<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-liu-dmsc-acps-arc-03" category="info" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="ACPs Architecture">Agent Collaboration Protocols Architecture for Internet of Agents</title>
    <seriesInfo name="Internet-Draft" value="draft-liu-dmsc-acps-arc-03"/>
    <author fullname="Jun Liu">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <street>10 Xitucheng Road, Haidian District</street>
          <city>Beijing</city>
          <code>100876</code>
          <country>China</country>
        </postal>
        <email>liujun@bupt.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Yu">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <street>10 Xitucheng Road, Haidian District</street>
          <city>Beijing</city>
          <code>100876</code>
          <country>China</country>
        </postal>
        <email>yuke@bupt.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Li">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <street>10 Xitucheng Road, Haidian District</street>
          <city>Beijing</city>
          <code>100876</code>
          <country>China</country>
        </postal>
        <email>like1990@bupt.edu.cn</email>
      </address>
    </author>
    <author fullname="Keliang Chen">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <street>10 Xitucheng Road, Haidian District</street>
          <city>Beijing</city>
          <code>100876</code>
          <country>China</country>
        </postal>
        <email>chenkl@bupt.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="January" day="29"/>
    <workgroup>DMSC Working Group</workgroup>
    <keyword>Internet of Agents</keyword>
    <keyword>Agent Communication</keyword>
    <keyword>Task Collaboration</keyword>
    <abstract>
      <?line 63?>

<t>Internet of Agents (IoA) aims to facilitate interconnection and collaboration among heterogeneous agents to address complex tasks and support diverse applications.</t>
      <t>This IETF draft proposes the Agent Collaboration Protocols (ACPs) architecture, which includes conceptual domains, functional components and reference interfaces, to achieve agent interconnection and collaboration. ACPs cover all stages of agents in the network, from their access to collaboration, supporting agent trusted registration, agent identity authentication, agent discovery, agent interaction, tool invocation, and agent monitoring. The long-term vision of ACPs is to support the future large-scale interconnected agents and construct the key infrastructure for IoA.</t>
    </abstract>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>With the rapid development of artificial intelligence (AI), particularly large language model (LLM) technology, the number of AI agents has grown dramatically. With the capability of autonomous perception, decision-making, and execution, agents' applications are becoming increasingly widespread.</t>
      <t>To overcome the limitations of single-agent systems, and to break free from the constraints of proprietary multi-agent frameworks developed by various vendors, the Internet of Agents (IoA) has emerged. IoA aims to enable seamless connectivity and efficient collaboration among agents, through standardized communication protocols and interfaces.</t>
      <t>This draft proposes the functional architecture of Agent Collaboration Protocols (ACPs) <xref target="ACPs-Github"/>, which is designed for IoA to enable wide-area connectivity, cross-domain interoperability, and secure collaboration among heterogeneous agents. The main characteristics of ACPs are as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Multi-centralized architecture, which consists of multiple autonomous domains, each domain containing its own management nodes (such as registration, authentication, and discovery functions), to support efficient, reliable, and manageable large-scale agent interconnection scenarios.</t>
        </li>
        <li>
          <t>Standardized communication mechanisms with peer-to-peer and grouping mode, allowing agents to self-organize and negotiate autonomously, to facilitate rapid and accurate information exchange, as well as efficient task Collaboration.</t>
        </li>
        <li>
          <t>Robust registration and authentication mechanisms, to ensure the trusted access of agents and prevent unauthorized access and data breaches.</t>
        </li>
        <li>
          <t>Reliable registration and management of agent capability, along with intra-domain and cross-domain discovery based on capability matching, to support universal and efficient discovery of collaborative agents.</t>
        </li>
        <li>
          <t>Real-time monitoring of agent status and behavior, to support more complex application requirements such as agent auditing and transactions.</t>
        </li>
      </ul>
      <t>ACPs cover all stages of agents in the IoA, from their access to collaboration, to construct the key infrastructure for agent communication, task collaboration and resource allocation.</t>
    </section>
    <section anchor="conventions">
      <name>Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>Agent: An agent is a software or hardware entity with autonomous decision-making and execution capabilities, capable of perceiving the environment, acquiring contextual information, reasoning, and learning. Agent can perform tasks independently or collaboratively with other agents. Each agent is created by a specific agent provider and needs to complete processes such as registration and authentication before providing services to obtain a legitimate identity and relevant credentials.</t>
      <t>Agent Identity Code (AIC): AIC is a certifiable, globally unique identity that represents the identity of an agent. AIC MAY contain the following information: the registration service center, the agent provider, the serial number of agent entity and instance, and the check code.</t>
      <t>Agent Capability Specification (ACS): ACS is a detailed description of an agent's capabilities and information that can be saved and retrieved. ACS MAY use the JSON <xref target="RFC8259"/> format, typically including the following information: AIC, the functional capabilities of agent, the technical characteristics, and the service interfaces.</t>
      <t>Agent Credential: Agent Credential is a tamper-resistant data object issued by a credential authority (e.g., certificate, token) , used by an agent to prove identity attributes and/or authorization to a relying party.</t>
      <t>Tool: A tool is a device, software component, or service that provides a specific function and can be accessed and used by an agent.</t>
      <t>Agent Autonomous Domain: Agent Autonomous Domain is an administrative and governance domain organized and managed by a specific IoA service provider. It MAY include service functions such as identity management, credential management, capability description management, agent discovery, message distribution, and agent monitoring.</t>
    </section>
    <section anchor="acps-architecture-from-functional-perspective">
      <name>ACPs Architecture from Functional Perspective</name>
      <t>This section defines a functional architecture for agent autonomous domain in IoA. The interconnection environment is divided into different conceptual domains. Each conceptual domain includes several functional components, and there are different interfaces between functional components.</t>
      <section anchor="acps-architecture-overview">
        <name>ACPs Architecture Overview</name>
        <t>The overall functional architecture of ACPs is as follows.</t>
        <figure anchor="fig-ACPs-arc">
          <name>ACPs functional architecture</name>
          <artwork><![CDATA[
+--------------------------+        +--------------------------+ 
| Identity Management      |        | Interconnection Service  |
| Domain                   |        | Domain                   |
|                          |        |                          |
|   +-------+  +-------+   |--------|   +-------+  +-------+   |    
|   | AIMgF |  | CMgF  |   |        |   | ADMgF |  |  ADF  |   |
|   +-------+  +-------+   |        |   +-------+  +-------+   |
|   +-------+              |        |   +-------+  +-------+   |
|   |  IVF  |              |        |   |  MDF  |  | DTMgF |   |
|   +-------+              |        |   +-------+  +-------+   |
+-------------+------------+        +-------------+------------+
              |                                   |
              |                                   |
              |                                   |
+-------------+-----------------------------------+------------+
|                         Agent Domain                         |
|                                                              |
|     +------+ +------+ +------+ +------+ +------+ +------+    |
|     | AIMF | | ADMF | | IAF  | | AIF  | | TAF  | | AMF  |    |
|     +------+ +------+ +------+ +------+ +------+ +------+    |
+-------------+-----------------------------------+------------+
              |                                   |
              |                                   |
              |                                   |
+-------------+------------+        +-------------+------------+ 
| Resource Access Domain   |        |        User Domain       |
|                          |        |                          |
|         +------+         |        |                          |    
|         | TSF  |         |        |                          |
|         +------+         |        |                          |
+--------------------------+        +--------------------------+

]]></artwork>
        </figure>
        <t>The agent interconnection environment is organized into five conceptual domains:</t>
        <ol spacing="normal" type="1"><li>
            <t>User Domain</t>
          </li>
          <li>
            <t>Agent Domain</t>
          </li>
          <li>
            <t>Identity Management Domain</t>
          </li>
          <li>
            <t>Interconnection Service Domain</t>
          </li>
          <li>
            <t>Resource Access Domain</t>
          </li>
        </ol>
        <t>The lines between conceptual domains represent information exchange relationships.</t>
        <t>Domains are not necessarily physical network segments; they represent responsibility and governance boundaries. A deployment MAY collapse multiple domains into one system, or MAY distribute them across multiple organizations.</t>
      </section>
      <section anchor="conceptual-domains">
        <name>Conceptual Domains</name>
        <section anchor="user-domain">
          <name>User Domain</name>
          <t>The User Domain is the set of users and user environments that initiate tasks and consume final results. A user MAY be a person or an organization.</t>
        </section>
        <section anchor="agent-domain">
          <name>Agent Domain</name>
          <t>The Agent Domain contains agents and agent-side functions required for agent interconnection and collaboration, such as agent description, agent interaction, agent identity maintenance, interconnection authentication, and tool access.</t>
          <t>The agent is the core execution unit of agent interconnection and collaboration. An agent is typically provided and operated by an agent provider. Agents in this domain MUST be able to present identity and comply with authentication / authorization decisions when interacting with other domains.</t>
        </section>
        <section anchor="identity-management-domain">
          <name>Identity Management Domain</name>
          <t>The Identity Management Domain contains functions for identity lifecycle management, credential lifecycle management, and identity verification. It provides services for registering agents, issuing credentials, and verifying identity claims during interconnection.</t>
        </section>
        <section anchor="interconnection-service-domain">
          <name>Interconnection Service Domain</name>
          <t>The Interconnection Service Domain contains functions that enable agents to find and collaborate with each other, including agent capability description management, agent discovery, and message distribution for group interactions.</t>
        </section>
        <section anchor="resource-access-domain">
          <name>Resource Access Domain</name>
          <t>The Resource Access Domain contains tool and resource service functions that agents can invoke, such as tool registries, tool execution services, data services, and other external resources.</t>
        </section>
      </section>
      <section anchor="functional-components">
        <name>Functional Components</name>
        <t>The functional components are grouped by conceptual domains. The list below is a quick index. The detailed descriptions are provided in Table 1.</t>
        <figure anchor="fig-functional-index">
          <name>Functional component index by conceptual domain (informative)</name>
          <artwork><![CDATA[
User Domain
  - User

Agent Domain
  - Agent
  - Agent Identity Maintenance Function (AIMF)
  - Agent Description Maintenance Function (ADMF)
  - Interconnection Authentication Function (IAF)
  - Agent Interaction Function (AIF)
  - Tool Access Function (TAF)
  - Agent Monitoring Function (AMF)

Identity Management Domain
  - Agent Identity Management Function (AIMgF)
  - Credential Management Function (CMgF)
  - Identity Verification Function (IVF)

Interconnection Service Domain
  - Agent Description Management Function (ADMgF)
  - Agent Discovery Function (ADF)
  - Message Distribution Function (MDF)
  - Domain Trust Management Function (DTMgF)

Resource Access Domain
  - Tool Service Function (TSF)
]]></artwork>
        </figure>
        <table anchor="tab-function">
          <name>Functional components summary</name>
          <thead>
            <tr>
              <th align="left">Conceptual Domain</th>
              <th align="left">Functional Components</th>
              <th align="left">Function Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">User Domain</td>
              <td align="left">User</td>
              <td align="left">Initiate tasks; provide authorization and policy input; consume results.</td>
            </tr>
            <tr>
              <td align="left">Agent Domain</td>
              <td align="left">Agent, AIMF, ADMF, IAF, AIF, TAF, AMF</td>
              <td align="left">Execute tasks; maintain local identity and capability description; interact with other agents; access tools; record logs.</td>
            </tr>
            <tr>
              <td align="left">Identity Management Domain</td>
              <td align="left">AIMgF, CMgF, IVF</td>
              <td align="left">Manage identity and credential lifecycle; verify identity claims and credential status.</td>
            </tr>
            <tr>
              <td align="left">Interconnection Service Domain</td>
              <td align="left">ADMgF, ADF, MDF, DTMgF</td>
              <td align="left">Manage/publish capability descriptions; enable discovery; support group messaging and domain federation policies.</td>
            </tr>
            <tr>
              <td align="left">Resource Access Domain</td>
              <td align="left">TSF</td>
              <td align="left">Expose and control access to tools/resources; obtain results.</td>
            </tr>
          </tbody>
        </table>
        <t>The functional boundaries defined here are intended to support interoperability and clear interface definition. A deployment MAY realize a functional component as software, hardware, or a managed service, and MAY consolidate multiple functional components into one product.</t>
        <section anchor="functional-components-in-the-agent-domain">
          <name>Functional Components in the Agent Domain</name>
          <t><strong>1. Agent Identity Maintenance Function (AIMF)</strong></t>
          <t>AIMF maintains the agent's identity information (e.g., AIC) and credentials. AIMF SHOULD support secure storage and update of identity.</t>
          <t><strong>2. Agent Description Maintenance Function (ADMF)</strong></t>
          <t>ADMF maintains agent capability description information (e.g., ACS) used for interconnection. It supports creating, updating, and withdrawing descriptions. ADMF SHOULD ensure that descriptions remain consistent with the agent's current identity and capability state.</t>
          <t><strong>3. Interconnection Authentication Function (IAF)</strong></t>
          <t>IAF performs authentication and authorization checks for interconnection, including mutual verification of peer agents and validation of presented credentials. IAF SHOULD support multiple authentication mechanisms. Deployments are RECOMMENDED to use standardized security protocols such as TLS 1.3 <xref target="RFC8446"/> and mutual authentication where appropriate.</t>
          <t><strong>4. Agent Interaction Function (AIF)</strong></t>
          <t>AIF provides standardized interaction semantics for agent-to-agent communication. It is responsible for session establishment, message exchange, task/context management, and applying security requirements. AIF SHOULD support at least one of point-to-point and grouping interaction patterns between agents.</t>
          <t><strong>5. Tool Access Function (TAF)</strong></t>
          <t>TAF provides the agent-side capability to invoke tools and resources in the Resource Access Domain. It supports discovering available tools, invoking a selected tool, handling tool results, and enforcing access control decisions.</t>
          <t><strong>6. Agent Monitoring Function (AMF)</strong></t>
          <t>AMF exports monitoring and logging data produced by the agent and agent-side functions. It SHOULD support integrity protection and privacy controls.</t>
        </section>
        <section anchor="functional-components-in-the-identity-management-domain">
          <name>Functional Components in the Identity Management Domain</name>
          <t><strong>1. Agent Identity Management Function (AIMgF)</strong></t>
          <t>AIMgF performs identity lifecycle management for agents, including allocation, update, and de-registration of AICs. AIMgF MUST define the policies for uniqueness and governance of issued AICs within its scope.</t>
          <t><strong>2. Credential Management Function (CMgF)</strong></t>
          <t>CMgF issues and manages Agent Credentials associated with AICs. CMgF SHOULD support credential issuance, renewal, suspension, revocation, and status query.</t>
          <t><strong>3. Identity Verification Function (IVF)</strong></t>
          <t>IVF verifies identity claims and credential validity for relying parties. IVF MAY be offered by the same operator as CMgF or by an independent third party. IVF SHOULD support validation of credential authenticity, validity period, and status (e.g., revoked/suspended).</t>
        </section>
        <section anchor="functional-components-in-the-interconnection-service-domain">
          <name>Functional Components in the Interconnection Service Domain</name>
          <t><strong>1. Agent Description Management Function (ADMgF)</strong></t>
          <t>ADMgF manages the lifecycle of agent capability descriptions in the interconnection ecosystem. It supports accepting capability description submissions, validating required fields, reviewing and approving publication policies, publishing descriptions, and de-listing descriptions.</t>
          <t><strong>2. Agent Discovery Function (ADF)</strong></t>
          <t>ADF enables capability-based discovery of candidate partner agents. It receives discovery queries, matches them against available agent descriptions, and returns a candidate set. ADF SHOULD support in-domain discovery; and cross-domain discovery is OPTIONAL, within a configured trust scope.</t>
          <t><strong>3. Message Distribution Function (MDF)</strong></t>
          <t>MDF provides message distribution services for group interactions, such as publish/subscribe or queue-based delivery. MDF is typically used when agents interact in grouping mode.</t>
          <t><strong>4. Domain Trust Management Function (DTMgF)</strong></t>
          <t>DTMgF maintains trust relationships between autonomous domains (e.g., trusted peer domain lists, federation policy). If present, it constrains cross-domain discovery and service-to-service interactions.</t>
        </section>
        <section anchor="functional-components-in-the-resource-access-domain">
          <name>Functional Components in the Resource Access Domain</name>
          <t><strong>1. Tool Service Function (TSF)</strong></t>
          <t>TSF provides access to tools and resources for agents. TSF SHOULD support tool registration or exposure, tool invocation handling, result return, and access control enforcement. TSF MAY represent a single tool, a tool gateway, or a tool execution environment.</t>
        </section>
      </section>
      <section anchor="reference-interfaces">
        <name>Reference Interfaces</name>
        <t>The reference interfaces between functional components are identified as ACP-IF-XX. An ACP-IF interface definition specifies what information is exchanged and what behavior is expected. It does not mandate a specific protocol.</t>
        <section anchor="core-interfaces">
          <name>Core Interfaces</name>
          <table anchor="tab-interface">
            <name>Reference interfaces summary</name>
            <thead>
              <tr>
                <th align="left">Interface ID</th>
                <th align="left">Function A</th>
                <th align="left">Function B</th>
                <th align="left">Interface description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">ACP-IF-01</td>
                <td align="left">AIMF</td>
                <td align="left">AIMgF</td>
                <td align="left">Apply for / update / de-register an AIC; synchronize identity lifecycle state.</td>
              </tr>
              <tr>
                <td align="left">ACP-IF-02</td>
                <td align="left">AIMF</td>
                <td align="left">CMgF</td>
                <td align="left">Apply for / renew / revoke Agent Credentials bound to an AIC.</td>
              </tr>
              <tr>
                <td align="left">ACP-IF-03</td>
                <td align="left">IAF</td>
                <td align="left">IVF</td>
                <td align="left">Verify a peer agent's claimed identity and presented credentials; obtain a verification result / assertion.</td>
              </tr>
              <tr>
                <td align="left">ACP-IF-04</td>
                <td align="left">AIMgF</td>
                <td align="left">CMgF</td>
                <td align="left">Coordinate identity-to-credential binding; synchronize identity and credential status.</td>
              </tr>
              <tr>
                <td align="left">ACP-IF-05</td>
                <td align="left">CMgF</td>
                <td align="left">IVF</td>
                <td align="left">Query credential status and validation material (e.g., issuer keys, revocation state).</td>
              </tr>
              <tr>
                <td align="left">ACP-IF-06</td>
                <td align="left">ADMF</td>
                <td align="left">ADMgF</td>
                <td align="left">Submit / update / withdraw Agent Descriptions; receive publication status.</td>
              </tr>
              <tr>
                <td align="left">ACP-IF-07</td>
                <td align="left">ADMgF</td>
                <td align="left">ADF</td>
                <td align="left">Synchronize published Agent Descriptions and metadata for discovery indexing.</td>
              </tr>
              <tr>
                <td align="left">ACP-IF-08</td>
                <td align="left">AIF</td>
                <td align="left">AIF</td>
                <td align="left">Agent-to-agent interaction (session, task, message exchange) under an agreed interaction mode.</td>
              </tr>
              <tr>
                <td align="left">ACP-IF-09</td>
                <td align="left">AIF</td>
                <td align="left">MDF</td>
                <td align="left">Group interaction via message distribution (create / join group, publish / subscribe, deliver messages).</td>
              </tr>
              <tr>
                <td align="left">ACP-IF-10</td>
                <td align="left">TAF</td>
                <td align="left">TSF</td>
                <td align="left">Tool / resource invocation (discover tools, invoke tools, obtain results, manage context).</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="interface-semantics">
          <name>Interface Semantics</name>
          <ul spacing="normal">
            <li>
              <t><strong>Identity and credential interfaces (ACP-IF-01..05)</strong> provide the basis for trust establishment. Implementations SHOULD support auditability of lifecycle operations.</t>
            </li>
            <li>
              <t><strong>Description and discovery interfaces (ACP-IF-06..07)</strong> enable capability-based agent discovery. Implementations SHOULD support versioning and de-listing of descriptions.</t>
            </li>
            <li>
              <t><strong>Agent interaction interfaces (ACP-IF-08..09)</strong> define how agents exchange tasks, messages, and context. Implementations SHOULD support confidentiality, integrity, replay protection, and access control.</t>
            </li>
            <li>
              <t><strong>Tool access interface (ACP-IF-10)</strong> enables secure invocation of external tools or resources. Implementations SHOULD support least-privilege access and result integrity.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="typical-operational-scenarios">
      <name>Typical Operational Scenarios</name>
      <t>This section illustrates how the functional architecture with conceptual domains, functional components, and interfaces is applied in typical operational scenarios.</t>
      <section anchor="agent-onboarding-identity-credential-and-capability-description">
        <name>Agent Onboarding: Identity, Credential, and Capability Description</name>
        <t>A typical agent onboarding workflow includes:</t>
        <ol spacing="normal" type="1"><li>
            <t>The agent (via AIMF) registers identity with AIMgF (ACP-IF-01) and obtains an AIC.</t>
          </li>
          <li>
            <t>The agent (via AIMF) obtains credentials from CMgF (ACP-IF-02). CMgF and AIMgF coordinate binding and status (ACP-IF-04).</t>
          </li>
          <li>
            <t>The agent (via ADMF) submits an ACS to ADMgF (ACP-IF-06). The ACS links to the agent's AIC and includes access and capability information.</t>
          </li>
          <li>
            <t>ADMgF publishes the ACS and synchronizes to ADF (ACP-IF-07) for discovery indexing.</t>
          </li>
        </ol>
      </section>
      <section anchor="agent-discovery-and-partner-selection">
        <name>Agent Discovery and Partner Selection</name>
        <t>In ACPs, the interaction between agents is task-driven, based on which agents can be divided into two roles:</t>
        <ul spacing="normal">
          <li>
            <t>Leader: Agent who issues tasks and organizes interactions. There should only be one Leader in a complete task execution process.</t>
          </li>
          <li>
            <t>Partner: Agent who accepts tasks and provides services. After Partner receives a task from the Leader, it executes and returns the execution result.</t>
          </li>
        </ul>
        <t>A typical agent discovery workflow includes:</t>
        <ol spacing="normal" type="1"><li>
            <t>A Leader determines required capabilities for a task.</t>
          </li>
          <li>
            <t>The Leader queries ADF with constraints derived from the task (discovery request semantics are realized by ADP).</t>
          </li>
          <li>
            <t>ADF returns a ranked candidate set of Partner agents.</t>
          </li>
          <li>
            <t>The Leader (via IAF) authenticates selected Partners (ACP-IF-03) before starting interaction.</t>
          </li>
        </ol>
      </section>
      <section anchor="agent-interaction-with-point-to-point-and-grouping-mode">
        <name>Agent Interaction with Point-to-point and Grouping Mode</name>
        <t>In AIP, there are three interaction modes between the Leader and the Partner: peer-to-peer mode, grouping mode and hybrid mode.</t>
        <ul spacing="normal">
          <li>
            <t>peer-to-peer mode: In this mode, the Leader maintains separate communication connections with each Partner, ensuring context isolation. Each message in this mode has only one sender and receiver.</t>
          </li>
          <li>
            <t>Grouping mode: In this mode, interaction messages between agents are distributed through a message queue. A message in this mode has only one sender but may has multiple receivers.</t>
          </li>
          <li>
            <t>Hybrid mode: In this mode, the Leader and Partner may interact directly or through the message queue according to the Leader's task planning.</t>
          </li>
        </ul>
        <t>In point-to-point mode, the Leader and each Partner communicate directly via ACP-IF-08.</t>
        <t>In grouping mode, a message distribution service (MDF) is used. Agents create/join groups and exchange messages via ACP-IF-09, while still using ACP-IF-03 for authentication / authorization decisions.</t>
      </section>
      <section anchor="tool-invocation">
        <name>Tool Invocation</name>
        <t>When an agent needs external tools / resources, a typical tool invocation workflow includes:</t>
        <ol spacing="normal" type="1"><li>
            <t>The agent uses TAF to discover available tools (locally cached or via TSF).</t>
          </li>
          <li>
            <t>The agent invokes a tool (ACP-IF-10).</t>
          </li>
          <li>
            <t>TSF executes or brokers the tool and returns results to the agent.</t>
          </li>
        </ol>
      </section>
      <section anchor="agent-monitoring">
        <name>Agent Monitoring</name>
        <t>If agent monitoring is required, agents and services export logs / events via AMF. Monitoring data can be used for troubleshooting, policy enforcement, auditing, and governance.</t>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>This draft introduces the Agent Collaboration Protocols (ACPs) architecture for Internet of Agents. By defining a functional architecture with conceptual domains, functional components and reference interfaces, ACPs can support trusted registration, identity authentication, agent discovery, agent interaction, tool invocation, and agent monitoring. ACPs address the core requirements for interoperability and secure collaboration among heterogeneous agents. The long-term goal of the ACPs is to enable IoA to serve as the critical infrastructure for agent collaboration on complex tasks, as well as to support the future large-scale and diverse applications.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document focuses on the Agent Collaboration Protocols architecture for IoA. Security of IoA is not detailed in this document. Security considerations relevant to deployment with multiple agent service providers are suggested to be deeply discussed through other proposals.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no request for IANA action.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8259.xml">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ACPs-Github" target="https://github.com/AIP-PUB">
          <front>
            <title>ACPs GitHub repository</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
