<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="std" docName="draft-yuan-rtgwg-traffic-agent-usecase-00"
     ipr="trust200902">
  <front>
    <title abbrev="Traffic Agent Usecase">Use cases of the AI Network Traffic
    Optimization Agent</title>

    <author fullname="Quan Yuan" initials="Q." surname="Yuan">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>yuanquan25@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Jianwei Mao" initials="J." surname="Mao">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>maojianwei@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Bing Liu" initials="B." surname="Liu">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>leo.liubing@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Nan Geng" initials="N." surname="Geng">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>gengnan@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Xiaotong Shang" initials="X." surname="Shang">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>shangxiaotong@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Qiangzhou Gao" initials="Q." surname="Gao">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>gaoqiangzhou@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Zhenbin" initials="Z." surname="Li">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>robinli314@163.com</email>

        <uri/>
      </address>
    </author>

    <date day="1" month="November" year="2025"/>

    <abstract>
      <t>This document introduces AI Network Traffic Optimization Agents as a
      dynamic alternative to traditional static network optimization methods.
      These AI entities analyze real-time network status (e.g., latency, node
      load) and adjust resources flexibly&mdash;deployed centrally or on
      devices&mdash;to enhance efficiency, ensure service quality, and cut
      operational costs. It defines network traffic optimization (maximizing
      resource use, meeting QoS) and AI agents (autonomous, learning entities
      that reduce manual work), then details three key application scenarios:
      tunnel adjustment (adaptive routing, predictive bandwidth, fault
      recovery), traffic steering (classification, application-aware policies,
      pre-emptive load balancing), and network slice adjustment (lifecycle
      automation, SLA compliance, slice-specific fault fixes). The document
      emphasizes the agents&rsquo; role in enabling SLA-compliant, autonomous
      optimization for complex networks.</t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>AI Network Traffic Optimization Agents are intelligent entities that
      analyze real-time network telemetry (e.g., bandwidth occupancy, latency,
      node load, packet loss) and dynamically adjust network resources on
      behalf of operators. Their core goals are to boost network efficiency,
      guarantee service quality, and lower operational costs for end-users.
      These agents offer flexible deployment: they can be implemented on
      centralized network management platforms to integrate global data for
      holistic optimization, or embedded in edge devices (e.g., routers,
      switches, IoT gateways) to respond in real time to local traffic
      fluctuations.</t>

      <t>This deployment flexibility not only integrates intelligent
      decision-making with network infrastructure but also breaks through the
      rigid interaction barriers of traditional networks. Unlike conventional
      network devices, which rely on strict, fully standardized protocols for
      communication&mdash;often plagued by version incompatibility and format
      constraints&mdash;AI agents enable adaptive, context-aware inter-device
      collaboration. They natively support semi-structured data exchange and
      natural language interaction, allowing seamless communication across
      heterogeneous devices and reducing friction from fragmented
      protocols.</t>

      <t>Traditional network optimization relies heavily on static
      configuration rules and manual adjustments, limiting it to
      coarse-grained issue resolution. During traffic surges (e.g., peak
      e-commerce sales, large-scale video conferences), this approach fails to
      adapt promptly, leading to increased latency or packet
      loss&mdash;especially detrimental to mission-critical applications
      requiring stable transmission. In contrast, AI Network Traffic
      Optimization Agents enable fine-grained, autonomous optimization: they
      steer traffic to underutilized paths that meet application-specific SLA
      requirements, or allocate exclusive resource channels for high-priority
      services, ensuring performance remains unaffected by non-critical
      traffic. Their interactive capabilities further amplify these
      advantages, enabling faster cross-device coordination and more agile
      response to dynamic network changes.</t>
    </section>

    <section title="Requirements Language">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
      "OPTIONAL" in this document are to be interpreted as described in RFC
      2119<xref target="RFC2119"> </xref>.</t>
    </section>

    <section title="Network Traffic Optimization and AI Agent">
      <section title="Network Traffic Optimization">
        <t>Network traffic optimization encompasses a suite of technologies,
        strategies, and practices focused on monitoring, managing, and
        dynamically adjusting data flows across a network. Its core objectives
        are to maximize the efficiency of network resources (e.g., bandwidth,
        node capacity), mitigate issues such as congestion, latency, and
        packet loss, and ensure critical applications (e.g., online gaming,
        financial transactions, real-time video conferencing) meet their
        required Quality of Service (QoS) standards.</t>

        <t>By redistributing traffic to underutilized paths, prioritizing
        high-priority requests, and smoothing sudden traffic surges, it
        transforms passive network management into proactive adjustment. This
        approach supports the stable operation of modern complex networks
        (including 5G, edge computing, and multi-vendor hybrid environments)
        while minimizing unnecessary operational costs&mdash;with AI-driven
        interaction capabilities further enhancing its adaptability to
        heterogeneous network ecosystems.</t>
      </section>

      <section title="AI Agent">
        <t>An AI Agent is an automated intelligent entity designed to act on
        behalf of users, systems, or organizations to achieve specific goals.
        Its core capabilities include:</t>

        <t><list style="symbols">
            <t>Perceiving contextual information (e.g., real-time network
            status, user behavior, environmental changes) through multi-source
            data collection;</t>

            <t>Analyzing data via advanced algorithms (e.g., machine learning,
            reinforcement learning) to derive actionable insights;</t>

            <t>Making autonomous decisions and executing tasks independently
            or in collaboration with other agents;</t>

            <t>Supporting semi-structured data exchange (e.g., schema-less
            telemetry metrics, partial configuration snippets) to break free
            from rigid format constraints;</t>

            <t>Enabling natural language interaction (NLI) for simplified
            human-device and inter-device communication.</t>
          </list></t>

        <t>Unlike traditional static programs, AI Agents can self-learn and
        iterate based on historical data, adapting to dynamic scenarios (e.g.,
        real-time traffic path adjustment, personalized policy execution).
        Their key value lies in reducing manual intervention, improving task
        efficiency, and addressing complex problems requiring real-time,
        data-driven decision-making. Critically, their flexible interaction
        models reduce reliance on strict standardization, minimizing version
        compatibility issues and enabling seamless integration of new
        devices&mdash;laying the foundation for rapid network iteration and
        scalability.</t>
      </section>
    </section>

    <section title="Usage Scenarios of the AI Network Traffic Optimization Agent">
      <t>This section outlines typical application scenarios of AI Network
      Traffic Optimization Agents across three key network operation domains:
      tunnel adjustment, traffic steering into tunnels, and network slice
      adjustment. Leveraging AI algorithms and real-time telemetry, the agents
      automate optimization, enhance service reliability, and ensure SLA
      compliance&mdash;while their interactive capabilities (semi-structured
      data support, natural language interaction) amplify efficiency and
      scalability.</t>

      <section title="Tunnel Adjustment">
        <t>AI Network Traffic Optimization Agents optimize tunnels (e.g.,
        RSVP-TE tunnels, SRv6 tunnels) by dynamically adapting to network
        conditions, ensuring efficient data transmission and fault resilience.
        Their interactive capabilities streamline cross-device coordination,
        accelerating decision-making and recovery.</t>

        <section title="Adaptive Tunnel Routing">
          <t>Agents collect real-time telemetry (e.g., link utilization,
          latency, packet loss) and network topology information (via
          protocols such as BGP-LS or IS-IS). Using machine learning-based
          routing algorithms (e.g., reinforcement learning for path
          selection), they identify optimal tunnel paths. When congestion or
          link degradation is detected, agents proactively recompute paths and
          share intent-driven instructions (via semi-structured data) with
          routers/switches to minimize end-to-end latency without relying on
          rigid protocol syntax.</t>
        </section>

        <section title="Predictive Bandwidth Allocation">
          <t>Agents analyze historical traffic patterns (e.g., diurnal peaks
          for enterprise services) to predict future bandwidth demands for
          each tunnel. Through tunnel signaling protocols (e.g., RSVP-TE),
          they implement dynamic adjustment: reducing allocation during
          off-peak periods to avoid waste, and scaling up bandwidth
          preemptively before traffic surges. Operators can also fine-tune
          prediction parameters via natural language prompts (e.g.,
          &ldquo;Increase bandwidth buffer for weekday 9 AM video
          conferences&rdquo;), simplifying policy updates.</t>
        </section>

        <section title="Autonomous Fault Detection and Recovery">
          <t>Agents monitor real-time tunnel KPIs (e.g., availability, jitter)
          and use anomaly detection models (e.g., autoencoders) to identify
          faults (e.g., link failures). Upon detection, they automatically
          share fault details (via semi-structured data) with other agents and
          initiate recovery actions (e.g., switching traffic to
          pre-provisioned backups). This cross-agent collaboration reduces
          Mean Time to Recovery (MTTR) by eliminating manual coordination
          delays.</t>
        </section>
      </section>

      <section title="Traffic Steering into Tunnels">
        <t>AI Network Traffic Optimization Agents enable fine-grained traffic
        steering, mapping flows to tunnels that align with their QoS
        requirements. Their support for multi-format data and natural language
        interaction simplifies policy configuration and cross-device
        coordination.</t>

        <section title="Traffic Classification and Priority Mapping">
          <t>The agent can perform deep packet inspection (DPI) and flow
          analysis (via protocols such as NetFlow v9 or IPFIX) to classify
          traffic based on service type (e.g., VoIP, 4K video, bulk data),
          user priority (e.g., VIP users), and QoS class.Through policy-based
          routing (PBR) or segment routing policies, it maps classified
          traffic to tunnels with QoS capabilities that match the
          traffic&rsquo;s needs&mdash;for example, low-latency tunnels for
          VoIP or high-bandwidth tunnels for bulk data.</t>
        </section>

        <section title="Application-Aware Steering Policies">
          <t>Agents use application signature recognition (e.g., TLS SNI, DNS
          queries) to identify application-specific traffic (e.g., Zoom, AWS
          S3 transfers). They enforce application-specific rules: real-time
          applications are directed to tunnels with guaranteed latency
          (&lt;50ms) and low packet loss (&lt;0.1%), while non-critical
          traffic uses cost-efficient tunnels. Operators can define these
          rules via natural language (e.g., &ldquo;Route all IoT sensor data
          to shared low-cost tunnels&rdquo;), with agents translating prompts
          into executable policies&mdash;reducing configuration
          complexity.</t>
        </section>

        <section title="Pre-emptive Traffic Load Balancing">
          <t>Agents forecast traffic hotspots (e.g., regional surges from
          events) using time-series models (e.g., LSTM). They implement
          pre-emptive steering to distribute predicted heavy traffic across
          parallel tunnels, preventing overload. Agents share load
          distribution plans with edge devices via semi-structured data,
          ensuring uniform resource utilization across the network without
          strict protocol alignment.</t>
        </section>
      </section>

      <section title="Network Slice Adjustment">
        <t>AI Network Traffic Optimization Agents support the lifecycle
        management and optimization of Network Slice Instances (NSIs),
        focusing on resource efficiency, SLA compliance, and fault resilience.
        Their flexible interaction models enable seamless collaboration
        between slice-specific agents, accelerating slice deployment and
        adjustment.</t>

        <section title="NSI Lifecycle Automation">
          <t>Agents participate in NSI design by using slice requirements
          (e.g., bandwidth, latency, isolation) to recommend optimal resource
          allocation (e.g., CPU, bandwidth, tunnel assignments) and topology
          configurations (e.g., dedicated vs. shared tunnels). They automate
          instantiation and termination: during deployment, agents coordinate
          across devices to deploy required tunnels and steering rules (via
          semi-structured data exchange); upon termination, they release
          resources to prevent leakage. This cross-agent collaboration reduces
          reliance on standardized interfaces, enabling faster slice
          deployment.</t>
        </section>

        <section title="Closed-Loop SLA Compliance">
          <t>Agents monitor slice-level KPIs (e.g., throughput, latency) in
          real time and compare them against SLA thresholds (e.g., 100 Mbps
          minimum throughput, 100ms maximum latency). When SLA violations are
          predicted or detected, they trigger closed-loop adjustments (e.g.,
          augmenting tunnel bandwidth, optimizing routing paths). Operators
          can also set SLA thresholds via natural language (e.g.,
          &ldquo;Ensure industrial IoT slice latency stays below 80ms&rdquo;),
          making policy updates intuitive and agile.</t>
        </section>

        <section title="Slice-Specific Fault Remediation">
          <t>The agent can analyze multi-dimensional slice alarms (e.g.,
          tunnel faults within the slice, resource shortages) via correlation
          models that integrate slice topology and historical fault data. It
          enables slice-aware fault recovery: it identifies the root cause of
          slice degradation (e.g., a failed tunnel in the slice&rsquo;s path)
          and executes slice-specific remediation (e.g., re-provisioning a
          dedicated backup tunnel for the slice), thereby minimizing impact on
          the slice&rsquo;s services.</t>
        </section>
      </section>
    </section>

    <section title="Conclusion">
      <t>This document systematically elaborates on AI Network Traffic
      Optimization Agents, covering their role in addressing traditional
      network limitations, core definitions of network traffic optimization
      and AI agents, and practical application scenarios. Beyond dynamic
      resource allocation and SLA-compliant optimization, these agents deliver
      transformative value through enhanced inter-device interaction
      capabilities.</t>

      <t>By supporting semi-structured data exchange, AI agents break free
      from the rigid format constraints of traditional network protocols,
      enabling seamless communication across heterogeneous devices and
      vendors. Natural language interaction simplifies policy configuration
      and human-device collaboration, lowering operational barriers. These
      features reduce reliance on strict standardization and mitigate version
      compatibility issues, fostering network scalability and enabling rapid
      iteration of optimization strategies.</t>

      <t>In complex environments such as 5G, edge computing, and multi-vendor
      hybrid networks, AI Network Traffic Optimization Agents serve as a
      cornerstone of next-generation intelligent networks. They not only
      automate fine-grained optimization to enhance efficiency and service
      quality but also through flexible interaction models, enable agile
      response to dynamic traffic patterns and emerging service
      requirements&mdash;future-proofing networks against technological
      evolution while minimizing operational costs. As network ecosystems grow
      more complex, the interactive and adaptive capabilities of these AI
      agents will become increasingly critical to unlocking the full potential
      of intelligent network management.</t>
    </section>

    <section title="Security Considerations">
      <t>TBD.</t>
    </section>

    <section title="IANA Considerations">
      <t>TBD.</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include='reference.RFC.2119'?>
    </references>
  </back>
</rfc>
