types, it provides differentiated storage solutions,
   and also supports index building and fast retrieval of log data,
   providing data support for subsequent monitoring analysis, alert
   triggering, and root-cause tracing.

   After logs are stored, they can be read and processed on demand by
   different analysis and application systems for querying and
   aggregation analysis, operational monitoring and alerting, fault
   localization and root-cause tracing, security auditing and compliance
   retention, and unified presentation of key conclusions via reports or
   visualization, thereby supporting a continuous monitoring and
   governance closed loop.

9.3.  The Use of Logs

   Logs are the most fundamental and most trustworthy “source of truth”
   for an agent monitoring system.  The monitoring systems continuously
   collect and reliably store, by type, the status changes, request
   interactions, key metrics, exception information, and audit records
   generated during agent operation, and then distribute them in a
   controlled manner to different entities for processing and analysis.

Liu, et al.               Expires 19 July 2026                 [Page 15]
Internet-Draft              ACPs Architecture               January 2026

   Logs can provide long-term data foundations for agent auditing, agent
   transaction, as well as network performance optimization.  The IoA
   can achieve operational observability, alerting and diagnosis,
   tracing and accountability, security and compliance assurance.

10.  Conclusions

   This draft introduces the Agent Collaboration Protocols (ACPs)
   architecture for Internet of Agents.  By defining a comprehensive
   protocol suite, including trusted registration, identity
   authentication, agent discovery, agent interaction, tool invocation,
   and agent monitoring, the ACPs address the core requirements for
   interoperability and secure collaboration among heterogeneous agents.
   The long-term goal of the ACPs is to enable IoA to serve as the
   critical infrastructure for agent collaboration on complex tasks, as
   well as to support the future large-scale and diverse applications.

11.  Conventions and Definitions

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119] and
   [RFC8174].

12.  Security Considerations

   This document focuses on the Agent Collaboration Protocols
   architecture for IoA.  Security of IoA is not detailed in this
   document.  Security considerations relevant to deployment with
   multiple agent service providers are suggested to be deeply discussed
   through other proposals.

13.  IANA Considerations

   This document makes no request for IANA action.

14.  References

14.1.  Normative References

   [RFC8259]  Bray, T., Ed., "The JavaScript Object Notation (JSON) Data
              Interchange Format", STD 90, RFC 8259,
              DOI 10.17487/RFC8259, December 2017,
              <https://www.rfc-editor.org/info/rfc8259>.

   [RFC8446]  Rescorla, E., "The Transport Layer Security (TLS) Protocol
              Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018,
              <https://www.rfc-editor.org/info/rfc8446>.

Liu, et al.               Expires 19 July 2026                 [Page 16]
Internet-Draft              ACPs Architecture               January 2026

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

14.2.  Informative References

   [ACPs-Github]
              "ACPs GitHub repository", n.d.,
              <https://github.com/AIP-PUB>.

Authors' Addresses

   Jun Liu
   Beijing University of Posts and Telecommunications
   10 Xitucheng Road, Haidian District
   Beijing
   100876
   China
   Email: liujun@bupt.edu.cn

   Ke Yu
   Beijing University of Posts and Telecommunications
   10 Xitucheng Road, Haidian District
   Beijing
   100876
   China
   Email: yuke@bupt.edu.cn

   Ke Li
   Beijing University of Posts and Telecommunications
   10 Xitucheng Road, Haidian District
   Beijing
   100876
   China
   Email: like1990@bupt.edu.cn

Liu, et al.               Expires 19 July 2026                 [Page 17]
Internet-Draft              ACPs Architecture               January 2026

   Keliang Chen
   Beijing University of Posts and Telecommunications
   10 Xitucheng Road, Haidian District
   Beijing
   100876
   China
   Email: chenkl@bupt.edu.cn

Liu, et al.               Expires 19 July 2026                 [Page 18]