Network Working Group Y. Yang Internet-Draft Q. Wu Intended status: Informational Huawei Expires: 8 January 2026 D. Lopez Telefonica N. R. Moreno Deutsche Telekom L. Tailhardat Orange ResearchAdd commentMore actions H. Chihi InnovCOM Sup'COM 7 July 2025 Applicability of A2A to the Network Management draft-yang-nmrg-a2a-nm-00 Abstract This document discusses the applicability of A2A to the network management in the multi-domain heterogeneous network environment that utilizes IETF technologies. It explores operational aspect, key components, generic workflow and deployment scenarios. The impact of integrating A2A into the network management system is also discussed. About This Document This note is to be removed before publishing as an RFC. The latest revision of this draft can be found at https://Yuanyuan4666.github.io/A2A/draft-yang-a2a-nm.html. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-yang-nmrg-a2a-nm/. Source for this draft and an issue tracker can be found at https://github.com/Yuanyuan4666/A2A. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 8 January 2026. Copyright Notice Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License. Table of Contents 1. Introduction 2. Conventions and Definitions 3. Overview of key challenges for the network management 3.1. Limitations of 3rd Party Management in Heterogeneous Network Environments 3.2. Static Data Format or Data Model for Management Interface, Unable to Adapt to the Speed of Service Roll Out 3.3. YANG Model Lacks integration with Open APIs 4. Operational Consideration 5. Architecture Overview 5.1. Multi-Agent Communication Deployment Scenario 5.2. Example 6. Impact of integrating A2A on Network Management 6.1. Agent to Agent Interaction 6.2. Agent to Tools Interaction 7. Security Considerations 8. IANA Considerations 9. References 9.1. Normative References 9.2. Informative References Authors' Addresses 1. Introduction With the advancement of large language models (LLMs), the concept of AI agents has gradually attracted significant attention. An AI agent refers to a category of software applications that utilizes LLMs to interact with users or other agents and accomplish specific tasks. Take a multimodal AI agent as an example, it can collaborate with other domain-specific agents to complete diverse tasks such as translation, configuration generation, and API development. A2A provides a standardized way for AI agents to communicate and collaborate across different platforms and frameworks through a structured process, regardless of their underlying technologies. Agents can advertise their capabilities using an 'Agent Card' in JSON format, or send messages to communicate context, replies, artifacts, or user instructions, which make it easier to build AI applications that can interact with heterogeneous AI ecosystems in specific domain. With significant adoption of AI Agents across the Internet,Agent to Agent Communication protocol may become the foundation for the next wave of Internet communication technologies across domains [I-D.rosenberg-ai-protocols]. The application of A2A in the network management field is meant to develop various rich AI driven network applications, realize intent based networks management automation in the multi-vendor heterogeneous network environment. By establishing standard interfaces for dynamic Capability Discovery, intelligent message routing, heterogeneous AI ecosystems interaction,cross- platform collaboration, A2A enables AI Agents to: o Understand contextual nuances o Negotiate and adapt in real-time o Make collaborative decisions o Maintain persistent, intelligent interactions This document discusses the applicability of A2A to the network management in the multi-domain heterogeneous network environment that utilizes IETF technologies. It explores operational aspect, key components, generic workflow and deployment scenarios. The impact of integrating A2A into the network management system is also discussed. 2. Conventions and Definitions * AI Agent: A software system or program that is capable of autonomously performing goals and tasks on behalf of a user or another system. * Agent Card: A common metadata file that describes an agent's capabilities, skills, interface URLs, and authentication requirements. Clients discover and identify the agent through this file. * A2A Server: An AI agent that receives requests and performs tasks * A2A Client: An AI agent that sends requests to servers 3. Overview of key challenges for the network management In large scale network management environment, a large number of devices from different network vendors need to be uniformly managed, especially in the heterogeneous network environment which can lead to the following issues: 3.1. Limitations of 3rd Party Management in Heterogeneous Network Environments In the multi-vendor heterogeneous environment,vendors implementations of YANG models and NETCONF/RESTCONF protocols [RFC6241][RFC8040] exhibit significant divergence. Different vendors implement different YANG models such as IETF YANG, Openconfig YANG, Vendor specific YANG. Some vendors only partially support standard Network management protocols while Other vendors might choose non-stanard network management protocol or telemetry protocol such as gnmi [I-D.openconfig-rtgwg-gnmi-spec], grpc [I-D.kumar-rtgwg-grpc-protocol]. Without standard protocol or open programmable framework with multi-vendors integration drivers, integration various different data models and management protocols and allowing quickly adapt to different device are still big challenges. The same challenge is applied to multi-domain heterogeneous environment. 3.2. Static Data Format or Data Model for Management Interface, Unable to Adapt to the Speed of Service Roll Out The IETF is currently working on and also publishing a set of YANG models for network service configuration. Network Service configurations are built from a combination of network element and protocol configuration, but are specified to service users in more abstract terms, which enables service agility to speed service creation and delivery and allows the deployment of innovative new services across networks. However Network service model provide static interface with a fixed, unchanging format, it is unable to adapt to new service requirements, e.g., when some new service attributes are introduced and correlated with the specific network service model A or knowledge graph B using RDF, it is hard to expose these new attributes or capability through the same management interface which is using network service model A. 3.3. YANG Model Lacks integration with Open APIs Today, Open API has been widely adopted by the northbound interface of OSS/BSS or Network orchestrator while YANG data models have been widely adopted by the northbound interface of the network controller or the southbound interface of the network controller. However Open API ecosystem and YANG model ecosystem are both built as silo and lack integration or mapping between them. 4. Operational Consideration This section outlines operational aspects of A2A with Network management requirements as follows: * _Dynamic Capability Discovery and Negotiation_: Agent can automatically detect and understand each other's capabilities, enabling more intelligent and adaptive interactions, e.g.,client and remote agents can negotiate the correct format needed. * _Task Management_: The communication between a client and remote agent is oriented towards task completion and agents work to fulfill end-user requests. The task object is defined by the protocol and has a lifecycle. Each of the agents can communicate to stay in sync with each other on the latest status of completing a task. * _Automated Workflow Coordination_: Agents comprehend high-level user intent,execute extended workflow sequences. In addition, they enable more intelligent, context-aware agent interactions, e.g., Agents send each other messages to communicate context, replies, artifacts, or user instructions. 5. Architecture Overview Large language models (LLMs) inherently excel at understanding complex user instructions, a capability that becomes even more pronounced in an AI agent-to-agent (A2A) architecture. Beyond merely comprehending sophisticated requirements, they can autonomously orchestrate lengthy network management workflows, making them particularly suitable for large-scale network management scenarios. Therefore, we have introduced the A2A protocol in the network management environments for building an intelligent network management and control platform. 5.1. Multi-Agent Communication Deployment Scenario +-------------+ | User | +-----+-------+ | +-----+-------+ Service Orchestrator | (AI Agent) | +-----+-------+ |Agent to Agent +-------------------+------------------+ | | | +----+-------+ +-----+-------+ +----+------+ Network Controller Network Controller Network Controller |(AI Agent) | | (AI Agent) | |(AI Agent) | +----+-------+ +-----+-------+ +----+------+ | | | | | | Agent to tools Agent to tools Agent to tools | | | +----+-------------------+------------------+------+ | Network | | Devices | +--------------------------------------------------+ In the multi-agent communication deployment scenario, AI Agents can be deployed at both service layer and network layer,e.g., both service orchestrator and network controller can introduce AI Agent and allow Agent to Agent communication. AI Agent within the service orchestrator can provide registry database for other service agents within the network controller to register its location. The interaction in the multi-agent communication deployment scenario can be break down into: * _AI Agent to Agent interaction_ * _AI Agent to Tools interaction_ For AI Agent to Tools interaction, to enable comprehensive functionality, additional protocol extensions are required to address two critical aspects: (1) standardized tool invocation mechanisms for agent-tool interoperability, and (2) monitoring frameworks for tool usage tracking and auditing. AI Agent to Agent interaction, users require a real-time monitoring interface for long-running workflows or tasks requiring continuous supervision with dual capabilities: (1) live network state observation and (2) validation of agent-proposed remediation actions during anomaly resolution scenarios. A general workflow is as follows: * User Input Submission: An operator submits a natural language request to a central AI agent. * Agent Intent Processing: The central AI agent processes natural language inputs by parsing instructions into structured tasks. * Workflow Graph Decision: The central AI agent decomposing tasks into workflow graphs, and distributes subtasks via an Agent Card Registry to specialized subordinate agents based on their capabilities. * Iteration continues until all tasks reach executable leaf tier agents in the hierarchy. * Leaf agents report outcomes to the central agent, which dynamically adjusts the workflow based on result analysis and policy rules. 5.2. Example This section describes the deployment of a network configuration within a secure video meeting context. The scheduling agent is deployed to the Service Orchestrator, while the worker agent is deployed to the network controller. Registered on the Service Orchestrator, the agent card formally defines a worker agent's capabilities, interfaces, and operational characteristics within network management systems. See the following Agent card examples for two worker agents (QoS Agent and Security Agent): # Work Agents Capabilities { "name": "QoSAgent", "description": "Automatically configure QoS policies", "url": "https://qos-agent.example.com/tasks/send", "capabilities": ["QoS_Policy"], "skills": [ { "id": "set_qos", "name": "QoS configuration", "description": "QoS configuration", "inputModes": ["text/structured"], "outputModes": ["text/status"] } ] } { "name": "SecurityAgent", "description": "Automatically configure network security policies", "url": "https://security-agent.example.com/tasks/send", "capabilities": ["IPSEC", "DTLS"], "skills": [ { "id": "enable_encryption", "name": "Encryption method configuration", "description": "Encryption method configuration", "inputModes": ["text/structured"], "outputModes": ["text/status"] } ] } Suppose a user submits a natural language request such as "The meeting will have 100 participants. The security level is Top Secret" to the platform integrated with the Service Orchestrator. The platform parses the request and converts it into JSON format as follows: # Requested Service Configuration { "taskId": "task-multi-001", "action": "deploy_network_configuration", "parameters": { "context": "secure_video_meeting", "scope": "100", "secure_level": "Top Secret", } } The Service Orchestrator sends subtasks in a structured format to the Network Controller. For example, the subtasks for set_qos and enable_encryption are structured as follows: # Set QoS and Enable Encryption Subtasks { "taskId": "task-multi-001", "subTasks": [ { "agent": "QoSAgent", "action": "set_qos", "parameters": { "configuration": { "acceptedOutputModes": [ "text/status" ] }, "minimum_bandwidth": "100Mbps", "priority": "0" } }, { "agent": "SecurityAgent", "action": "enable_encryption", "parameters": { "configuration": { "acceptedOutputModes": [ "text/status" ] }, "encryption_method": "ipsec", "key_management": "dtls", } } ] } The network controller executes network management operations on network devices and returns the results to the Service Orchestrator in JSON format. Example responses for the subtasks are shown below: # Network Configuration Feedback Results { "taskId": "task-multi-001", "action": "deploy_network_configuration", "parameters": { "context": "secure_video_meeting", "scope": "100", "secure_level": "Top Secret", } } { "taskId": "subtask-qos-001", "status": "completed", "artifacts": [{"type": "text", "content": "QoS setup completed"}] } { "taskId": "subtask-sec-001", "status": "completed", "artifacts": [{"type": "text", "content": "IPSEC encryption enabled"}] } 6. Impact of integrating A2A on Network Management 6.1. Agent to Agent Interaction A2A leverages advanced machine learning models or knowledge graph models and sophisticated communication protocols such as one built on top of HTTP, SSE, JSON-RPC. Unlike REST or NETCONF/RESTCONF [RFC6241][RFC8040], other open API that follow predefined, static request-response patterns, A2A introduces a more adaptive communication model which transforms these interactions into dynamic, context-aware conversations. In addition, Agents can now negotiate, interpret subtle contextual cues, and make collaborative decisions in real-time. The cost is more context information needs to be kept as states in both sides. 6.2. Agent to Tools Interaction In case of collaboration between small AI model in the network element and large AI model in the network controller, A2A can be used to negotiate more context related information and invoke the tools. The cost is more context information needs to be kept as states in both sides. In case of no lightweight AI in the network element, REST or NETCONF/ RESTCONF, other open API is sufficient for network management. There is no impact on management protocol used between the network element and the management system. If YANG2CLI script has been deployed in the network element, this script can be used to translate YANG schema into CLI command and mange the 3rd party network device. 7. Security Considerations The communication between Agents for the exchange of context information, capability information and user instruction is security sensitive and requires authentication,authorization and integrity protection. Legacy communication protocols such as HTTPS/TLS, designed for human-centric interactions, simply cannot withstand the high-speed exchanges between intelligent agents. Key security challenges in AI agent communication include: * Identity Verification: Ensuring that agents are who they claim to be * Data Integrity: Preventing unauthorized modifications during transmission * Confidentiality: Protecting sensitive information from potential breaches * Scalable Security: Maintaining robust protection across diverse and complex networks 8. IANA Considerations This document has no IANA actions. 9. References 9.1. Normative References [RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed., and A. Bierman, Ed., "Network Configuration Protocol (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011, . [RFC8040] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017, . 9.2. Informative References [I-D.kumar-rtgwg-grpc-protocol] Kumar, A., Kolhe, J., Ghemawat, S., and L. Ryan, "gRPC Protocol", Work in Progress, Internet-Draft, draft-kumar- rtgwg-grpc-protocol-00, 8 July 2016, . [I-D.openconfig-rtgwg-gnmi-spec] Shakir, R., Shaikh, A., Borman, P., Hines, M., Lebsack, C., and C. Morrow, "gRPC Network Management Interface (gNMI)", Work in Progress, Internet-Draft, draft- openconfig-rtgwg-gnmi-spec-01, 5 March 2018, . [I-D.rosenberg-ai-protocols] Rosenberg, J. and C. F. Jennings, "Framework, Use Cases and Requirements for AI Agent Protocols", Work in Progress, Internet-Draft, draft-rosenberg-ai-protocols-00, 5 May 2025, . Authors' Addresses Yuanyuan Yang Huawei Email: yangyuanyuan55@huawei.com Qin Wu Huawei Email: bill.wu@huawei.com Diego Lopez Telefonica Email: diego.r.lopez@telefonica.com Nathalie Romo Moreno Deutsche Telekom Email: nathalie.romo-moreno@telekom.de Lionel Tailhardat Orange ResearchAdd commentMore actions Email: lionel.tailhardat@orange.com Houda Chihi InnovCOM Sup'COM Email: houda.chihi@supcom.tn