<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 2.7.0) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-scrm-aiproto-usecases-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="Agentic AI Use Cases">Agentic AI Use Cases</title>
    <seriesInfo name="Internet-Draft" value="draft-scrm-aiproto-usecases-02"/>
    <author fullname="Roland Schott">
      <organization>Deutsche Telekom</organization>
      <address>
        <email>Roland.Schott@telekom.de</email>
      </address>
    </author>
    <author fullname="Julien Maisonneuve">
      <organization>Nokia</organization>
      <address>
        <email>julien.maisonneuve@nokia.com</email>
      </address>
    </author>
    <author fullname="L. M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <author fullname="Jordi Ros-Giralt">
      <organization>Qualcomm Europe, Inc.</organization>
      <address>
        <email>jros@qti.qualcomm.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>AREA</area>
    <workgroup>WG Working Group</workgroup>
    <keyword>AI Agents</keyword>
    <keyword>Use cases</keyword>
    <abstract>
      <?line 80?>

<t>Agentic AI systems rely on large language models to plan and execute multi-step tasks by interacting with tools and collaborating with other agents, creating new demands on Internet protocols for interoperability, scalability, and safe operation across administrative domains. This document inventories representative Agentic AI use cases and captures the protocol-relevant requirements they imply, with the goal of helping the IETF determine appropriate standardization scope and perform gap analysis against emerging proposals. The use cases are written to expose concrete needs such as long-lived and multi-modal interactions, delegation and coordination patterns, and security/privacy hooks that have protocol implications. Through use case analysis, the document also aims to help readers understand how agent-to-agent and agent-to-tool protocols (e.g., <xref target="A2A"/> and <xref target="MCP"/>), and potential IETF-standardized evolutions thereof, could be layered over existing IETF protocol substrates and how the resulting work could be mapped to appropriate IETF working groups.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-scrm-aiproto-usecases/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/https://github.com/giralt/draft-scrm-aiproto-usecases"/>.</t>
    </note>
  </front>
  <middle>
    <?line 84?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Agentic AI systems—software agents that use large language models to reason, plan, and take actions by interacting with tools and with other agents—are seeing rapid adoption across multiple domains. The ecosystem is also evolving quickly through open-source implementations and emerging protocol proposals; however, open source alone does not guarantee interoperability, since rapid iteration and fragmentation can make stable interoperation difficult when long-term compatibility is required. Several protocols have been proposed to support agentic systems (e.g., <xref target="A2A"/>, <xref target="MCP"/>, ANP, Agntcy), each with different design choices and strengths, targeting different functions, properties, and operating assumptions.</t>
      <t>This document inventories a set of representative Agentic AI use cases to help the IETF derive protocol requirements and perform gap analysis across existing proposals, with a focus on Internet-scale interoperability. The use cases are intended to highlight protocol properties that matter in practice—such as long-lived interactions, multi-modal context exchange, progress reporting and cancellation, and safety-relevant security and privacy hooks—and to help the IETF determine appropriate scope as well as how related work should be organized across existing working groups or, if needed, a new effort.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="use-cases-requirements">
      <name>Use Cases Requirements</name>
      <t>The use cases in this document are intended to inform IETF standardization work on Agentic AI protocols by clarifying scope, enabling gap analysis, and guiding working group ownership. The requirements below define the minimum level of detail and structure expected from each use case so that the IETF can derive actionable protocol requirements and identify where coordination with other SDOs is necessary. Use cases that do not meet these requirements risk being insufficiently precise for protocol design and evaluation.</t>
      <ul spacing="normal">
        <li>
          <t><strong>IETF scope guidance</strong>: Use cases <bcp14>MUST</bcp14> clearly indicate which protocol behaviors are expected to fall under the IETF’s domain (e.g., Internet-facing interoperability, transport/session semantics, media/session behavior, congestion and reliability considerations, security and privacy hooks) versus what is out of scope for the IETF (e.g., model internals, proprietary orchestration logic). Use cases <bcp14>SHOULD</bcp14> also identify where coordination with other SDOs or industry initiatives is required to achieve interoperable and scalable outcomes.</t>
        </li>
        <li>
          <t><strong>Ecosystem boundary mapping</strong>: Use cases <bcp14>SHOULD</bcp14> describe the relevant protocol ecosystem and interfaces between components (e.g., agent-to-agent vs. agent-to-tool) so the IETF can understand what can be standardized as Internet protocols and what is better treated as application/framework conventions. Where applicable, use cases <bcp14>SHOULD</bcp14> illustrate complementary roles of protocols such as agent-to-agent interaction (e.g., <xref target="A2A"/>) and agent-to-tool interaction (e.g., <xref target="MCP"/>).</t>
        </li>
        <li>
          <t><strong>Gap analysis readiness</strong>: Use cases <bcp14>MUST</bcp14> be structured so that an engineer can map them to existing proposals and then identify missing, underspecified, or insufficiently mature protocol capabilities that block deployment. Use cases <bcp14>SHOULD</bcp14> include enough detail to reveal gaps, and <bcp14>MUST</bcp14> distinguish between gaps that plausibly belong in IETF standardization versus gaps that are purely implementation choices.</t>
        </li>
        <li>
          <t><strong>Adoption and layering</strong>: Use cases <bcp14>SHOULD</bcp14> explain how non-IETF protocols that may be brought into the IETF (e.g., an A2A-like protocol) could be layered on top of, and interoperate cleanly with, existing IETF protocols (e.g., HTTP, QUIC, WebRTC, TLS). Use cases <bcp14>MUST</bcp14> identify assumed transport/bindings and the key interoperation points (e.g., discovery, session establishment, streaming, error handling) needed to assess architectural fit and integration impact.</t>
        </li>
        <li>
          <t><strong>Communication mode detail</strong>: Use cases <bcp14>MUST</bcp14> describe the communication modes required between agents and between agents and tools reachable over the Internet, such as interactive request/response, asynchronous workflows, bulk transfer, incremental streaming, and notification patterns. Use cases <bcp14>SHOULD</bcp14> also indicate modality needs (text, audio/video, files, structured artifacts) when relevant.</t>
        </li>
        <li>
          <t><strong>Performance and safety needs</strong>: Use cases <bcp14>SHOULD</bcp14> include explicit performance requirements when meaningful (e.g., latency sensitivity, bandwidth intensity, jitter tolerance, session duration, scalability expectations). Use cases <bcp14>MUST</bcp14> also call out safety-relevant requirements that have protocol implications (e.g., authorization and consent gates, provenance/citation needs, integrity and replay protection, isolation boundaries for tool invocation).</t>
        </li>
        <li>
          <t><strong>WG ownership signals</strong>: Use cases <bcp14>SHOULD</bcp14> be decomposable into protocol functions that can be mapped to existing IETF working groups (e.g., transport, security, applications, operations/management, identity). Use cases <bcp14>MUST</bcp14> highlight cross-area dependencies (e.g., session + media + security) so the IETF can assess whether coordination across existing WGs is sufficient or whether forming a new WG is justified.</t>
        </li>
        <li>
          <t><strong>Operational realism</strong>: Use cases <bcp14>SHOULD</bcp14> reflect real deployment constraints on the Internet. This requirement helps ensure the resulting protocol requirements are implementable and deployable at scale, rather than being tied to a single controlled environment.</t>
        </li>
        <li>
          <t><strong>Trust boundaries explicit</strong>: Use cases <bcp14>MUST</bcp14> identify administrative domains and trust boundaries (e.g., user device, enterprise perimeter, third-party tool providers, external agent providers) and <bcp14>SHOULD</bcp14> summarize the expected security posture at those boundaries (authentication, authorization, confidentiality, and auditability expectations). This helps ensure the IETF does not miss protocol hooks needed to safely operate agentic systems across domains.</t>
        </li>
      </ul>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>This section inventories representative Agentic AI use cases to make their protocol-relevant requirements explicit and comparable. The use cases are written to expose concrete needs such as multi-step delegation, agent-to-agent coordination, agent-to-tool interactions, and long-lived and multi-modal exchanges that must operate safely and reliably across administrative domains.  By grounding the discussion in specific scenarios, the document supports gap analysis against emerging agent protocols (e.g., agent-to-agent and agent-to-tool approaches such as A2A and MCP) and clarifies how candidate solutions could be layered over existing IETF protocol substrates and mapped to appropriate IETF working groups, including the necessary security and privacy hooks.</t>
      <section anchor="deep-search">
        <name>Deep Search</name>
        <t>Deep Search refers to an <em>agentic</em> information‑seeking workflow in which an AI agent plans, executes, and iteratively refines multi‑step research across heterogeneous sources such as open web, enterprise knowledge bases, APIs, files, and computational tools, among others. Unlike one‑shot retrieval or a single RAG call, Deep Search is <em>long‑horizon</em> and <em>goal‑directed</em>: the agent decomposes a task into sub‑goals, issues searches and crawls, reads and filters evidence, runs auxiliary computations (e.g., code or math), verifies claims, tracks provenance/citations, and synthesizes a final answer---often over minutes or hours rather than milliseconds. This loop is typically implemented as <em>think -&gt; act (tool) -&gt; observe -&gt; reflect -&gt; refine plan</em> until success criteria (e.g., coverage, confidence, cost/time budgets) are met.</t>
        <section anchor="building-blocks">
          <name>Building Blocks</name>
          <t>A Deep Search workflow may generally comprise the components shown in the next Figure:</t>
          <!-- - **Base LLM (reasoning + tool use).**
  A model capable of multi‑step reasoning (e.g., chain‑of‑thought/verification, self‑reflection) *and* structured tool invocation (function/tool calling) to plan, call tools, parse results, and revise plans.

- **Planner/Orchestrator.**
  A lightweight controller (can be the LLM itself or a graph/agent runtime) that maintains task state, goals, and budgets (tokens, latency, rate limits), and schedules steps (parallel vs. sequential).

- **Tooling layer (invoked by the agent):**
  The tooling layer includes:
  - **Web search & crawling** such SERP APIs, focused crawlers, HTML/PDF parsers, robots.txt compliance.
  - **Knowledge access** such as knowledge bases (KB), document stores, wikis, code repos.
  - **Retrieval‑Augmented Generation (RAG)** such as indexing, re‑ranking, query rewriting, dedup, chunking.
  - **Computation tools** such as a **Python interpreter** for factual checks, data wrangling, statistics/plots.
  - **Specialized services** such as scholarly search, calculators, geocoders, optical character recognition, table extraction, etc.
  - **Verification/critique** such as fact‑checking, citation validation, deduplication, hallucination detection).
  - **Provenance & citation store** such as source URIs, timestamps, quotes/snippets, hashes.

- **Short‑term memory / working set.**
  Scratchpad to hold the evolving evidence graph: normalized documents, extracted entities/claims, metadata, and confidence scores.

- **Synthesis & reporting.**
  Templates or renderers that compile the final artifact (report/brief/bibliography), with explicit citations to the evidence used.

- **Observability & policy.**
  Logging, traces, and red‑team hooks for auditability; safety filters (PII, ToS, copyright/robots policy), rate limiting, attribution. -->

<figure anchor="fig-deep-search">
            <name>Deep Search agentic workflow</name>
            <artwork type="ascii-art" align="center"><![CDATA[
+--------------------------------------------------------------+
|                        User / Client                         |
|              (Goal, Query, Constraints)                      |
+--------------------------------------------------------------+
                             |
                             v
+--------------------------------------------------------------+
|                 DeepSearch Orchestrator                      |
|                                                              |
|  - planning & task decomposition                             |
|  - agent coordination (A2A)                                  | <----+
|  - iteration control (re-plan, retry, refine)                |      |
|  - shared state & memory                                     |      |
+--------------------------------------------------------------+      |
                             |                                        |
                    tasks / messages (A2A)                            |
                             v                                        |
+--------------------------------------------------------------+      |
|  A2A Agent Communication (standardized agent communication)  |      |
+--------------------------------------------------------------+      |
                             |                                        |
                             v                                        |
+--------------------------------------------------------------+      |
|                         Agents Mesh                          |      |
|                                                              |      |
|  - research / query expansion                                |      |
|  - retrieval & summarization                                 |      |
|  - analysis / computation                                    |      |
|  - validation / fact-checking                                |      |
|                                                              |      |
+--------------------------------------------------------------+      |
                             |                                        |
                      tool calls (MCP)                                |
                             v                                        |
+--------------------------------------------------------------+      |
|       MCP Tooling Layer (standardized tool interfaces)       |      |
+--------------------------------------------------------------+      |
                             |                                        |
                             v                                        |
+-----------------------+   +----------------+   +-----------------+  |
| Web Search & Crawling |   | KB / RAG Index |   |  Python / Tools |  |
|      (SERP APIs)      |-->| (embed/rerank) |-->| (compute, eval) |  |
+-----------------------+   +----------------+   +-----------------+  |
        |                                |                      |     |
        |                                |                      |     |
        +------------- evidence & results returned to agents ---+     |
                             |                                        |
                             v                                        |
+--------------------------------------------------------------+      |
|    DeepSearch Orchestrator: Iterative Improvement Loop       |      |
|                                                              |      |
|   Plan -> Act -> Observe -> Refine -> Re-plan                |------+
|   (query tuning, crawl adjustment, re-ranking, re-eval)      |
+--------------------------------------------------------------+
                             |
                             v
+--------------------------------------------------------------+
|                 Final Answer / Output                        |
|          (synthesis + citations + confidence)                |
+--------------------------------------------------------------+
]]></artwork>
          </figure>
          <!-- The loop repeats until success criteria are met (coverage/quality thresholds, budget, or explicit user stop). -->

<t>Each building block in the DeepSearch architecture represents a logical function rather than a specific implementation, and multiple components may be co-located or distributed in practice.</t>
          <section anchor="user-client">
            <name>User / Client</name>
            <t>The <em>User / Client</em> is the entry point to the system. It provides the initial goal or query, along with optional constraints (e.g., scope, freshness, format). The user does not interact directly with tools or agents; all interactions are mediated by the DeepSearch Orchestrator.</t>
          </section>
          <section anchor="deepsearch-orchestrator">
            <name>DeepSearch Orchestrator</name>
            <t>The <em>DeepSearch Orchestrator</em> acts as the control plane of the system. Its responsibilities include:</t>
            <ul spacing="normal">
              <li>
                <t>Planning and task decomposition of the user’s request.</t>
              </li>
              <li>
                <t>Coordinating agents via Agent-to-Agent (A2A) communication.</t>
              </li>
              <li>
                <t>Managing shared state and memory across iterations.</t>
              </li>
              <li>
                <t>Controlling iterative execution, including retries and refinements.</t>
              </li>
            </ul>
            <t>The orchestrator does not perform retrieval or computation directly; instead, it delegates work to agents and manages the overall execution flow.</t>
          </section>
          <section anchor="a2a-agent-communication-bus">
            <name>A2A Agent Communication Bus</name>
            <t>The <em>A2A Agent Communication Bus</em> provides a standardized messaging layer that enables agent-to-agent coordination. It supports:</t>
            <ul spacing="normal">
              <li>
                <t>Task dispatch and response exchange.</t>
              </li>
              <li>
                <t>Collaboration among specialized agents.</t>
              </li>
              <li>
                <t>Decoupling of agent implementations from orchestration logic.</t>
              </li>
            </ul>
            <t>This bus allows agents to operate independently while still contributing to a coherent end-to-end workflow.</t>
          </section>
          <section anchor="agents-mesh">
            <name>Agents Mesh</name>
            <t>The <em>Agents Mesh</em> block represents a set of specialized, cooperative agents operating over the A2A bus. Typical agent roles include:</t>
            <ul spacing="normal">
              <li>
                <t>Research and query expansion.</t>
              </li>
              <li>
                <t>Retrieval and summarization.</t>
              </li>
              <li>
                <t>Analysis and computation.</t>
              </li>
              <li>
                <t>Validation and fact-checking.</t>
              </li>
            </ul>
            <t>Agents are responsible for invoking tools, interpreting results, and returning structured observations to the orchestrator.</t>
          </section>
          <section anchor="mcp-tooling-layer">
            <name>MCP Tooling Layer</name>
            <t>The <em>MCP Tooling Layer</em> provides a standardized interface between agents and external tools. It enables:</t>
            <ul spacing="normal">
              <li>
                <t>Discovery and invocation of tools using a common protocol.</t>
              </li>
              <li>
                <t>Consistent input/output schemas across heterogeneous tools.</t>
              </li>
              <li>
                <t>Isolation of agent logic from tool-specific details.</t>
              </li>
            </ul>
            <t>MCP acts as an abstraction boundary that simplifies integration and evolution of external capabilities.</t>
          </section>
          <section anchor="web-search-crawling">
            <name>Web Search &amp; Crawling</name>
            <t>The <em>Web Search &amp; Crawling</em> component combines content discovery and acquisition. It typically includes:</t>
            <ul spacing="normal">
              <li>
                <t>Search engine or SERP APIs for identifying relevant sources.</t>
              </li>
              <li>
                <t>Focused crawling or fetching to retrieve selected content.</t>
              </li>
            </ul>
            <t>This component supplies raw external data that can be further processed and indexed.</t>
          </section>
          <section anchor="knowledge-base-kb-retrieval-augmented-generation-rag-index">
            <name>Knowledge Base (KB) / Retrieval Augmented Generation (RAG) Index</name>
            <t>The <em>KB / RAG Index</em> component manages knowledge representation and retrieval. Its responsibilities include:</t>
            <ul spacing="normal">
              <li>
                <t>Embedding and indexing retrieved content.</t>
              </li>
              <li>
                <t>Ranking or re-ranking results based on relevance.</t>
              </li>
              <li>
                <t>Supplying context to agents for retrieval-augmented generation (RAG).</t>
              </li>
            </ul>
            <t>This block provides structured, queryable knowledge derived from external sources.</t>
          </section>
          <section anchor="python-tools">
            <name>Python / Tools</name>
            <t>The <em>Python / Tools</em> component represents general-purpose computation and evaluation capabilities. Examples include:</t>
            <ul spacing="normal">
              <li>
                <t>Data processing and transformation.</t>
              </li>
              <li>
                <t>Numerical analysis or simulations.</t>
              </li>
              <li>
                <t>Quality evaluation, scoring, or consistency checks.</t>
              </li>
            </ul>
            <t>These tools are typically invoked by analysis-oriented agents via the MCP layer.</t>
          </section>
          <section anchor="iterative-improvement-loop">
            <name>Iterative Improvement Loop</name>
            <t>The <em>Iterative Improvement Loop</em> captures the system’s ability to refine results over multiple passes and is also implemeted by the DeepSearch Orchestrator. Conceptually, it follows a cycle of:</t>
            <artwork><![CDATA[
Plan -> Act -> Observe -> Refine -> Re-plan
]]></artwork>
            <t>Observations and intermediate results are fed back into the orchestrator, which may adjust plans, agent assignments, or tool usage before producing the final output.</t>
          </section>
          <section anchor="final-answer-output">
            <name>Final Answer / Output</name>
            <t>The <em>Final Answer / Output</em> is the synthesized result returned to the user. It may include:</t>
            <ul spacing="normal">
              <li>
                <t>A consolidated response or report.</t>
              </li>
              <li>
                <t>References or citations to supporting evidence.</t>
              </li>
              <li>
                <t>Confidence indicators or stated limitations.</t>
              </li>
            </ul>
            <t>This output reflects the outcome of one or more iterative refinement cycles.</t>
          </section>
        </section>
        <section anchor="why-this-use-case-matters">
          <name>Why This Use Case Matters</name>
          <t>Deep Search is inherently <em>compositional</em>: it coordinates <em>multiple</em> agents and <em>many</em> tools over extended time. Without standard protocols, systems devolve into brittle, one‑off integrations that are hard to test, secure, or reuse. Two complementary interoperability layers in the DeepSearch are especially relevant:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Agent‑to‑Tool standardization.</strong>
The <em>Model Context Protocol (MCP)</em> defines a standardized mechanism by which agents and hosts can discover, describe, and invoke tools, resources, and prompts using JSON-RPC over multiple transports (e.g., stdio, HTTP with Server-Sent Events, and WebSocket). MCP enables portable and reusable tool catalogs (including search, crawling, retrieval-augmented generation (RAG), and general-purpose computation) with consistent schemas, capability negotiation, progress reporting, cancellation semantics, and explicit security prompts and user consent. Further details are specified in the MCP specification and related project documentation <xref target="MCP"/><xref target="MCP-GITHUB"/>.</t>
            </li>
            <li>
              <t><strong>A2A Agent Communication Bus.</strong>
The <em>Agent2Agent (A2A)</em> protocol focuses on standardized inter-agent collaboration. It defines mechanisms for agent capability discovery (e.g., Agent Cards), task lifecycle management (creation, cancellation, and status reporting), and streaming updates for long-running operations. A2A is designed to support opaque collaboration among agents while avoiding the need to disclose proprietary internal implementations. An overview of the protocol, along with its specification and design rationale, is available from the A2A project documentation <xref target="A2A"/><xref target="A2A-GITHUB"/>.</t>
            </li>
          </ul>
          <t><strong>Implications for Deep Search.</strong> Using A2A and MCP together lets implementers compose portable Deep Search stacks:</t>
          <ul spacing="normal">
            <li>
              <t>Tools like crawlers, scholarly search, RAG, and Python are exposed via <strong>MCP</strong> with typed inputs/outputs and consent flows.</t>
            </li>
            <li>
              <t>Long‑running research tasks, delegation to specialized researcher/verifier agents, background execution, progress streaming, and result handoff occur via <strong>A2A</strong>.</t>
            </li>
            <li>
              <t>Provenance (URIs, hashes, timestamps) and citation schemas can also be standardized at the protocol boundary to enable verifiable research traces across vendors.</t>
            </li>
            <li>
              <t>Enterprise requirements (authn/z), quotas, observability/tracing, policy enforcement (robots/copyright), and safety reviews—become portable rather than per‑integration glue.</t>
            </li>
          </ul>
        </section>
        <section anchor="example-open-deep-search-ods">
          <name>Example: Open Deep Search (ODS)</name>
          <t>Open implementations illustrate agentic architectures for Deep Search.</t>
          <t><strong>Open Deep Search (ODS)</strong> is a modular, open-source framework that augments a base large language model with a dedicated Reasoning Agent and an Open Search tool. The framework is designed to support extensible, agentic search workflows in which an agent iteratively plans, invokes search tools, and synthesizes results to answer complex queries. Further details are available in the ODS publication and accompanying reference implementation <xref target="ODS"/><xref target="ODS-GITHUB"/>.</t>
          <t>ODS exemplifies the building blocks described earlier in this document and is consistent with the proposed interoperability layering, using standardized tool invocation for search and retrieval and agent-centric coordination to manage planning, execution, and refinement.</t>
        </section>
      </section>
      <section anchor="hybrid-ai">
        <name>Hybrid AI</name>
        <t>Hybrid AI generally refers to an <em>edge–cloud cooperative</em> inference workflow in which two or more models collaborate to solve a task: (1) a <strong>smaller on‑device model</strong> (typically a few billion parameters) that prioritizes low latency, lower cost, and privacy; and (2) a <strong>larger cloud model</strong> (hundreds of billions to trillion‑scale parameters) that offers higher capability and broader knowledge. The two models coordinate over an agent‑to‑agent channel and may invoke tools locally or remotely as needed. Unlike single‑endpoint inference, Hybrid AI is <em>adaptive and budget‑aware</em>: the on‑device model handles as much work as possible locally (classification, summarization, intent detection, light reasoning), and escalates to the cloud model when additional capability is required (multi‑hop reasoning, long‑context synthesis, domain expertise). The models can exchange plans, partial results, and constraints over <xref target="A2A"/>, and both sides can discover and invoke tools via <xref target="MCP"/>.</t>
        <section anchor="building-blocks-1">
          <name>Building Blocks</name>
          <t>A Hybrid AI workflow may generally comprise the components shown in the next Figure:</t>
          <ul spacing="normal">
            <li>
              <t><strong>On‑device Model (Edge).</strong>
A compact LLM or task‑specific model (a few billion parameters) running on user hardware (e.g., phone, laptop). Advantages include: low latency for interactive turns, reduced cost, offline operation, and improved privacy by default (data locality). Typical functions: intent parsing, entity extraction, local retrieval, preliminary analysis, redaction/summarization prior to escalation.</t>
            </li>
            <li>
              <t><strong>Cloud Model (Hosted).</strong>
A large, higher‑capability LLM (hundreds of billions to ~trillion parameters) with stronger reasoning, knowledge coverage, tool‑use proficiency, and longer context windows. Typical functions: complex synthesis, multi‑step reasoning, broad web/KG retrieval, code execution, and advanced evaluation.</t>
            </li>
            <li>
              <t><strong>A2A Inter‑Model Coordination.</strong>
The edge and cloud models communicate via an <strong>Agent‑to‑Agent</strong> channel to exchange <strong>capabilities</strong>, <strong>cost/latency budgets</strong>, <strong>privacy constraints</strong>, <strong>task state</strong>, and <strong>partial artifacts</strong>. Common patterns include <em>negotiate‑and‑delegate</em>, <em>ask‑for‑help with evidence</em>, <em>propose/accept plan updates</em>, and <em>critique‑revise</em> cycles <xref target="A2A"/>.</t>
            </li>
            <li>
              <t><strong>MCP Tooling (Edge and Cloud).</strong>
Both models use the <strong>Model Context Protocol</strong> to discover and invoke tools with consistent schemas (e.g., local sensors/files, calculators, vector indexes on edge; search/crawling, KB/RAG, Python/services in cloud). MCP enables capability discovery, streaming/progress, cancellation, and explicit consent prompts across transports <xref target="MCP"/>.</t>
            </li>
            <li>
              <t><strong>Policy, Budget, and Privacy Controls.</strong>
Guardrails and policies that encode user/enterprise constraints (e.g., do not send raw PII to cloud; enforce token/time budgets; require consent for specific tools). The edge model may redact or summarize data before escalation; both sides log provenance and decisions for auditability.</t>
            </li>
            <li>
              <t><strong>Shared Task State and Provenance.</strong>
A compact state (goals, sub‑tasks, citations, hashes, timestamps) that both models can read/update to enable reproducibility, debugging, and verifiable traces.</t>
            </li>
          </ul>
          <artwork type="ascii-art"><![CDATA[
+--------------------------------------------------------------+
|                        User / Client                         |
|              (Goal, Query, Constraints)                      |
+--------------------------------------------------------------+
                             |
                             v
+--------------------------------------------------------------+
|                 On-Device Model (Edge)                       |
|  - few-B params; low latency, privacy by default             |
|  - local reasoning, redaction/summarization                  |
|  - local tools via MCP (sensors, files, crypto)              |
+--------------------------------------------------------------+
         |                           \
         | local MCP tools            \ when escalation is needed
         v                             \
+----------------------+                \
| Edge MCP Tools       |                 \
+----------------------+                  v
                                   +----------------------------------+
                                   |   A2A Session (Edge <-> Cloud)   |
                                   |   - capability/budget exchange   |
                                   |   - task handoff & updates       |
                                   +----------------------------------+
                                                |
                                                v
+--------------------------------------------------------------+
|                    Cloud Model (Hosted)                      |
|  - 100B–1T+ params; higher capability & breadth              |
|  - complex synthesis, long-context reasoning                 |
|  - cloud tools via MCP (search, KB/RAG, Python)              |
+--------------------------------------------------------------+
                             |
                     cloud MCP tool calls
                             v
+----------------------+   +------------------+   +------------------+
| Web Search & Crawl   |-->| KB / RAG Index   |-->| Python / Services|
+----------------------+   +------------------+   +------------------+
                             ^
                             |
                 results/evidence via A2A to edge/cloud
                             |
                             v
+--------------------------------------------------------------+
|                 Final Answer / Output                        |
|   (synthesis + citations + privacy/consent notes)            |
+--------------------------------------------------------------+
]]></artwork>
          <t>Each building block in the Hybrid AI architecture represents a logical function rather than a specific implementation, and components may be co‑located or distributed in practice.</t>
        </section>
        <section anchor="interaction-model">
          <name>Interaction Model</name>
          <t>A typical Hybrid AI session proceeds as follows:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Local First.</strong> The on‑device model interprets the user goal, applies local tools (e.g., retrieve snippets, parse files), and attempts a low‑cost solution within configured budgets.</t>
            </li>
            <li>
              <t><strong>Escalate with Minimization.</strong> If the local model estimates insufficient capability (e.g., confidence below threshold, missing evidence), it <strong>redacts/summarizes</strong> sensitive data and <strong>escalates</strong> the task—along with compact evidence and constraints—over <strong><xref target="A2A"/></strong>.</t>
            </li>
            <li>
              <t><strong>Cloud Reasoning + Tools.</strong> The cloud model performs deeper reasoning and may invoke <strong><xref target="MCP"/></strong> tools (web search/crawl, KB/RAG, Python) to gather evidence and compute results.</t>
            </li>
            <li>
              <t><strong>Refine &amp; Return.</strong> Intermediate artifacts and rationales flow back over <strong><xref target="A2A"/></strong>. The edge model may integrate results, perform final checks, and produce the user‑facing output.</t>
            </li>
            <li>
              <t><strong>Iterate as Needed.</strong> The models repeat plan‑act‑observe‑refine until success criteria (quality, coverage, cost/time budget) are met.</t>
            </li>
          </ol>
        </section>
        <section anchor="why-this-use-case-matters-1">
          <name>Why This Use Case Matters</name>
          <t>Hybrid AI is inherently <em>trade‑off aware</em>: it balances <strong>privacy</strong>, <strong>latency</strong>, and <strong>cost</strong> at the edge with <strong>capability</strong> and <strong>breadth</strong> in the cloud. Without standard protocols, inter‑model negotiations and tool interactions become bespoke and hard to audit. Two complementary interoperability layers are especially relevant:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Inter‑Model Coordination (A2A).</strong>
A2A provides a structured channel for <strong>capability advertisement</strong>, <strong>budget negotiation</strong>, <strong>task handoffs</strong>, <strong>progress updates</strong>, and <strong>critique/revision</strong> between edge and cloud models. This enables portable escalation policies (e.g., “do not send raw PII”, “cap tokens/time per turn”, “require human consent for external web calls”) and consistent recovery behaviors across vendors <xref target="A2A"/>.</t>
            </li>
            <li>
              <t><strong>Tool Invocation (MCP).</strong>
MCP standardizes tool discovery and invocation across both environments (edge and cloud), supporting consistent schemas, streaming/progress, cancellation, and explicit consent prompts. This allows implementers to swap local or remote tools—search, crawling, KB/RAG, Python/services—without rewriting agent logic or weakening privacy controls <xref target="MCP"/>.</t>
            </li>
          </ul>
          <t><strong>Implications for Hybrid AI.</strong> Using standardized protocols lets implementers compose portable edge–cloud stacks:</t>
          <ul spacing="normal">
            <li>
              <t>Edge‑first operation with <strong>escalation</strong> only when needed, guided by budgets and confidence.</t>
            </li>
            <li>
              <t><strong>Data minimization</strong> (local redaction/summarization) and <strong>consent</strong> workflows at protocol boundaries.</t>
            </li>
            <li>
              <t>Consistent <strong>provenance</strong> (URIs, hashes, timestamps) and <strong>observability</strong> across edge and cloud for verifiable traces.</t>
            </li>
            <li>
              <t>Seamless <strong>tool portability</strong> (local/remote) and <strong>policy enforcement</strong> that travel with the task rather than the deployment.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="ai-based-troubleshooting-and-automation">
        <name>AI-based Troubleshooting and Automation</name>
        <t>Telecom networks have significantly increased in scale, complexity, and heterogeneity. The interplay of technologies such as Software-Defined Networking (SDN), virtualization, cloud-native architectures, network slicing, and 5G/6G systems has made infrastructures highly dynamic. While these innovations provide flexibility and service agility, they also introduce substantial operational challenges, particularly in fault detection, diagnosis, and resolution.</t>
        <t>Traditional troubleshooting methods, based on rule engines, static thresholds, correlation mechanisms, and manual expertise, struggle to process high-dimensional telemetry, multi-layer dependencies, and rapidly evolving conditions. Consequently, mean time to detect (MTTD) and mean time to repair (MTTR) may increase, impacting service reliability and user experience.</t>
        <t>Artificial Intelligence (AI) and Machine Learning (ML) offer new capabilities to enhance troubleshooting. AI-driven approaches apply data-driven models and automated reasoning to detect anomalies, determine root causes, predict failures, and recommend or execute corrective actions, leveraging telemetry, logs, configuration, topology, and historical data.</t>
        <t>Beyond troubleshooting, it is essential to further exploit network and service automation to enable coordinated, policy-based actions across multi-technology (e.g., RAN, IP, optical, virtualized), multi-layer, and dynamic environments. As degradations and faults often span multiple devices, domains, and layers, effective handling requires intelligent and increasingly autonomous mechanisms, ranging from proactive service assurance to automated fault-triggered workflows.</t>
        <t>This use case envisions a multi-agent AI framework that enhances network and service automation. Agents perform diagnosis and root cause analysis (RCA), while also supporting anomaly prediction, intent-based protection, and policy-driven remediation. The proposed multi-agent interworking autonomously maintains the network in an optimal operational state by correlating heterogeneous data sources, performing collaborative reasoning, and interacting with network elements and operators through standardized protocols, APIs, and natural language interfaces.</t>
        <t>AI agents form a distributed and scalable ecosystem leveraging advanced AI/ML, including generative AI (Gen-AI), combined with domain expertise to accelerate RCA, assess impact, and propose corrective actions. Each agent encapsulates capabilities such as data retrieval, hypothesis generation, validation, causal analysis, and action recommendation. Designed as composable and interoperable building blocks, agents operate across diverse domains (e.g., RAN, Core, IP, Optical, and virtualized infrastructures), while supporting lifecycle management, knowledge bases, and standardized interfaces.</t>
        <section anchor="building-blocks-2">
          <name>Building Blocks</name>
          <t>The use case relies on decentralized multi-agent coordination, where agents exchange structured, context-enriched information to enable dynamic activation and collaborative troubleshooting workflows. A resource-aware orchestration layer manages agent deployment, scaling, and optimization across the network–cloud continuum. Policy frameworks ensure security, compliance, trustworthiness, and explainability, supporting resilient AI-driven network operations.</t>
        </section>
        <section anchor="why-this-use-case-matters-2">
          <name>Why This Use Case Matters</name>
          <t>This use case highlights the need for interoperable, protocol-based integration of AI-driven troubleshooting and automation components within heterogeneous, multi-vendor environments. Telecom networks are inherently composed of equipment and control systems from different providers, spanning multiple administrative and technological domains. A multi-agent AI framework operating across such environments requires standardized mechanisms for data modeling, telemetry export, capability advertisement, and control interfaces. In particular, consistent information models (e.g., YANG-based models), secure transport protocols, and well-defined APIs are needed to ensure that AI agents can reliably discover, interpret, and act upon network state information across vendor boundaries.</t>
          <t>Service discovery and capability negotiation are also critical. AI agents must be able to dynamically identify available data sources, peer agents, orchestration functions, and control points, as well as understand their supported features and policy constraints. This implies the need for standardized discovery procedures, metadata descriptions, and context exchange formats that enable composability and coordinated workflows in decentralized environments. Without such interoperability mechanisms, multi-agent troubleshooting systems risk becoming vertically integrated and operationally siloed.</t>
          <t>Furthermore, governance, security, and trust frameworks are fundamental considerations. AI-driven agents capable of recommending or executing remediation actions introduce new requirements for authentication, authorization, accountability, and auditability. Secure communication channels, role-based access control, policy enforcement, and explainability mechanisms are necessary to prevent misuse, contain faults, and ensure compliance with operational and regulatory constraints.</t>
        </section>
      </section>
      <section anchor="ai-based-operation-models">
        <name>AI-Based Operation Models</name>
        <section anchor="agentic-ai-for-improved-user-experience">
          <name>Agentic AI for Improved User Experience</name>
          <t>AI agents have the potential to enhance future user experience by being integrated—individually or as collaborating groups—into telecom networks to deliver user-facing services. Such services may include autonomous multi-level Internet/Intranet search, coordination of calendar and email tasks, and execution of multi-step workflows involving multiple agents, as well as pre-built domain agents (e.g., HR, procurement, finance). This shift can fundamentally change enterprise operating models: agents can support decision-making and, where authorized, act on behalf of employees or the organization. In multi-agent scenarios, agents from different vendors communicate over networks and must interoperate. These interactions require coordinated communication flows and motivate a standardized agent communication protocol and framework. Given the need to comply with regulatory requirements (beyond network regulation), an open, standardized approach is preferable to proprietary implementations. Interoperability across operators and vendors implies an open ecosystem; therefore, a standardized AI agent protocol is required.</t>
          <section anchor="building-blocks-3">
            <name>Building Blocks</name>
            <t>TODO</t>
          </section>
          <section anchor="why-this-use-case-matters-3">
            <name>Why this Use Case Matters</name>
            <t>TODO</t>
          </section>
        </section>
        <section anchor="voice-based-human-to-agent-communication">
          <name>Voice-Based Human-to-Agent Communication</name>
          <t>With the integration of AI and AI agents into networks, voice services may see renewed importance as a natural, low-friction interface for interacting with agents. Voice-based human-to-agent communication can complement text-based chat interfaces and enable rapid task initiation and conversational control. This use case introduces additional considerations, including security, authorization/permissions, and charging/accounting. Because voice services are regulated in many jurisdictions, this further motivates a standardized framework and standardized AI agent protocol. Network-integrated AI agents can assist users through voice interaction and improve overall user experience.</t>
          <section anchor="building-blocks-4">
            <name>Building Blocks</name>
            <t>TODO</t>
          </section>
          <section anchor="why-this-use-case-matters-4">
            <name>Why this Use Case Matters</name>
            <t>TODO</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="MCP" target="https://modelcontextprotocol.io/specification/2025-03-26">
          <front>
            <title>Model Context Protocol (MCP) Specification</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="MCP-GITHUB" target="https://github.com/modelcontextprotocol">
          <front>
            <title>Model Context Protocol – GitHub Organization</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="A2A" target="https://a2a-protocol.org/latest/">
          <front>
            <title>Agent2Agent (A2A) Protocol Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="A2A-GITHUB" target="https://github.com/a2aproject/A2A">
          <front>
            <title>Agent2Agent Protocol – GitHub Repository</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ODS" target="https://arxiv.org/abs/2503.20201">
          <front>
            <title>Open Deep Search</title>
            <author>
              <organization/>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="ODS-GITHUB" target="https://github.com/sentient-agi/OpenDeepSearch">
          <front>
            <title>OpenDeepSearch</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 529?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
