<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tong-network-agent-use-cases-in-6g-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Network AI Agent Use Cases and Requirements in 6G</title>
    <seriesInfo name="Internet-Draft" value="draft-tong-network-agent-use-cases-in-6g-00"/>
    <author initials="Y." surname="Tong" fullname="Ying Tong">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>
          <region>Beijing</region>
          <code>102209</code>
          <country>CN</country>
        </postal>
        <email>tongy@chinatelecom.cn</email>
      </address>
    </author>
    <author initials="A." surname="Sun" fullname="Ao Sun">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>
          <region>Beijing</region>
          <code>102209</code>
          <country>CN</country>
        </postal>
        <email>suna1@chinatelecom.cn</email>
      </address>
    </author>
    <author initials="A." surname="Wang" fullname="Aijun Wang">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>
          <region>Beijing</region>
          <code>102209</code>
          <country>CN</country>
        </postal>
        <email>wangaj3@chinatelecom.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Liu" fullname="Yang Liu">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>
          <region>Beijing</region>
          <code>102209</code>
          <country>CN</country>
        </postal>
        <email>liuyang19@chinatelecom.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Xie" fullname="Yuanbao Xie">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <street>Huajing NewTown，Tianhe District</street>
          <city>Guangzhou</city>
          <region>Guangdong</region>
          <code>510630</code>
          <country>CN</country>
        </postal>
        <email>xieyuanb@chinatelecom.cn</email>
      </address>
    </author>
    <date year="2025" month="November" day="02"/>
    <area>ART Area</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Network Agent</keyword>
    <keyword>6G</keyword>
    <abstract>
      <?line 84?>

<t>This draft introduces use cases related to network AI agents in 6G, with a focus on the interaction workflows of network AI agents in two distinct scenarios: connectivity services and third-party application services. These use cases primarily draw upon 6G-related scenarios outlined in the 3GPP technical report <xref target="TR22.870"/>. Furthermore, the document elaborates on the integration of network AI agents within the 6G framework and discusses corresponding network requirements.</t>
    </abstract>
  </front>
  <middle>
    <?line 88?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In the era of 6G network, the emergence of new services such as AI, computing, and sensing poses unprecedented challenges to network processing capabilities. As autonomous decision-making entities, AI agents are poised to become a core driving force for innovation in network architecture. Through capabilities such as intent understanding, environmental modeling, and cross-domain collaboration, they can dynamically adapt to user demands and network operating conditions, facilitating an intelligent leap toward "proactive optimization" in network. Within the 3GPP R20 6G standardization research, AI agents have already been taken into consideration. At the recent SA1#111 meeting, a total of 41 proposals related to AI agents were submitted, including 18 new use cases, of which 6 were ultimately approved. This paper primarily focuses on how network intelligence can enhance internal quality while simultaneously enabling external empowerment. Specifically, AI agents play a dual role in 6G network: on the user and operator sides, they provide low-latency, high-reliability communication services based on real-time behavior prediction and resource scheduling, thereby improving network quality and user experience; for personalized requests from third-party applications, they expose network capabilities externally through AI agents, enabling external empowerment and fostering innovative scenarios such as smart healthcare IoT and immersive metaverse applications. Section 2 summarizes two categories of relevant cases, Section 3 describes the network framework and requirements, and Section 4 concludes this draft.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>In scenarios involving connectivity services, users or network administrators submit intent-based requests to the 6G network. The network agent can perform accurate intent parsing, conduct task classification and planning, and delegate further strategy formulation and execution to hierarchical service agents, thereby completing network design in accordance with the service intent. For new service scenarios such as AI, the network agent can provide AI capabilities from the network side based on the given intent.</t>
      <section anchor="generative-network-for-connectivity-services">
        <name>Generative Network for Connectivity Services</name>
        <t>Based on service requirements or network status, users or network administrators can submit networking intents to the network. These intents are then fulfilled by agents within the network, which perform cross-domain collaborative optimization and configuration of resources to achieve efficient generative networking.</t>
        <section anchor="process-flow">
          <name>Process Flow</name>
          <ol spacing="normal" type="1"><li>
              <t>David, a network administrator from a certain operator, submits the following request to the network: "A concert will be held at the downtown stadium tomorrow from 19:00 to 22:00. Please design the network to smoothly handle the traffic surge while ensuring the fluency of key user services."</t>
            </li>
            <li>
              <t>The 6G core network Task Orchestration Agent parses the networking intent requirement, performs an initial task breakdown, splits the task, and identifies the agents required for execution. For example, the task is decomposed into multiple subtasks, including intelligent access, resource configuration, service identification, and service policy optimization, involving the Connectivity Agent and the QoS Assurance Agent.</t>
            </li>
            <li>
              <t>The Task Orchestration Agent acquires the data necessary for task execution to support decision-making by the service agents. For instance, it can invoke external tools to obtain historical data and predict the service scale for this networking task through intelligent forecasting and digital twin functionalities. The subtask information is then distributed to the corresponding agents. This information includes task descriptions, task identifiers, task requirements, and task data, supporting the delivery of structured data, intents, control commands, and other types of information to fully convey task instructions.</t>
            </li>
            <li>
              <t>Upon receiving the intelligent access and resource configuration subtasks, the Connectivity Agent addresses user access requests within the area by employing intelligent access algorithms to schedule corresponding 6G network elements for efficient user access. Based on the distribution of user types and services in the area, it utilizes a reinforcement-based generative policy model to allocate and optimize network resources. During the decision-making process, in addition to using the data provided in the task information, the agent also interacts with network elements to obtain real-time data and performs enhanced data analysis.</t>
            </li>
            <li>
              <t>The QoS Assurance Agent receives the subtasks for service identification and service policy optimization. During the networking optimization task, the QoS agent activates the service identification function, providing a service basis for generating networking strategies through service recognition and quality degradation analysis. According to the real-time status of services, it dynamically generates core network optimization strategies. Meanwhile, leveraging its cross-domain coordination capability, it shares strategies with the RAN side to achieve refined resource allocation and optimize service quality.</t>
            </li>
          </ol>
          <t>Based on the task agents' demand analysis and task planning, the Connectivity Agent and the QoS Assurance Agent, through intelligent access, dynamic resource configuration, precise service identification, quality degradation analysis, and leveraging policy generation capabilities, achieve efficient generative networking, thereby ensuring the highly effective execution of the task.</t>
        </section>
        <section anchor="analysis-of-ai-agent-roles">
          <name>Analysis of AI Agent Roles</name>
          <t>This case involves two types of agents. The first type is the central agent, which is responsible for receiving requests from users or network administrators, performing intent recognition, extracting detailed information, and decomposing tasks. The second type of agent is oriented toward specific services and is responsible for task decomposition, policy generation, and execution.</t>
          <t>In this specific case:The role of the central agent is undertaken by the Task Orchestration Agent, which performs intent recognition on the network administrator's request, divides it into multiple subtasks, and extracts key task information to distribute to the corresponding second-type agents.</t>
          <t>The second-type agents are service agents, responsible for policy planning and execution of specific subtasks. In this scenario, two service agents are involved: the QoS Assurance Agent and the Connectivity Agent. Each agent, based on the subtask it receives, leverages its corresponding capabilities to collaboratively accomplish the networking task.</t>
        </section>
      </section>
      <section anchor="network-capability-exposure-to-third-party-services">
        <name>Network Capability Exposure to Third-Party Services</name>
        <t>The concert organizer initiates a high-value user recommendation request to the network via its official "AR Smart Interaction" app. The network then performs statistical analysis based on user contract data and service profiles, delivers the corresponding capability, and assists the third party in formulating a targeted push notification strategy for the app.</t>
        <section anchor="process-flow-1">
          <name>Process Flow</name>
          <ol spacing="normal" type="1"><li>
              <t>During the concert, the organizer provides an immersive interactive service through the official "AR Smart Interaction" app. This third-party app platform sends an intent request to the Capability Exposure Agent to acquire user information for delivering customized services. For example, a request may state: "Please provide me with relevant information for the users on the list, including user profiles, network quality, and service resource allocation, to facilitate customized services." Additionally, the Capability Exposure Agent also supports receiving specified data requests from the third-party app platform via standardized APIs.</t>
            </li>
            <li>
              <t>The 6G core network Capability Exposure Agent parses the intent conveyed by the third-party app platform and decomposes it into tasks directed at the Service Customization Agent. These tasks may include obtaining target user preferences, identifying high-demand users within the target group, and acquiring the network quality of target users. The Capability Exposure Agent then dispatches these tasks to the Service Customization Agent.</t>
            </li>
            <li>
              <t>Upon acquiring task information, the Service Customization Agent invokes data functions to retrieve the required analysis results. This retrieval is performed either from its internal data storage or by obtaining results from other agents and network elements.</t>
            </li>
            <li>
              <t>If existing data cannot fully meet the application requirements, the Service Customization Agent can also retrieve raw data and utilize its built-in functions, such as user profiling and network quality assessment, to generate up-to-date analysis results. For instance, it may interact with the Connectivity Agent to obtain network quality data for relevant users, which is then processed by its network quality assessment function to produce the required results.</t>
            </li>
            <li>
              <t>After gathering all necessary information for the task, the Service Customization Agent reports the results back to the Capability Exposure Agent.</t>
            </li>
            <li>
              <t>The Capability Exposure Agent then provides the requested information to the "Concert AR Smart Interaction" app platform via standardized APIs.</t>
            </li>
            <li>
              <t>With the received data, the "Concert AR Smart Interaction" app platform can deliver customized services based on its own business logic. Examples include selecting preferred interaction methods according to user profiles, recommending services likely to interest the user, and suggesting higher-quality service packages to high-value users.</t>
            </li>
          </ol>
        </section>
        <section anchor="analysis-of-ai-agent-roles-1">
          <name>Analysis of AI Agent Roles</name>
          <t>This case involves two categories of agents. The first category is the central agent, responsible for receiving requests for third-party personalized services, performing intent recognition, extracting detailed information, and conducting task decomposition. The second category comprises service agents, which are oriented toward specific services and handle task decomposition, policy generation, and execution.</t>
          <t>In this specific case:The role of the central agent is fulfilled by the Capability Exposure Agent, which performs intent recognition on requests from third-party applications and distributes subtasks to the Service Customization Agent.The Service Customization Agent is responsible for the analysis, execution, and feedback of the specific subtasks.</t>
        </section>
      </section>
    </section>
    <section anchor="architecture-and-potential-requirements-of-ai-agent-integrated-6g-network">
      <name>Architecture and Potential Requirements of AI Agent-Integrated 6G Network</name>
      <section anchor="ai-agent-integrated-6g-network-framework">
        <name>AI Agent-Integrated 6G Network Framework</name>
        <t>The 6G network framework incorporating network AI agents is primarily structured into three layers:</t>
        <ol spacing="normal" type="1"><li>
            <t>The first layer is the Central Intelligence Layer, composed of the Task Orchestration Agent and the Capability Exposure Agent. The Task Orchestration Agent is responsible for receiving requests from the user side and the network management side. The Capability Exposure Agent handles capability exposure requests from external applications.</t>
          </li>
          <li>
            <t>The second layer is the Service Agent Layer, which consists of multiple service agents, including but not limited to the QoS Assurance Agent, Connectivity Agent, and Service Customization Agent. Each service agent is responsible for the analysis, decision-making, and execution of its corresponding tasks. During operation, service agents need to communicate with network elements and external tools to collaboratively complete their assigned tasks.
            </t>
            <ul spacing="normal">
              <li>
                <t>The functionalities of the QoS Assurance Agent may include service identification, quality degradation analysis, and dynamic parameter adjustment.</t>
              </li>
              <li>
                <t>The functionalities of the Connectivity Agent may include intelligent access, mobility management optimization, and resource configuration.</t>
              </li>
              <li>
                <t>The functionalities of the Service Customization Agent may include user profiling, network quality assessment, and service orchestration.</t>
              </li>
            </ul>
            <t>
By leveraging their respective capabilities, the service agents work in coordination to accomplish specific tasks.</t>
          </li>
          <li>
            <t>The third layer is the Atomic Capability Layer, which comprises network elements and tools. This layer provides the fundamental capabilities required for the service agents to execute their various tasks.</t>
          </li>
        </ol>
      </section>
      <section anchor="potential-network-requirements">
        <name>Potential Network Requirements</name>
        <t>Based on the above case studies and framework, the network side must possess the following capabilities:</t>
        <ol spacing="normal" type="1"><li>
            <t>The network must support the reception of intent-based requests, such as user-side intents, network management intents, and third-party requests for capability exposure. The central-layer agents must be capable of identifying and parsing these intents.</t>
          </li>
          <li>
            <t>The network must support communication protocols between AI agents, enabling direct interaction among network AI agents to collaboratively complete tasks.</t>
          </li>
          <li>
            <t>The network must support communication protocols between AI agents and external tools or network elements. During task execution, service agents need to invoke network elements or specific tools to fulfill their responsibilities.</t>
          </li>
          <li>
            <t>The network must possess identity management capabilities for network AI agents. For instance, the Task Orchestration Agent should manage the identities and capabilities of other agents to assign specific subtasks to the appropriate agents. Similarly, the Connectivity Agent should be able to manage the identities of external AI agents, ensuring their secure access and supporting on-demand networking, among other requirements.</t>
          </li>
          <li>
            <t>The network must enable the exposure of network AI agent capabilities to external parties, thereby supporting innovative third-party services.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="conclusion">
      <name>Conclusion</name>
      <t>In 6G network, AI agents can function both as communication entities and as tools for empowering the network. This chapter analyzes the potential benefits of introducing AI agents into 6G through two types of case studies. It also examines how network AI agents can be integrated into the 6G architecture and identifies the corresponding network requirements.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>This document should not affect the security of the Internet.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="TR22.870">
          <front>
            <title>Study on 6G Use Cases and Service Requirements</title>
            <author>
              <organization>3GPP TR 22.870</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 208?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
