<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-liu-dmsc-acps-arc-01" category="info" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="ACPs Architecture">Agent Collaboration Protocols Architecture for Internet of Agents</title>
    <seriesInfo name="Internet-Draft" value="draft-liu-dmsc-acps-arc-01"/>
    <author fullname="Jun Liu">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <street>10 Xitucheng Road, Haidian District</street>
          <city>Beijing</city>
          <code>100876</code>
          <country>China</country>
        </postal>
        <email>liujun@bupt.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Yu">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <street>10 Xitucheng Road, Haidian District</street>
          <city>Beijing</city>
          <code>100876</code>
          <country>China</country>
        </postal>
        <email>yuke@bupt.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Li">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <street>10 Xitucheng Road, Haidian District</street>
          <city>Beijing</city>
          <code>100876</code>
          <country>China</country>
        </postal>
        <email>like1990@bupt.edu.cn</email>
      </address>
    </author>
    <author fullname="Keliang Chen">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <street>10 Xitucheng Road, Haidian District</street>
          <city>Beijing</city>
          <code>100876</code>
          <country>China</country>
        </postal>
        <email>chenkl@bupt.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="January" day="21"/>
    <workgroup>DMSC Working Group</workgroup>
    <keyword>Internet of Agents</keyword>
    <keyword>Agent Communication</keyword>
    <keyword>Task Collaboration</keyword>
    <abstract>
      <?line 63?>

<t>Internet of Agent (IoA) aims to facilitate interconnection and collaboration among heterogeneous agents to address complex tasks and support various applications.</t>
      <t>This IETF draft proposes the Agent Collaboration Protocols (ACPs) architecture, which outlines the key components and functionalities required for agent interoperability. ACPs cover all stages of agents in the network, from their access to collaboration, including: Agent Trusted Registration (ATR), Agent Identity Authentication (AIA), Agent Discovery (ADP), Agent Interaction (AIP), Tool Invocation (TIP), and Agent Monitoring (AMP). The long-term vision of ACPs is to support the future large-scale interconnected agents and construct the key infrastructure for IoA.</t>
    </abstract>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>With the rapid development of artificial intelligence (AI), particularly large language model (LLM) technology, the number of AI agents has grown dramatically. With the capability of autonomous perception, decision-making, and execution, agents' applications are becoming increasingly widespread.</t>
      <t>To overcome the limitations of single-agent systems, and to break free from the constraints of proprietary multi-agent frameworks developed by various vendors, the Internet of Agents (IoA) has emerged. IoA aims to enable seamless connectivity and efficient collaboration among agents, through standardized communication protocols and interfaces.</t>
      <t>This draft proposes the Agent Collaboration Protocols (ACPs) <xref target="ACPs-Github"/>, which is a standardized protocol suite for IoA to enable wide-area connectivity, cross-domain interoperability, and secure collaboration among heterogeneous agents. The main characteristics of ACPs are as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Multi-centralized architecture, which consists of multiple autonomous domains, each domain containing its own management nodes (such as registration, authentication, and discovery servers), to support efficient, reliable, and manageable large-scale agent interconnection scenarios.</t>
        </li>
        <li>
          <t>Standardized communication mechanisms with peer to peer and grouping mode, allowing agents to self-organize and negotiate autonomously, to facilitate rapid and accurate information exchange, as well as efficient task Collaboration.</t>
        </li>
        <li>
          <t>Robust registration and authentication mechanisms, to ensure the trusted access of agents and prevent unauthorized access and data breaches.</t>
        </li>
        <li>
          <t>Reliable registration and management of agent capability, along with intra-domain and cross-domain discovery based on capability matching, to support universal and efficient discovery of collaborative agents.</t>
        </li>
        <li>
          <t>Real-time monitoring of agent status and behavior, to support more complex application requirements such as agent auditing and transactions.</t>
        </li>
      </ul>
      <t>ACPs cover all stages of agents in the IoA, from their access to collaboration, to construct the key infrastructure for agent communication, task collaboration and resource allocation.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>Agent：An agent is a software or hardware entity with autonomous decision-making and execution capabilities, capable of perceiving the environment, acquiring contextual information, reasoning, and learning. Agent can independently or collaboratively with other agents to perform tasks. Each agent is created by a specific agent provider and needs to complete processes such as registration and authentication before providing services to obtain a legitimate identity and relevant credentials.</t>
      <t>Agent Identity Code (AIC): AIC is a certifiable, globally unique identity that represents the identity of an agent. AIC MAY contain the following infomation: the registration service center,  the agent provider, the serial number of agent entity and instance, and the check code.</t>
      <t>Agent Capability Specification (ACS): ACS is a detailed description of an agent's capabilities and information that can be saved and retrieved. ACS MAY use the JSON <xref target="RFC8259"/> format, typically including the following information: AIC, the functional capabilities of agent, the technical characteristics, and the service interfaces.</t>
      <t>Agent Registration Server (ARS): ARS is a service entity recognized by consensus, responsible for the registration of agents, the distribution of AICs, and the maintenance of the agent's availability status.</t>
      <t>Certificate Authority Server (CAS): CAS is a service entity that is responsible for verifying the detailed information of agents and issuing, managing agent certificates, establishing communication identity trust.</t>
      <t>Agent Discovery Server (ADS): ADS is a service entity responsible for discovering available collaborative intelligent agents for specific task requirement.</t>
      <t>Agent Autonomous Domain: Agent Autonomous Domain is a collaborative network domain organized and managed by specific IoA service provider. It may include multiple different entities, such as ARS, CAS, ADS, and agents.</t>
    </section>
    <section anchor="acps-architecture">
      <name>ACPs Architecture</name>
      <t>Agent Collaboration Protocols (ACPs) is a standardized protocol suite for IoA, which consists of the following protocols built on HTTPS:</t>
      <t>(1) Agent Trusted Registration (ATR) protocol: Defines the requirements and process for agents to register with a registration service provider.</t>
      <t>(2) Agent Identity Authentication (AIA) protocol: Defines the mechanisms for agents to obtain digital identity credentials and perform authentication during communication.</t>
      <t>(3) Agent Discovery Protocol (ADP): Defines the mechanisms for agents to discover potential collaboration partners in an open environment, including query formats, matching processes, and result feedback.</t>
      <t>(4) Agent Interaction Protocol (AIP): Defines the communication protocol for agents to establish sessions and exchange messages, serving as the core communication layer of ACPs.</t>
      <t>(5) Tool Invocation Protocol (TIP): Provides a standard way for agents to invoke external tools or services.</t>
      <t>(6) Agent Monitoring Protocol (AMP): Provides a framework for monitoring and measuring agent behavior and performance.</t>
      <figure anchor="fig-acps-stack">
        <name>ACPs Protocol Stack</name>
        <artwork><![CDATA[
  APPLICATION LAYER
  +-------------------------------------------------------------+
  |              Agent Collaboration Protocols (ACPs)           |
  |                                                             |
  |   Control Sublayer:      +-------+   +-------+   +-------+  |
  |                          |  ATR  |   |  AIA  |   |  AMP  |  |
  |                          +-------+   +-------+   +-------+  |
  |                                                             |
  |   --------------------------------------------------------- |
  |                                                             |
  |   Interaction Sublayer:  +-------+   +-------+   +-------+  |
  |                          |  ADP  |   |  AIP  |   |  TIP  |  |
  |                          +-------+   +-------+   +-------+  |
  +-------------------------------------------------------------+
  |          HTTP               HTTPS                DNS        |
  +-------------------------------------------------------------+

  TRANSPORT LAYER
  +-------------------------------------------------------------+
  |                  TCP                  UDP                   |
  +-------------------------------------------------------------+

  INTERNET LAYER
  +-------------------------------------------------------------+
  |                  IPv4                 IPv6                  |
  +-------------------------------------------------------------+
]]></artwork>
      </figure>
      <t>The ACPs-based Internet of Agents consists of multiple autonomous domains, each domain containing registration, authentication, and discovery servers, as well as agents. The overall architecture is as follows.</t>
      <figure anchor="fig-acps-arch">
        <name>ACPs Architecture</name>
        <artwork><![CDATA[
+------------------------------+     +------------------------------+
|     Autonomous Domain 1      |     |     Autonomous Domain 2      |
|  +------+         +------+   |     |    +------+         +------+ |
|  | ARS1 | <-----> | CAS1 |   |     |    | CAS2 | <-----> | ARS2 | |
|  +------+         +------+   |     |    +------+         +------+ |
|     ^                        |     |                         ^    |
|     |ATR                     |     |                         |ATR |
|     v                        |     |                         v    |
|  +------+  ADP   +------+    |     |    +------+   ADP  +------+  |
|  | PAA1 | <----> | ADS1 | <--+-----+--> | ADS2 | <----> | PAA2 |  |
|  +------+        +------+    |     |    +------+        +------+  |
|    |   AIP,AIA   +--------+  |     |  +--------+   AIP,AIA  |     |
|    |-----------> | Agent1 |  |     |  | Agent3 | <----------|     |
|    |             +--------+  |     |  +--------+            |     |
|    |   AIP,AIA   +--------+  |     |  +--------+   AIP,AIA  |     |
|    |-----------> | Agent2 |  |     |  | Agent4 | <----------|     |
|    |             +--------+  |     |  +--------+            |     |
|    |   AIP,AIA   +---------+ |     |  +--------+   AIP,AIA  |     |
|    |-----------> |ToolAgent| |     |  | Agent5 | <----------|     |
|    |             +---------+ |     |  +--------+            |     |
|    |                   ^     |     |                        |     |
|    |AMP             TIP|     |     |                     AMP|     |
|    v                   v     |     |                        v     | 
|  +-------+        +-------+  |     |                   +-------+  |
|  | Logs  |        | Tools |  |     |                   | Logs  |  |
|  +-------+        +-------+  |     |                   +-------+  |
+------------------------------+     +------------------------------+



Legend:
  ARS  = Agent Registration Server
  CAS  = Certificate Authority Server
  ADS  = Agent Discovery Server
  PAA  = Personal Assistant Agent
  ATR  = Agent Trusted Registration
  AIA  = Agent Identity Authentication
  ADP  = Agent Discovery Protocol
  AIP  = Agent Interaction Protocol
  TIP  = Tool Invocation Protocol
  AMP  = Agent Monitoring Protocol
]]></artwork>
      </figure>
      <t>The ACPs-based IoA operates based on the following fundamental rules:</t>
      <t>(1) All agents are required to follow the ATR to register with the Trusted Agent Registry Server.</t>
      <t>(2) An agent must comply with AIA verification to ensure the reliability of the collaborator's identity before collaboration.</t>
      <t>(3) When a user proposes a task request, the personal assistant agent decomposes the task and queries the ADS, in accordance with the ADP, to identify collaborative agents whose capabilities match the task requirements.</t>
      <t>(4) Agents follow AIP to form agent collaboration networks to complete complex tasks. When an external tool is needed, Agent contacts the tool agengt and invokes the appropriate tool.</t>
    </section>
    <section anchor="agent-trusted-registration-atr">
      <name>Agent Trusted Registration (ATR)</name>
      <t>The IoA should be a safe and reliable agent ecosystem, and the agents running in it with the ability to perform tasks independently should be reliable entities. To achieve this, each agent should have the following two necessary conditions:</t>
      <ul spacing="normal">
        <li>
          <t>Obtain a globally unique identity from the ARS, which is an AIC.</t>
        </li>
        <li>
          <t>Obtain a digital certificate from the CAS designated by the ARS that can be used for authentication, called a Certificate of Agent Identity (CAI).</t>
        </li>
      </ul>
      <t>Each agent should have a unique AIC from the ARS on which the agent first registered. In the IoA, there can be multiple ARS, each of which should be a service entity that has been recognized by consensus (e.g., certified by a governing body). Each agent can choose a different ARS to register with and receive an assigned AIC based on their needs.</t>
      <t>After the agent obtains the AIC, it also needs to obtain the CAI from the CAS. In the IoA, there can be multiple CAS, and each CAS should be a service entity recognized by consensus (such as certification by a management agency).</t>
      <section anchor="basic-workflow-of-agent-trusted-registration">
        <name>Basic Workflow of Agent Trusted Registration</name>
        <t>The basic workflow of agent trusted registration includes the following steps:</t>
        <t>(1) The agent provider sends a registration request to the ARS to register the agent, which must include all or part of the ACS information. Apply for AIC;</t>
        <t>(2) The ARS manually reviews the content of the registration request;</t>
        <t>(3) After the ARS approves the approval, the agent is assigned an AIC;</t>
        <t>(4) The agent provider applies for an CAI from CAS, and the request must be accompanied by an AIC;</t>
        <t>(5) CAS requests the ARS to obtain the agent's details based on the AIC;</t>
        <t>(6) The ARS returns the agent details to the CAS based on the AIC;</t>
        <t>(7) CAS reconciles the agent details;</t>
        <t>(8) The CAS issues an ACME HTTP-01 challenge to the agent provider for domain validation and issues a CAI upon successful verification.</t>
      </section>
    </section>
    <section anchor="agent-identity-authentication-aia">
      <name>Agent Identity Authentication (AIA)</name>
      <t>In the basic workflow of agent trusted registration, agent get the necessary AIC and CAI.</t>
      <t>Agent Identity Authentication supports multiple security protocols. TLS 1.3 mutual TLS (mTLS) <xref target="RFC8446"/> is recommended. In this process, the connection-initiating agent acts as the TLS client, while the receiving agent serves as the TLS server. The mutual TLS handshake comprises three phases: Key Exchange, Server Parameters, and Authentication. All communications beyond the key exchange phase are encrypted.</t>
      <section anchor="phase-1-key-exchange">
        <name>Phase 1: Key Exchange</name>
        <t>(1) Client sends ClientHello message with supported cipher suites and ephemeral public key;</t>
        <t>(2) Server responds with ServerHello message, selecting cipher suites and returning ephemeral public key;</t>
        <t>(3) Both parties derive a pre-master secret using ECDHE with the peer's ephemeral public key and their own ephemeral private key, then generate session keys and handshake keys via HKDF. All subsequent messages are encrypted;</t>
      </section>
      <section anchor="phase-2-server-parameters-transmission">
        <name>Phase 2: Server Parameters Transmission</name>
        <t>(4) Server transmits CertificateRequest (requesting client certificate) and Encrypted Extensions messages;</t>
      </section>
      <section anchor="phase-3-authentication">
        <name>Phase 3: Authentication</name>
        <t>(5) Server sends CAI, CertificateVerify (signing all previous handshake messages hash using signature algorithm from ClientHello's signature_algorithms extension and server's private key), and Finished message;</t>
        <t>(6) Client sends CAI, CertificateVerify, and Finished message;</t>
        <t>(7) Both parties validate peer's CAI and CertificateVerify.</t>
        <t>(8) Upon successful mutual verification, encrypted data transfer begins.</t>
      </section>
    </section>
    <section anchor="agent-discovery-adp">
      <name>Agent Discovery (ADP)</name>
      <t>Agent discovery refers to the process of dynamically identifying and matching the functions and services provided by distributed agents according to the requirements of a user task. Agent capability discovery enables dispersed agents to be efficiently searched and invoked. It is the prerequisite and foundation for large-scale collaboration among agents.</t>
      <section anchor="core-roles-in-agent-discovery">
        <name>Core Roles in Agent Discovery</name>
        <ul spacing="normal">
          <li>
            <t>Leader: Agent who issues tasks and organizes interactions. Leader is the initiator of agent discovery requests.</t>
          </li>
          <li>
            <t>Partner: Agent who accepts tasks and provides services.</t>
          </li>
          <li>
            <t>Agent Discovery Server: Receives agent discovery requests and returns discovery results. Each agent discovery server must establish and maintain mutual trust relationships with external discovery servers, maintain a trusted discovery server list, and perform agent discovery within the trusted scope.</t>
          </li>
        </ul>
      </section>
      <section anchor="data-sources-for-agent-discovery-servers">
        <name>Data Sources for Agent Discovery Servers</name>
        <t>Agent discovery in the IoA relies on a multi-level agent discovery architecture. Through synchronization mechanisms, it obtains authoritative registration data from Agent Registration Servers, to support capability-based search, matching, and decision-making.</t>
        <t>An Agent Registration Server is responsible for the submission, verification, approval, revocation, and version management of agent identities, to ensure data integrity, legitimacy, and consistency. It also maintains the agent’s AIC and version history as the reliable baseline for discovery. After obtaining registration data, the discovery server stores it in a local database and builds customized indexes to enable efficient handling of discovery requests. A discovery server may synchronize with multiple registration servers to support multi-source registration scenarios.</t>
        <section anchor="data-synchronization">
          <name>Data Synchronization</name>
          <t>The primary data synchronization methods between discovery servers and registration/monitoring servers include:</t>
          <ul spacing="normal">
            <li>
              <t>Full Snapshot: Used to obtain a complete data view for initialization or reconstruction when starting up for the first time, when data is lost, or when consistency is compromised;</t>
            </li>
            <li>
              <t>Incremental Changes: Used after synchronization becomes stable to continuously synchronize newly added or updated data at low cost, to maintain nearly real-time consistency;</t>
            </li>
            <li>
              <t>Active Push: For stricter timeliness requirements, the data provider may proactively push changes instead.</t>
            </li>
          </ul>
          <t>Note that the discovery server may obtain operational status data from agent monitoring related servers, which will be elaborated in Section 9. They may use the same data synchronization mechanism.</t>
        </section>
      </section>
      <section anchor="basic-workflow-of-agent-discovery">
        <name>Basic Workflow of Agent Discovery</name>
        <t>The basic workflow of agent discovery includes the following steps:</t>
        <t>(1) The Leader receives a user task and analyzes it to determine the required capabilities (skills) of Partners;</t>
        <t>(2) The Leader sends an agent discovery request to the Agent Discovery Server, where the request contains explicit query information or constrained query conditions;</t>
        <t>(3) The Agent Discovery Server matches the query conditions with the available agent descriptions;</t>
        <t>(4) The Agent Discovery Server returns a list of candidate agents that satisfy the requirements to the Leader;</t>
        <t>(5) The Leader selects Partners from the candidate list according to its own strategy, performs identity verification, and collaborates with them to complete the task.</t>
      </section>
      <section anchor="different-agent-discovery-methods">
        <name>Different Agent Discovery Methods</name>
        <ul spacing="normal">
          <li>
            <t>In-Domain Discovery: Upon receiving a discovery request, the discovery server performs matching, ranking, and filtering of available Partners within the local domain; if the Leader’s requirements are met, it directly returns the candidate list of serving agents.</t>
          </li>
          <li>
            <t>Cross-Domain Discovery: Discovery servers across multiple autonomous domains can establish connections based on trust relationships between agent providers. If the discovery request for an agent cannot be fulfilled within one autonomous domain, the discovery server in one domain may forward the discovery request to the discovery servers in the neighboring domain. If the neighboring discovery server locates a suitable agent, it returns a discovery response.</t>
          </li>
        </ul>
        <t>There are two cross-domain discover mechanisms: the chained forwarding and the aggregated forwarding. For the chained forwarding, the discovery request is forwarded hop-by-hop along a trusted chain, and the continued forwarding process is constrained by a maximum hop count limit. For the aggregated forwarding, the upstream discovery server can select multiple downstream discovery servers from the trusted list to initiate parallel discovery requests, and the continued forwarding process is constrained by a maximum participant limit. During agent discovery, each discovery server must ensure that the forwarding depth or parallel fanout do not exceed the configured limits. The AICs of all discovery servers along the route must be recorded, to ensure that the discovery results are trustworthy and that the discovery process is controllable and traceable.</t>
      </section>
    </section>
    <section anchor="agent-interaction-aip">
      <name>Agent Interaction (AIP)</name>
      <t>In the Internet of Agents, agents may form different collaborative networks under various task scenarios. To ensure that agents can communicate safely and effectively across different scenarios, AIP defines standardized mechanisms and processes to promote deep collaboration between agents.</t>
      <section anchor="core-roles-in-agent-interaction">
        <name>Core Roles in Agent Interaction</name>
        <t>In AIP, the interaction between agents are task-driven, based on which agents can be divided into two roles:</t>
        <ul spacing="normal">
          <li>
            <t>Leader: Agent who issues tasks and organizes interactions. There should only be one Leader in a complete task execution process.</t>
          </li>
          <li>
            <t>Partner: Agent who accepts tasks and provides services. After Partner receives a task from the Leader, it executes and returns the execution result.</t>
          </li>
        </ul>
      </section>
      <section anchor="interaction-mode-in-aip">
        <name>Interaction mode in AIP</name>
        <t>In AIP, there are three interaction modes between the Leader and the Partner: peer to peer mode, grouping mode and hybrid mode.</t>
        <ul spacing="normal">
          <li>
            <t>Peer to peer mode: In this mode, the Leader maintains separate communication connections with each Partner, ensuring context isolation. Each message in this mode has only one sender and receiver.</t>
          </li>
          <li>
            <t>Grouping mode: In this mode, interaction messages between agents are distributed through a message queue. Message in this mode has only one sender but may has multiple receivers.</t>
          </li>
          <li>
            <t>Hybrid mode: In this mode, the Leader and Partner may interact directly or through the message queue according to the Leader's task planning.</t>
          </li>
        </ul>
        <t>Agents in the existing agent collaboration network can interact with other agents as Leaders through the interaction mode defined in AIP to introduce them into the agent domain, forming a more complex agent collaboration network.</t>
      </section>
      <section anchor="messaging-in-aip">
        <name>Messaging in AIP</name>
        <t>Messaging in AIP includes three types: RPC, streaming, and notification.</t>
        <ul spacing="normal">
          <li>
            <t>RPC: For instant scenarios like synchronous messages, managing task states, or performing actions requiring immediate responses.</t>
          </li>
          <li>
            <t>Streaming: For scenarios such as chunking large files, real-time log pushes, or long-running data transfer operations.</t>
          </li>
          <li>
            <t>Notification: Event-driven asynchronous callback methods for agents to send notifications to other agents when specific conditions are met.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="tool-invocation-tip">
      <name>Tool Invocation (TIP)</name>
      <t>In the Internet of Agents, to accomplish users' complex tasks, agent collaboration often involves calling external tools and accessing external data. TIP provides a standardized interface for agents to call tools, enabling different agents to use various external tools or services through a unified method.</t>
      <section anchor="core-roles-in-tool-inbocation">
        <name>Core Roles in Tool Inbocation</name>
        <t>TIP follows a client-host-server architecture:</t>
        <ul spacing="normal">
          <li>
            <t>Tool Agent (TA): Tool Agent is the agent that uses the TIP to call tool, which usually acts as a Partner to interact with the Leader through AIP, and autonomously planning to call tools to complete the tasks published by the Leader.</t>
          </li>
          <li>
            <t>TIP Host: The TIP Host process is typically created and managed by the Tool Agent, serving as a container and coordinator for TIP Clients, and managing cross-client context aggregation.</t>
          </li>
          <li>
            <t>TIP Client: Each TIP Client maintains an isolated TIP Server connection, handle protocol negotiation and feature exchange between both parties, and send requests to the TIP Server to use its corresponding features.</t>
          </li>
          <li>
            <t>TIP Server: The TIP Server provides specialized context and functionality, exposing tools through TIP primitives, which call tools based on received requests and return execution results.</t>
          </li>
        </ul>
      </section>
      <section anchor="basic-workflow-of-tool-invocation">
        <name>Basic Workflow of Tool Invocation</name>
        <t>The basic workflow of tool invocation includes the following steps:</t>
        <t>(1) Tool Agent creates a connection between TIP Client and TIP Server;</t>
        <t>(2) Tool Agent autonomously discovers available tools and invokes them as needed;</t>
        <t>(3) Tool Agent proactively disconnects from the TIP Server once the desired result is obtained and it is confirmed that no further tool calls are needed.</t>
      </section>
    </section>
    <section anchor="agent-monitoring-amp">
      <name>Agent Monitoring (AMP)</name>
      <t>To ensure that agents’ status information can be aggregated in real time and distributed in an orderly manner under a unified specification, AMP adopts log files as the data carrier for agents’ states and behaviors. Through standardized mechanisms for log collection and storage, it enables centralized retention and controlled distribution of agent information, thereby providing agent registration servers, discovery servers, and other agents with capabilities for status querying and traceability.</t>
      <section anchor="log-file-categories">
        <name>Log File Categories</name>
        <t>The raw log data is generated by agents. Logs include the following types, and different types of logs are stored in different files:</t>
        <ul spacing="normal">
          <li>
            <t>Heartbeat Logs: Periodically record an agent’s operational status and health condition. The core purpose of heartbeat logs is to express the fact that “the agent is still alive.” They are typically generated at a fixed interval (e.g., every 10 to 60 seconds) and usually contain only lightweight information such as status indicators and brief metric summaries.</t>
          </li>
          <li>
            <t>Metrics Logs: Record an agent’s performance metrics and resource utilization, focusing on “how the agent is performing,” presented in structured numerical form. Typical contents include task queue status, latency percentiles (P50/P90/P99), and CPU/memory/disk/network utilization.</t>
          </li>
          <li>
            <t>Access Logs: Record every interaction between an agent and external systems, including requests, responses, errors, debugging information, and tracing data. Access logs are “generalized interaction logs,” covering traditional request logs, error logs, debug logs, and distributed tracing logs.</t>
          </li>
          <li>
            <t>Message Logs: Record sending and receiving behaviors of an agent through messaging channels (queues, topics, streams), focusing on reliable delivery, ordering, and retry status in message-driven architectures. They help diagnose issues such as message backlogs, out-of-order delivery, and duplicate delivery.</t>
          </li>
          <li>
            <t>Auditing Logs: Record security-related operations and access activities of an agent. Auditing logs serve security compliance and post-incident forensics needs, typically including fields such as operator, target, operation type, and operation result. Auditing logs usually have a long retention period (depending on regulatory requirements) and impose high requirements on integrity and tamper resistance. Transaction logs of billing systems can also be categorized as a special form of auditing logs.</t>
          </li>
          <li>
            <t>System Logs: Record status information of the agent runtime environment and related services. System logs help diagnose issues in the agent runtime environment, and are typically used together with access logs and metrics logs to provide a comprehensive troubleshooting perspective.</t>
          </li>
        </ul>
      </section>
      <section anchor="log-collection-and-storage">
        <name>Log Collection and Storage</name>
        <t>Log Collection Layer: Various logs (heartbeat, access, metrics, audit, message, system, etc.) are written by agents into local log files by type. After necessary steps such as parsing, filtering, and labeling, this layer delivers logs by type to the log storage layer in a reliable and controllable manner.</t>
        <t>Log Storage Layer: This layer provides unified storage for different log information from different agents. According to the structural characteristics, access patterns, and lifecycle requirements of different log types, it provides differentiated storage solutions, and also supports index building and fast retrieval of log data, providing data support for subsequent monitoring analysis, alert triggering, and root-cause tracing.</t>
        <t>After logs are stored, they can be read and processed on demand by different analysis and application systems for querying and aggregation analysis, operational monitoring and alerting, fault localization and root-cause tracing, security auditing and compliance retention, and unified presentation of key conclusions via reports or visualization, thereby supporting a continuous monitoring and governance closed loop.</t>
      </section>
      <section anchor="the-use-of-logs">
        <name>The Use of Logs</name>
        <t>Logs are the most fundamental and most trustworthy “source of truth” for an agent monitoring system. The monitoring systems continuously collect and reliably store, by type, the status changes, request interactions, key metrics, exception information, and audit records generated during agent operation, and then distribute them in a controlled manner to different entities for processing and analysis.</t>
        <t>Logs can provide long-term data foundations for agent auditing, agent transaction, as well as network performance optimization. The IoA can achieve operational observability, alerting and diagnosis, tracing and accountability, security and compliance assurance.</t>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>This draft introduces the Agent Collaboration Protocols (ACPs) architecture for Internet of Agents. By defining a comprehensive protocol suite, including trusted registration, identity authentication, agent discovery, agent interaction, tool invocation, and agent monitoring, the ACPs address the core requirements for interoperability and secure collaboration among heterogeneous agents. The long-term goal of the ACPs is to enable IoA to serve as the critical infrastructure for agent collaboration on complex tasks, as well as to support the future large-scale and diverse applications.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119"/> and <xref target="RFC8174"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document focuses on the Agent Collaboration Protocols architecture for IoA. Security of IoA is not detailed in this document. Security considerations relevant to deployment with multiple agent service providers are suggested to be deeply discussed through other proposals.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no request for IANA action.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8259.xml">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ACPs-Github" target="https://github.com/AIP-PUB">
          <front>
            <title>ACPs GitHub repository</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
