<?xml version="1.0" encoding="US-ASCII"?>
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private) -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY rfc2119 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
]>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="info" docName="draft-wang-lisp-ai-agent-01" ipr="trust200902">
  <front>
    <title abbrev="lisp-ai-agent">Using LISP as a Network Substrate for AI
    Agent Communication</title>

    <author fullname="Wei Wang" initials="W" surname="Wang">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <region>Beijing</region>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>weiwang94@foxmail.com</email>
      </address>
    </author>

    <author fullname="Chongfeng Xie" initials="C" surname="Xie">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <region>Beijing</region>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>xiechf@chinatelecom.cn</email>
      </address>
    </author>

    <date day="3" month="April" year="2026"/>

    <area>RTG Area</area>

    <workgroup>LISP Working Group</workgroup>

    <keyword>RFC</keyword>

    <abstract>
      <t>The emergence of distributed artificial intelligence (AI) systems,
      particularly those composed of autonomous agents operating across cloud,
      edge, and endpoint environments, introduces new networking requirements.
      These include location transparency, seamless mobility, multi-homing,
      and logical isolation at scale. This document explores how the
      Locator/ID Separation Protocol (LISP) can serve as a robust network
      substrate to meet these requirements. The document outlines use cases,
      design considerations, and minimal extensions to the existing LISP
      framework to support context-aware mapping and AI agent-centric
      communication.</t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>Modern AI systems are increasingly distributed, comprising autonomous
      software entities referred to as AI agents that collaborate across
      heterogeneous infrastructure, including public clouds, private data
      centers, edge nodes, and end-user devices. These AI agents may migrate
      dynamically (e.g., due to resource constraints, latency optimization, or
      failure recovery), yet their communication sessions must remain
      uninterrupted.</t>

      <t>Traditional IP networking binds identity and location into a single
      address, making seamless mobility and multi-homing challenging without
      application-layer intervention (e.g., session re-establishment or DNS
      updates). The Locator/ID Separation Protocol (LISP) <xref
      target="RFC9300"/>, however, decouples identity from location, enabling
      transparent mobility and flexible traffic engineering. This document
      proposes using LISP as a network substrate for AI agent communication.
      We show how LISP&rsquo;s existing architecture naturally supports key
      requirements of AI agent communications, and we propose minimal,
      backward-compatible extensions to enable context-aware routing decisions
      driven by agent-level semantics.</t>

      <t>The goal is not to redefine LISP, but to illustrate how it can be
      leveraged and slightly enhanced to serve as a foundational layer for
      next-generation intelligent systems.</t>

      <section title="Requirements Language">
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
        "OPTIONAL" in this document are to be interpreted as described in BCP
        14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only
        when, they appear in all capitals, as shown here.</t>
      </section>
    </section>

    <section title="Terminology">
      <t>The following terms are used in this draft:<list style="symbols">
          <t>Endpoint Identifier (EID) <xref target="RFC9299"/>: Addresses
          assigned topologically to network attachment points. Typically
          routed inter-domain. An AI-agent system will be assigned one or more
          EID addresses.</t>

          <t>xTR <xref target="RFC9299"/>: A router that implements both ITR
          and ETR functionalities. An xTR can be co-located with an AI-agent
          EID or be part of a LISP site where AI agents are assigned EID
          addresses. That is, an EID and an RLOC-set can be on the mobile
          agent or the mobile agent can move to new RLOC xTRs. xTR can be
          muli-homed , when underlay performance changes, the xTR can select
          better paths to other AI agents.</t>

          <t>Map-Server <xref target="RFC9301"/>: A Map-Server stores the
          mapping information and relationships published by xTRs and returns
          key-value pairs to the requester.</t>

          <t>Map-Resolver <xref target="RFC9301"/>: A network infrastructure
          component that accepts LISP Encapsulated Map-Requests, typically
          from an ITR, and determines whether or not the destination IP
          address is part of the EID namespace; if it is not, a Negative
          Map-Reply is returned. Otherwise, the Map-Resolver finds the
          appropriate EID-to-RLOC mapping by consulting a mapping database
          system. This mechanism can be used for agent-to-agent packet
          delivery, AI agent discovery, and AI agent capability inventory.</t>

          <t>Instance ID (IID) <xref target="RFC9299"/>: A 24-bit identifier
          used to create isolated VPN groups.</t>

          <t>AI agent: A software entity capable of perception,
          decision-making, and action, often operating autonomously or in
          coordination with other AI agents. An AI agent is discoverable via
          an Endpoint Identifier (EID) or a Distinguished Name, distinguished
          by the use of specific LISP Canonical Address Format (LCAF)
          encodings for its EID.</t>

          <t>Agent VPN Group: A logical collection of AI agents that share a
          common task, security policy, or privacy level. Each group is
          associated with a unique LISP IID, which serves to isolate the
          domain and facilitate mechanisms such as EID Anycast for discovering
          the topologically closest agent within the group.</t>
        </list></t>

      <t/>
    </section>

    <section title="Requirements from AI agent communication">
      <section title="Persistent identity across mobility">
        <t>AI agents must maintain a consistent network identity when
        migrating across hosts or networks; if traditional IP addresses are
        used as identity identifiers, any change in address will disrupt
        existing communication sessions and require upper-layer applications
        to reestablish connections, thereby compromising communication
        continuity and the overall capability of AI systems.</t>
      </section>

      <section title="Logical isolation of Agent VPN Groups">
        <t>Even when multiple agent VPN groups operate on the same physical or
        virtual network infrastructure, they must be isolated from one another
        to prevent interference and ensure that their respective security
        policies are strictly enforced.</t>

        <t>Agent VPN groups can be deployed across the same or different
        underly networks, relying on one or more mapping systems. This sharded
        deployment model presents specific trade-offs and advantages.</t>
      </section>

      <section title="Context-aware routing">
        <t>To facilitate dynamic path selection based on communication intent
        (such as the requirements for latency or security), AI agents should
        employ a multi-homed deployment equipped with multiple wireless
        interfaces. This architecture ensures path diversity across different
        network providers, allowing the network to select the optimal
        transmission route that satisfies the agent's specific context.</t>
      </section>
    </section>

    <section anchor="substrate" title="LISP as a Network Substrate">
      <t/>

      <section title="AI agent identity as EID">
        <t>Each AI agent is assigned a stable EID that serves as its permanent
        network identity, remaining invariant regardless of execution location
        or mobility events. The identifier may be implemented as an
        auto-generated random number or a structured prefix to support
        aggregation, depending on routing flexibility requirements.</t>

        <t>The discovery of an AI agent is not predicated on the bit-pattern
        of the address itself, but rather on rich metadata within the mapping
        system. This includes records such as Distinguished Names,
        JSON-encoded capabilities, geo-location data, and traffic engineering
        constraints, allowing for context-aware resolution beyond simple
        address matching.</t>
      </section>

      <section title="Attachment points as RLOCs">
        <t>When an AI agent runs on a host connected to the network, the local
        xTR registers the AI agent&rsquo;s EID along with one or more RLOCs.
        Multiple RLOCs enable multi-homing, with each RLOC annotated with
        capabilities.</t>

        <t>When an AI agent operates on a host, the registration of its
        Endpoint Identifier (EID) with one or more Routing Locators (RLOCs)
        depends on the deployment architecture:<list style="symbols">
            <t>xTR co-located with AI agent: In this scenario, the xTR resides
            within the AI agent's system. The AI agent is assigned a stable
            EID, while the RLOC is assigned by the current network provider.
            As the AI agent roams across different locations and network
            providers, the EID remains constant, but the underlying RLOC
            changes. The local xTR updates the mapping system with the new
            EID-to-RLOC binding.</t>

            <t>AI agent behind stationary xTR: In this scenario, the xTR is a
            fixed infrastructure component (e.g., a router in a data center or
            site). The xTR typically registers a covering EID-prefix (e.g.,
            /16) representing the entire site. When AI agents move within this
            local domain, their mobility is handled by the underlay routing
            within the site, and no updates to the global mapping system are
            required. Only when an agent moves outside this domain to a
            different set of xTRs does it need to register its specific EID
            with the new infrastructure.</t>
          </list></t>
      </section>

      <section title="Instance ID for agent VPN groups">
        <t><figure>
            <artwork><![CDATA[+------------------------------------------+
|                  IID = 1                 |
|                                          |
|+------------+-----+  +------------+-----+|
|| AI agent 1 | xTR |  | AI agent 2 | xTR ||
|+------------+-----+  +------------+-----+|
|   EID:240.1.1.1         EID:240.2.2.2    |
|                                          |
|+------------+-----+  +------------+-----+|
|| AI agent 3 | xTR |  | AI agent 4 | xTR ||
|+------------+-----+  +------------+-----+|
|   EID:240.3.3.3         EID:240.4.4.4    |
+------------------------------------------+

+------------------------------------------+
|                  IID = 2                 |
|                                          |
|+------------+-----+  +------------+-----+|
|| AI agent 1 | xTR |  | AI agent 2 | xTR ||
|+------------+-----+  +------------+-----+|
|   EID:240.1.1.1         EID:240.2.2.2    |
|                                          |
|+------------+-----+  +------------+-----+|
|| AI agent 3 | xTR |  | AI agent 4 | xTR ||
|+------------+-----+  +------------+-----+|
|   EID:240.3.3.3         EID:240.4.4.4    |
+------------------------------------------+
   Figure 1 Address overlap by using IID
]]></artwork>
          </figure></t>

        <t>As shown in Figure 1, LISP Instance IDs (IIDs) <xref
        target="RFC9299"/> enable multiple virtual networks to operate over
        the same physical infrastructure, providing scalable and secure
        multi-tenancy for heterogeneous AI agent workloads. To ensure
        isolation between different agent VPN groups, especially when EID
        addressing schemes might overlap. Each agent VPN group is assigned a
        unique IID.</t>

        <t>This mechanism allows for efficient address reuse across isolated
        domains. For example, a GPU cluster in IID 1 could assign EIDs
        240.1.1.1, 240.1.1.2, etc., to its agents. A completely different
        cluster in IID 2 could reuse those exact same EID prefixes without
        conflict, as the distinct IID scopes the addressing.</t>

        <t/>
      </section>
    </section>

    <section title="Architecture Overview">
      <section title="The architecture of LISP for AI agent communication.">
        <t>The LISP provides the network substrate that enables stable
        identity, mobility, multi-homing, and policy-aware routing for AI
        agents. It consists of several logically distinct but tightly
        coordinated components, as illustrated in Figure 2.<figure>
            <artwork><![CDATA[+--------------------------------------------------+
|                AI agent Host                     |
|  +----------------+    +---------------------+   |
|  | AI agent       |    | xTR                 |   |
|  | (EID = e1)     |<-->| Encap / Decap       |   |
|  +----------------+    +----------+----------+   |
|                                   ^              |
+-----------------------------------|--------------+
                                    |
          Map-Register (EID->RLOC)  |  Map-Request/Reply
                                    v
+------------------+      +----------------------+
|   Map-Server     |<---->|   Map-Resolver       |
| (stores bindings)|      | (resolves queries)   |
+------------------+      +----------+-----------+
                                     |
                                     | Recursive lookup
                                     v
                          +--------------------+
                          | Mapping Hierarchy  |
                          | (e.g., DDT tree)   |
                          +--------------------+

Figure 2 The architecture of LISP for AI agent communication.
]]></artwork>
          </figure></t>

        <t/>
      </section>

      <section title="Data Flow Example">
        <t>The normal data-flow has been described in <xref target="RFC9300"/>
        and mobility movement has been described in both <xref
        target="I-D.ietf-lisp-mn"/> and <xref
        target="I-D.ietf-lisp-eid-mobility"/>.</t>

        <t>Consider agent A (EID_A) sending a message to agent B (EID_B):<list
            style="numbers">
            <t>Agent A sends a standard IP packet to EID_B.</t>

            <t>The local xTR (acting as ITR) intercepts the packet.</t>

            <t>ITR queries the mapping system via a Map-Resolver for
            EID_B.</t>

            <t>The mapping system returns a Map-Reply containing one or more
            RLOCs for EID_B, possibly filtered by context.</t>

            <t>ITR encapsulates the original packet in a LISP header (with
            optional IID) and forwards it to the selected RLOC_B.</t>

            <t>The destination xTR (ETR) decapsulates and delivers the packet
            to agent B.</t>
          </list>If agent B migrates to a new host, it registers its EID with
        a new RLOC. Subsequent Map-Requests return the updated mapping, and
        communication resumes transparently.</t>
      </section>
    </section>

    <section title="Extending LCAF for capability-aware mapping in AI agent communication">
      <t>The LISP Canonical Address Format (LCAF) <xref target="RFC8060"/>
      further extends LISP by allowing EIDs and RLOCs to carry structured,
      non-IP identifiers such as Instance IDs, application-layer ports, or
      geographic coordinates, within a type-length-value (TLV) framework.</t>

      <t>However, emerging use cases involving autonomous AI agents such as
      personal assistants, industrial digital twins, and multi-agent
      collaboration systems introduce new requirements that go beyond
      traditional network-layer addressing:<list style="symbols">
          <t>Semantic identities: AI agent identifiers are often URIs or
          Decentralized Identifiers (DIDs), not IP addresses.</t>

          <t>Dynamic capabilities: An AI agent should support the ability to
          perform tasks (for example, medical-image-analysis) is
          context-dependent and must be discoverable.</t>

          <t>Conditional discovery: A caller may wish to discover AI agents
          that satisfy constraints on latency, location, or security policy,
          not just a specific EID.</t>
        </list>Current LISP mapping mechanisms only support exact-match
      queries on flat EID spaces. To enable capability-aware service discovery
      in AI agent communication, we propose an extension to LCAF that allows
      Map-Request messages to express structured query predicates, and
      Map-Reply messages to return enriched, filtered results.</t>

      <section title="Query Expression LCAF (QE-LCAF)">
        <t>To encapsulate structured discovery requests, this draft defines a
        new LCAF type: Query Expression LCAF (QE-LCAF). Its format is shown in
        Figure 3.<figure>
            <artwork><![CDATA[    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI = 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  Type = TBD   |     Rsvd2     |            Length             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                  Query Expression (variable)                  |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

           Figure 3 The format of Query Expression LCAF]]></artwork>
          </figure></t>

        <t>Where:<list style="symbols">
            <t>Type: TBD (to be assigned by IANA).</t>

            <t>Flags: Currently unused; set to zero.</t>

            <t>Length: Length of the Query Expression field in bytes.</t>

            <t>Query Expression: A self-describing, serialized query object
            that may include the target EID, required capabilities,
            constraints (e.g., maximum latency, service price range), and
            return fields (e.g., RLOC providing the service, latency,
            TTL).</t>
          </list></t>

        <t>Upon receiving such a request, a Map-Resolver or Map-Server:<list
            style="numbers">
            <t>Parses the QE-LCAF;</t>

            <t>Matches against its local or federated mapping database;</t>

            <t>Applies filtering based on target EID, required capabilities,
            and constraints;</t>

            <t>Constructs a Map-Reply containing one or more matching
            entries.</t>
          </list></t>

        <t>The Map-Reply uses AFI-List LCAF to return multiple &lt;EID, RLOC,
        Metadata&gt; tuples. Each RLOC may itself be encoded in a
        protocol-specific LCAF (for example, a URI-LCAF, if defined).</t>

        <t>To limit response size, the mapping system MAY:<list
            style="symbols">
            <t>Return only the top-k results;</t>

            <t>Omit metadata fields not listed in return_fields.</t>
          </list></t>
      </section>

      <section title="Protocol Operation">
        <t>A querier (acting as an ITR) constructs a Map-Request where the
        requested EID field contains a QE-LCAF instead of a conventional AFI
        plus EID.</t>

        <t/>
      </section>
    </section>

    <section title="Security Considerations">
      <t>LISP inherits security considerations from <xref target="RFC9300"/>.
      For AI agent communication, logical isolation via IIDs provides strong
      tenant separation, reducing cross-domain attack surface.</t>
    </section>

    <section title="IANA Considerations">
      <t>This document defines a new LCAF type under the "LISP Canonical
      Address Format (LCAF) Types" registry group, entitled "Query Expression
      LCAF (LISP Canonical Address Format)". IANA needs to assign a value to
      it.<figure>
          <artwork><![CDATA[ +==========+=========================+=========================+
 | Value    | Description             | Reference               |
 +====================================+=========================+
 | TBA      | Query Expression        | This document           |
 +----------+-------------------------+-------------------------+]]></artwork>
        </figure></t>

      <t/>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.2119"?>

      <?rfc include="reference.RFC.9301"?>

      <?rfc include="reference.RFC.9299"?>

      <?rfc include='reference.RFC.9300'?>

      <?rfc include='reference.RFC.8060'?>

      <?rfc ?>

      <?rfc include='reference.RFC.8174'

?>

      <?rfc include='reference.I-D.ietf-lisp-mn'
?>

      <?rfc include='reference.I-D.ietf-lisp-eid-mobility'?>

      <?rfc ?>
    </references>
  </back>
</rfc>
