<?xml version='1.0' encoding='UTF-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude"
     category="info"
     docName="draft-feng-nmrg-ain-deployment-00"
     ipr="trust200902"
     submissionType="IRTF"
     xml:lang="en"
     tocInclude="true"
     tocDepth="3"
     symRefs="true"
     sortRefs="true"
     version="3">

  <front>
    <title abbrev="AIN Deployment">Agentic Intent Network (AIN): Applicability and Deployment Scenarios</title>
    <seriesInfo name="Internet-Draft" value="draft-feng-nmrg-ain-deployment-00"/>
    <author fullname="Chong Feng" initials="C." surname="Feng">
      <organization>Ruijie Networks</organization>
      <address>
        <email>fengchongllly@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="April"/>
    <area>IRTF</area>
    <workgroup>Network Management Research Group</workgroup>
    <abstract>
      <t>
        The Agentic Intent Network (AIN) architecture defines a routing-based
        coordination substrate for open, heterogeneous, Internet-scale
        multi-agent systems. This document describes applicability and deployment
        scenarios for AIN, targeting decision-makers in carrier networks,
        enterprises, and network equipment vendors. It maps the technical
        mechanisms defined in <xref target="AIN-ARCH"/> to concrete
        operational contexts, describes migration paths from existing
        infrastructure, and discusses the cold-start bootstrapping challenge
        inherent to network-effect-dependent systems. This document does not
        define new protocol mechanisms; it is intended to inform deployment
        planning and expand the AIN reader community beyond protocol engineers.
      </t>
    </abstract>
  </front>

  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>
        The AIN architecture, defined in <xref target="AIN-ARCH"/>, is written
        primarily for protocol engineers and researchers. That text defines
        problem drivers, architectural components, design invariants, and a
        research agenda with the rigor required for interoperable
        implementations. Deployment decisions, however, are often made by a
        different audience: operators, CTO organizations, enterprise architects,
        and product managers.
      </t>
      <t>
        These stakeholders usually ask a different first question. They do not
        ask, "What is the exact on-wire encoding?" They ask, "Why should we do
        this now in our environment, and what is the lowest-risk first step?"
        This document answers that question. It maps mechanisms from
        <xref target="AIN-ARCH"/> to concrete operational contexts and migration
        paths that begin from current infrastructure.
      </t>
      <t>
        This style has precedent in IETF/IRTF Informational publications.
        <xref target="RFC7454"/> and <xref target="RFC8799"/> translate protocol
        concepts into deployment and operational guidance for decision-makers.
        AIN benefits from the same approach because adoption is shaped by
        migration cost, role incentives, sequencing, and governance timing, not
        only by protocol design.
      </t>
      <t>
        The scenarios therefore use narrative language intentionally. Decision
        makers evaluate trajectories, not just mechanisms. They need to compare
        before/after positions, identify where value appears in Months 1-6, and
        understand where unresolved research still exists. This format makes
        those trade-offs explicit without changing protocol semantics.
      </t>
      <t>
        This document does not define new AIN packet fields, new capability
        advertisement semantics, or new management objects. Normative protocol
        behavior remains in the architecture document <xref target="AIN-ARCH"/>.
        Normative language here is used only for critical operational constraints
        where architecture compliance matters directly; the rest is descriptive
        guidance for planning.
      </t>
      <t>
        Four scenarios are included: carrier operator, enterprise, equipment
        vendor, and AI-native developer. Together they cover likely early
        adopters and ecosystem enablers. Final sections address cold-start
        bootstrapping and clarify compatibility expectations with existing
        standards, including explicit inter-domain cautions.
      </t>
    </section>

    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology and Document Conventions</name>
      <t>
        All AIN-specific terms, including Intent Router, Handler, Originator,
        IC-OID, CAP, CRT, Agent Domain, Mode A through Mode E, and the Foreman
        Pattern, are defined in <xref target="AIN-ARCH"/> and are not redefined
        here.
      </t>
      <t>
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
        "OPTIONAL" in this document are to be interpreted as described in BCP 14
        <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when,
        they appear in all capitals, as shown here.
      </t>
      <t>
        This document uses SHOULD where architecture compliance is important.
        Otherwise, it uses descriptive language.
      </t>
      <t>
        The following terms are defined for use in this document. They describe
        deployment roles, execution modes, and coordination patterns that are
        relevant to the scenarios presented here. They are consistent with the
        component model defined in <xref target="AIN-ARCH"/> Section 5.5 and are
        introduced here to support deployment planning without requiring
        additional companion documents.
      </t>
      <dl newline="false" spacing="normal">
        <dt>Routing and Infrastructure Operator (RIO):</dt>
        <dd>
          An entity that operates Intent Routers and Agent Domain
          infrastructure, analogous to an Internet Service Provider in IP
          networking.
        </dd>
        <dt>Intent-Aware Platform (IAP):</dt>
        <dd>
          A platform operator that combines RIO-level infrastructure with
          value-added services above the routing substrate, such as capability
          marketplaces or managed Handler hosting.
        </dd>
        <dt>Capability Provider (CP):</dt>
        <dd>
          An entity that operates one or more Intent Handlers and registers
          their capabilities via CAP into one or more Agent Domains.
        </dd>
        <dt>Mode A Handler (AI-Native Handler):</dt>
        <dd>
          A Handler that natively processes Intent Datagrams and implements AIN
          interfaces directly, with no wrapping layer between the AIN control
          plane and the executing agent.
        </dd>
        <dt>Mode C Handler (Gateway Handler):</dt>
        <dd>
          A Handler that wraps a legacy or non-AIN system, translating Intent
          Datagrams to and from proprietary interfaces. The wrapped system
          requires no modification; the Mode C adapter presents a single
          AIN-facing interface regardless of internal complexity.
        </dd>
        <dt>Capability Description Language (CDL):</dt>
        <dd>
          The vocabulary and schema used to describe Handler capabilities in CAP
          messages and the IC-OID namespace. CDL semantics determine how IC-OID
          prefixes are aggregated and how capability matching is performed. CDL
          specification is identified as a Phase 1 research problem in
          <xref target="AIN-ARCH"/> Section 7.1.
        </dd>
        <dt>Foreman Pattern:</dt>
        <dd>
          A deployment pattern in which a single registered Handler (the
          "foreman") accepts intents on behalf of an internal worker pool. From
          the AIN routing perspective, the entire pool appears as one CRT entry,
          preventing route-state growth proportional to worker count. This
          pattern is especially useful when workers are numerous, ephemeral, or
          dynamically scaled.
        </dd>
      </dl>
    </section>

    <section anchor="scenarios-overview" numbered="true" toc="default">
      <name>Deployment Scenarios Overview</name>
      <t>
        Scenario 1 models a carrier operator that already runs large routing
        infrastructure and seeks monetization beyond commodity transport. This
        scenario is included because carriers can start AIN at one PoP with
        incremental operational risk.
      </t>
      <t>
        Scenario 2 models an enterprise that is both Originator and Handler
        provider. This scenario is included because internal integration
        simplification can produce immediate value before any external peering.
      </t>
      <t>
        Scenario 3 models a network equipment vendor. This scenario is included
        because deployment speed depends on software enablement of existing
        hardware fleets.
      </t>
      <t>
        Scenario 4 models an AI-native developer. This scenario is included
        because many teams have application protocols but still lack scalable
        discovery and routing across domains.
      </t>
      <table anchor="tbl-overview">
        <name>Scenario Overview</name>
        <thead>
          <tr>
            <td>Scenario</td>
            <td>Primary Role</td>
            <td>AIN Entry Point</td>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td>Carrier Operator</td>
            <td>RIO / IAP</td>
            <td>Single Agent Domain at one PoP</td>
          </tr>
          <tr>
            <td>Enterprise</td>
            <td>Originator + Handler Provider</td>
            <td>Internal Intent Router deployment</td>
          </tr>
          <tr>
            <td>Equipment Vendor</td>
            <td>Enabler</td>
            <td>Software module on existing HW</td>
          </tr>
          <tr>
            <td>AI-Native Dev.</td>
            <td>CP / Originator</td>
            <td>Handler registration via CAP</td>
          </tr>
        </tbody>
      </table>
    </section>

    <section anchor="scenario-carrier" numbered="true" toc="default">
      <name>Scenario 1: Carrier Network Operator</name>
      <section anchor="scenario-carrier-current" numbered="true" toc="default">
        <name>Current State and Pain Points</name>
        <t>
          Consider a carrier with PoPs in multiple regions, a mature BGP
          full-mesh underlay, and enterprise customers requesting API
          integration services. Traffic grows while revenue per user declines.
        </t>
        <t>
          The pain point is that customers increasingly want agent-to-agent
          collaboration, while the carrier can monetize only bandwidth. The
          intent layer between enterprise systems remains outside the carrier's
          service model.
        </t>
      </section>
      <section anchor="scenario-carrier-entry" numbered="true" toc="default">
        <name>AIN Entry Point</name>
        <t>
          The operator upgrades edge routers at one PoP to support CAP as a
          software module and deploys the first Agent Domain. AIN does not
          require new hardware categories; Intent Router forwarding and CAP
          support are implemented as software modules on existing router
          platforms <xref target="AIN-ARCH"/>. Enterprise Handlers then register
          to their nearest PoP.
        </t>
      </section>
      <section anchor="scenario-carrier-migration" numbered="true" toc="default">
        <name>Migration Path</name>
        <table anchor="tbl-carrier-migration">
          <name>Carrier Migration Phases</name>
          <thead>
            <tr>
              <td>Phase</td>
              <td>Plan</td>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td>Phase 1 (Months 1-6)</td>
              <td>Single-domain pilot; static CRT; Mode C Gateway Execution for legacy enterprise APIs</td>
            </tr>
            <tr>
              <td>Phase 2 (Months 6-18)</td>
              <td>OSPF-inspired intra-domain CAP propagation; dynamic CRT; multiple PoPs connected</td>
            </tr>
            <tr>
              <td>Phase 3 (Months 18-36)</td>
              <td>Inter-domain CAP exchange with peer carriers (BGP-inspired inter-domain protocol, subject to ongoing research; see Section 7.2 of <xref target="AIN-ARCH"/>)</td>
            </tr>
            <tr>
              <td>Phase 4 (36+ months)</td>
              <td>Handler capability marketplace portal; per-query billing analogous to DNS resolution combined with CDN delivery</td>
            </tr>
          </tbody>
        </table>
        <t>
          IMPORTANT: Phase 3 is BGP-inspired in structure (capability prefix
          aggregation, border policy filtering, and per-domain administrative
          autonomy) but is NOT a literal BGP wire-protocol extension. It
          requires new protocol design currently under research. Operators SHOULD
          NOT plan Phase 3 based on <xref target="RFC4271"/> wire compatibility.
        </t>
      </section>
      <section anchor="scenario-carrier-compare" numbered="true" toc="default">
        <name>Before and After Comparison</name>
        <table anchor="tbl-carrier-compare">
          <name>Carrier Before/After</name>
          <thead>
            <tr>
              <td>Dimension</td>
              <td>Before AIN</td>
              <td>After P1/P2</td>
              <td>After P3/P4</td>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td>Revenue model</td>
              <td>Bandwidth only</td>
              <td>Managed domain fee</td>
              <td>Intent routing + marketplace</td>
            </tr>
            <tr>
              <td>Enterprise value proposition</td>
              <td>Connectivity only</td>
              <td>Internal discovery and routing</td>
              <td>Cross-domain capability exchange</td>
            </tr>
            <tr>
              <td>Technical complexity</td>
              <td>Familiar IP operations</td>
              <td>Added CAP and CRT ops</td>
              <td>Inter-domain policy and governance</td>
            </tr>
            <tr>
              <td>Inter-carrier coordination</td>
              <td>Transit peering</td>
              <td>Optional</td>
              <td>Required for ecosystem scale</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>

    <section anchor="scenario-enterprise" numbered="true" toc="default">
      <name>Scenario 2: Enterprise (Dual Role as Originator and Handler Provider)</name>
      <section anchor="scenario-enterprise-current" numbered="true" toc="default">
        <name>Current State and Pain Points</name>
        <t>
          Consider a multinational manufacturer in five countries with SAP,
          Salesforce, ServiceNow, and proprietary MES systems. Each new
          integration requires custom adapters and bilateral maintenance.
        </t>
        <t>
          A procurement AI assistant may need to trigger supply-chain
          replanning in another business unit where API documentation is not
          available. This reproduces the N(N-1)/2 integration pattern. At N=20
          systems, that is 190 pairwise integrations.
        </t>
      </section>
      <section anchor="scenario-enterprise-entry" numbered="true" toc="default">
        <name>AIN Entry Point</name>
        <t>
          Deploy a lightweight Intent Router on x86 servers running CAP
          software. Existing SAP and Salesforce interfaces are wrapped as Mode C
          Handlers using Execution Runtime adapters. Internal AI assistants
          become Originators.
        </t>
        <t>
          Integration complexity collapses from O(N^2) pairwise links to O(N)
          registrations.
        </t>
      </section>
      <section anchor="scenario-enterprise-migration" numbered="true" toc="default">
        <name>Migration Path</name>
        <t>
          Phase 1: Single Intent Router, internal network only. Existing systems
          wrapped as Mode C Handlers. Internal AI assistants as Originators.
          IC-OID namespace governed by internal IT policy.
        </t>
        <t>
          Phase 2: Connect to carrier AIN domain. Cross-BU collaboration.
          Introduce Mode A Handlers for AI-native services. Adopt Foreman
          Pattern for dynamic worker pools.
        </t>
        <t>
          Phase 3: Selectively expose Handlers to external partners. Join AIN
          ecosystem as Capability Provider. Participate in inter-domain routing.
        </t>
      </section>
      <section anchor="scenario-enterprise-compare" numbered="true" toc="default">
        <name>Before and After Comparison</name>
        <table anchor="tbl-enterprise-compare">
          <name>Enterprise Before/After</name>
          <thead>
            <tr>
              <td>Metric</td>
              <td>Before AIN</td>
              <td>After Phase1</td>
              <td>After Phase3</td>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td>Integration complexity</td>
              <td>O(N^2) custom links</td>
              <td>O(N) inside one domain</td>
              <td>O(N) with governed exposure</td>
            </tr>
            <tr>
              <td>Discovery overhead</td>
              <td>Manual docs and contacts</td>
              <td>Internal CRT lookup</td>
              <td>Cross-domain lookup via policy</td>
            </tr>
            <tr>
              <td>Cross-BU latency</td>
              <td>Human relay and tickets</td>
              <td>Programmatic resolution</td>
              <td>Routed with external partners</td>
            </tr>
            <tr>
              <td>Governance overhead</td>
              <td>Distributed and opaque</td>
              <td>Central IT namespace control</td>
              <td>Expanded trust and contracts</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>

    <section anchor="scenario-vendor" numbered="true" toc="default">
      <name>Scenario 3: Network Equipment Vendor</name>
      <section anchor="scenario-vendor-current" numbered="true" toc="default">
        <name>Current State and Pain Points</name>
        <t>
          Consider a mid-size vendor with routers deployed in more than 200
          carriers. BGP/OSPF business is stable but growth is slow. Carriers now
          ask about AIN readiness.
        </t>
        <t>
          The pain point is perceived hardware commoditization risk if AIN
          functionality is treated as software only.
        </t>
      </section>
      <section anchor="scenario-vendor-paths" numbered="true" toc="default">
        <name>Two Strategic Paths</name>
        <table anchor="tbl-vendor-paths">
          <name>Strategic Paths</name>
          <thead>
            <tr>
              <td>Path A (Defensive)</td>
              <td>Path B (Offensive)</td>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td>Implement CAP support as optional software module</td>
              <td>Package edge routers as "AIN-ready" line and provide turnkey first Agent Domain deployment</td>
            </tr>
            <tr>
              <td>Allow existing routers to join AIN control plane</td>
              <td>Bundle hardware + software + deployment services</td>
            </tr>
            <tr>
              <td>Do not proactively market readiness</td>
              <td>Proactively market readiness before standards freeze</td>
            </tr>
            <tr>
              <td>Timeline: 6-12 months software work</td>
              <td>Timeline: 12-18 months to first reference deployment</td>
            </tr>
            <tr>
              <td>Risk: Low, Cost: Low, Upside: preserves current position</td>
              <td>Risk: Higher, Cost: Higher; Upside: ecosystem positioning before standards freeze</td>
            </tr>
            <tr>
              <td>Downside: misses first-mover position</td>
              <td>Downside: larger execution and market risk</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="scenario-vendor-migration" numbered="true" toc="default">
        <name>Migration Path</name>
        <t>
          Regardless of path, Phase 1 is identical: implement Intent Router
          forwarding and CAP support as software modules on existing hardware.
          <xref target="AIN-ARCH"/> confirms no new hardware category is needed;
          Intent Router forwarding and CAP processing are software functions.
        </t>
        <t>
          A vendor that completes Phase 1 can switch from Path A to Path B at
          any time.
        </t>
        <t>
          Because <xref target="AIN-ARCH"/> Section 5.6 Invariant 1 separates
          forwarding from execution, forwarding hardware retains differentiated
          value and the commodity risk is lower than initially feared.
        </t>
      </section>
    </section>

    <section anchor="scenario-developer" numbered="true" toc="default">
      <name>Scenario 4: AI-Native Application Developer</name>
      <section anchor="scenario-developer-current" numbered="true" toc="default">
        <name>Current State and Pain Points</name>
        <t>
          Teams building with LangGraph or A2A often have good in-domain agent
          collaboration but no shared discovery mechanism across organizations.
          They still negotiate bilateral APIs and maintain static endpoint files.
        </t>
        <t>
          A2A defines interaction format (analogous to HTTP) but not discovery
          or routing. Endpoint knowledge must still be known in advance. At
          scale this reproduces O(N^2) coupling.
        </t>
      </section>
      <section anchor="scenario-developer-entry" numbered="true" toc="default">
        <name>AIN Entry Point</name>
        <t>
          Existing agents register as Handlers via CAP and become discoverable
          through IC-OID without requiring callers to know concrete endpoints.
        </t>
        <t>
          A2A agent cards are candidate inputs to AIN CDL. MCP tool integrations
          can be wrapped as Mode A Handlers.
        </t>
      </section>
      <section anchor="scenario-developer-migration" numbered="true" toc="default">
        <name>Migration Path</name>
        <t>
          Step 1: Register existing agents as Handlers. Assign IC-OIDs. No
          change to core agent logic; add CAP registration and Intent Datagram
          ingestion adapter.
        </t>
        <t>
          Step 2: Replace static endpoint config with Intent Router lookup.
          Originators emit Intent Datagrams; routing resolves Handler location
          dynamically.
        </t>
        <t>
          Step 3: Use Foreman Pattern for dynamic worker pools. Worker lifecycle
          events do not force CRT churn.
        </t>
        <t>
          Step 4: Enable cross-domain discovery when inter-domain routing is
          available (Phase 3 prerequisite; see <xref target="scenario-carrier-migration"/>).
        </t>
        <t>
          Key insight: AIN is not a replacement for A2A or MCP. A2A defines
          handshake semantics; AIN provides discovery and routing so handshake
          can happen without prior endpoint knowledge.
        </t>
      </section>
    </section>

    <section anchor="cold-start" numbered="true" toc="default">
      <name>The Cold-Start Problem and Bootstrap Strategies</name>
      <section anchor="cold-start-effect" numbered="true" toc="default">
        <name>The Network Effect Dependency</name>
        <t>
          AIN value grows with network effects; more Handlers make routing useful
          to more Originators. First deployers therefore begin with a thin
          ecosystem.
        </t>
        <t>
          This is not a design flaw. It is the same bootstrap challenge faced by
          routing infrastructures in their early phases, including the commercial
          Internet.
        </t>
      </section>
      <section anchor="cold-start-sequence" numbered="true" toc="default">
        <name>Recommended Bootstrap Sequence</name>
        <ol spacing="normal" type="1">
          <li>
            Start closed. Deploy first within one enterprise or one PoP. Prove
            internal value before external connectivity. Stage 1 value (O(N^2) to
            O(N) integration) is reachable with zero external participants.
          </li>
          <li>
            Use Mode C as the entry ramp. Mode C (Gateway Execution), as defined
            in Section 2 of this document and consistent with the Application
            Entities model in <xref target="AIN-ARCH"/> Section 5.5, lets legacy
            systems participate with minimal code change. A full SAP environment
            can be exposed via a single Mode C adapter without changes to SAP
            itself.
          </li>
          <li>
            Build internal proof before seeking peers. Collect 6-12 months of
            latency, reliability, and integration-cost evidence before external
            onboarding.
          </li>
          <li>
            Seed the capability directory. Pre-populate IC-OID classes for
            internal capabilities before opening the domain externally.
          </li>
        </ol>
      </section>
      <section anchor="cold-start-modec" numbered="true" toc="default">
        <name>Role of Mode C (Gateway Execution)</name>
        <t>
          Mode C is central to cold-start because it turns legacy complexity into
          routable capability while keeping rewrites out of the critical path.
        </t>
        <t>
          A Mode C Handler presents one AIN-facing interface while it orchestrates
          many legacy internals. From routing perspective, a large SAP estate
          with many transaction types can appear as one registered Handler under
          well-defined IC-OIDs.
        </t>
        <t>
          This is the Foreman Pattern at the integration boundary: worker
          complexity stays local while routing-state growth remains controlled.
        </t>
      </section>
    </section>

    <section anchor="standards" numbered="true" toc="default">
      <name>Relationship to Existing Standards and Protocols</name>
      <section anchor="standards-reuse" numbered="true" toc="default">
        <name>Protocol Reuse and New Design</name>
        <t>
          AIN reuses protocol structures where semantics transfer exactly. It
          introduces new mechanisms where IC-OID identifier semantics diverge
          from topological IP addressing.
        </t>
        <t>
          Operators can use the compatibility table below to plan tool-chain
          investment and identify low-friction reuse points.
        </t>
      </section>
      <section anchor="standards-table" numbered="true" toc="default">
        <name>Compatibility Table</name>
        <table anchor="tbl-compatibility">
          <name>Existing Technology Compatibility</name>
          <thead>
            <tr>
              <td>Existing Technology</td>
              <td>AIN Usage</td>
              <td>Reuse</td>
              <td>Notes</td>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td>OSPF Opaque LSA (<xref target="RFC5250"/>)</td>
              <td>Intra-domain CAP propagation</td>
              <td>Structural analogy</td>
              <td>New convergence theory required</td>
            </tr>
            <tr>
              <td>BGP MP Extensions (<xref target="RFC4760"/>)</td>
              <td>Inter-domain CAP exchange</td>
              <td>Structural analogy</td>
              <td>Not wire-compat.; New protocol</td>
            </tr>
            <tr>
              <td>NETCONF/YANG (<xref target="RFC6241"/>/<xref target="RFC7950"/>)</td>
              <td>AIN management plane</td>
              <td>Direct reuse</td>
              <td>Management plane</td>
            </tr>
            <tr>
              <td>SNMP OID format</td>
              <td>IC-OID structure</td>
              <td>Structural analogy</td>
              <td>Different governance model</td>
            </tr>
            <tr>
              <td>DNS resolution</td>
              <td>IC-OID Registry governance</td>
              <td>Structural analogy</td>
              <td>DA not in forwarding path</td>
            </tr>
            <tr>
              <td>A2A agent cards (<xref target="A2A2025"/>)</td>
              <td>CDL capability description</td>
              <td>Candidate reuse</td>
              <td>Under evaluation</td>
            </tr>
            <tr>
              <td>MCP tool spec (<xref target="MCP2024"/>)</td>
              <td>Handler execution runtime</td>
              <td>Candidate wrapper</td>
              <td>Wrappable as Mode A Handler</td>
            </tr>
            <tr>
              <td>IP TTL / hop limit</td>
              <td>Datagram hop count</td>
              <td>Exact reuse</td>
              <td>Identical semantics</td>
            </tr>
          </tbody>
        </table>
        <t>
          Operators with existing NETCONF/YANG infrastructure can reuse it
          directly for AIN management-plane functions. This is likely the
          lowest-cost integration point for experienced operators.
        </t>
      </section>
    </section>

    <section anchor="security" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>
        This document does not define new protocol mechanisms and therefore
        introduces no security considerations beyond those in
        <xref target="AIN-ARCH"/>.
      </t>
      <t>
        Deployment scenarios that use Mode C (Gateway Execution) should account
        for access-control boundaries when legacy systems are wrapped as AIN
        Handlers. Existing ACL and authentication controls on wrapped systems
        remain in effect and are not bypassed by AIN routing.
      </t>
      <t>
        Operators should validate that exposing a legacy capability through a
        Mode C interface does not unintentionally broaden privilege scope.
        Least-privilege role mappings, credential hygiene, and auditable logs
        should be part of initial deployment readiness checks.
      </t>
      <t>
        In multi-tenant deployments, operators should also ensure that tenant
        boundaries in legacy back-end systems are preserved at the Handler
        boundary, especially when one Mode C gateway fronts multiple internal
        services. Admission control, request attribution, and replay-resistant
        authentication are important companion controls for production rollout.
        None of these controls are replaced by AIN routing; they remain local
        obligations of the wrapped execution environment.
      </t>
    </section>

    <section anchor="iana" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>

  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="AIN-ARCH">
        <front>
          <title>Agentic Intent Network (AIN) Architecture</title>
          <author fullname="Feng, C."/>
          <date year="2026"/>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-feng-nmrg-ain-architecture-00"/>
        <seriesInfo name="Work in Progress" value=""/>
      </reference>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author initials="S." surname="Bradner" fullname="Scott Bradner"/>
          <date month="March" year="1997"/>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author initials="B." surname="Leiba" fullname="Barry Leiba"/>
          <date month="May" year="2017"/>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>

    <references>
      <name>Informative References</name>
      <reference anchor="RFC2328" target="https://www.rfc-editor.org/info/rfc2328">
        <front>
          <title>OSPF Version 2</title>
          <author initials="J." surname="Moy" fullname="John Moy"/>
          <date month="April" year="1998"/>
        </front>
        <seriesInfo name="RFC" value="2328"/>
        <seriesInfo name="DOI" value="10.17487/RFC2328"/>
      </reference>
      <reference anchor="RFC4271" target="https://www.rfc-editor.org/info/rfc4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author initials="Y." surname="Rekhter" fullname="Yakov Rekhter"/>
          <author initials="T." surname="Li" fullname="Tony Li"/>
          <author initials="S." surname="Hares" fullname="Susan Hares"/>
          <date month="January" year="2006"/>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC4760" target="https://www.rfc-editor.org/info/rfc4760">
        <front>
          <title>Multiprotocol Extensions for BGP-4</title>
          <author initials="T." surname="Bates" fullname="Tony Bates"/>
          <author initials="R." surname="Chandra" fullname="Ravi Chandra"/>
          <author initials="D." surname="Katz" fullname="Dave Katz"/>
          <author initials="Y." surname="Rekhter" fullname="Yakov Rekhter"/>
          <date month="January" year="2007"/>
        </front>
        <seriesInfo name="RFC" value="4760"/>
        <seriesInfo name="DOI" value="10.17487/RFC4760"/>
      </reference>
      <reference anchor="RFC5250" target="https://www.rfc-editor.org/info/rfc5250">
        <front>
          <title>The OSPF Opaque LSA Option</title>
          <author initials="L." surname="Berger" fullname="Lou Berger"/>
          <author initials="I." surname="Bryskin" fullname="Isaac Bryskin"/>
          <author initials="A." surname="Zinin" fullname="Alex Zinin"/>
          <author initials="R." surname="Coltun" fullname="Rob Coltun"/>
          <date month="July" year="2008"/>
        </front>
        <seriesInfo name="RFC" value="5250"/>
        <seriesInfo name="DOI" value="10.17487/RFC5250"/>
      </reference>
      <reference anchor="RFC6241" target="https://www.rfc-editor.org/info/rfc6241">
        <front>
          <title>Network Configuration Protocol (NETCONF)</title>
          <author initials="R." surname="Enns" fullname="Rob Enns"/>
          <author initials="M." surname="Bjorklund" fullname="Martin Bjorklund"/>
          <author initials="J." surname="Schoenwaelder" fullname="Juergen Schoenwaelder"/>
          <author initials="A." surname="Bierman" fullname="Andy Bierman"/>
          <date month="June" year="2011"/>
        </front>
        <seriesInfo name="RFC" value="6241"/>
        <seriesInfo name="DOI" value="10.17487/RFC6241"/>
      </reference>
      <reference anchor="RFC6459" target="https://www.rfc-editor.org/info/rfc6459">
        <front>
          <title>IPv6 in 3GPP Releases</title>
          <author initials="J." surname="Korhonen" fullname="Jouni Korhonen"/>
          <author initials="J." surname="Soininen" fullname="Jonne Soininen"/>
          <author initials="B." surname="Patil" fullname="Basavaraj Patil"/>
          <date month="January" year="2012"/>
        </front>
        <seriesInfo name="RFC" value="6459"/>
        <seriesInfo name="DOI" value="10.17487/RFC6459"/>
      </reference>
      <reference anchor="RFC7454" target="https://www.rfc-editor.org/info/rfc7454">
        <front>
          <title>BGP Operations and Security</title>
          <author initials="A." surname="Durand" fullname="Alain Durand"/>
          <author initials="A." surname="Dhamdhere" fullname="Amogh Dhamdhere"/>
          <author initials="C." surname="Donley" fullname="Chris Donley"/>
          <author initials="W." surname="George" fullname="Warren George"/>
          <date month="February" year="2015"/>
        </front>
        <seriesInfo name="RFC" value="7454"/>
        <seriesInfo name="DOI" value="10.17487/RFC7454"/>
      </reference>
      <reference anchor="RFC7950" target="https://www.rfc-editor.org/info/rfc7950">
        <front>
          <title>The YANG 1.1 Data Modeling Language</title>
          <author initials="M." surname="Bjorklund" fullname="Martin Bjorklund"/>
          <date month="August" year="2016"/>
        </front>
        <seriesInfo name="RFC" value="7950"/>
        <seriesInfo name="DOI" value="10.17487/RFC7950"/>
      </reference>
      <reference anchor="RFC8799" target="https://www.rfc-editor.org/info/rfc8799">
        <front>
          <title>Limited Domains and Internet Protocols</title>
          <author initials="B." surname="Carpenter" fullname="Brian Carpenter"/>
          <author initials="B." surname="Liu" fullname="Bing Liu"/>
          <date month="July" year="2020"/>
        </front>
        <seriesInfo name="RFC" value="8799"/>
        <seriesInfo name="DOI" value="10.17487/RFC8799"/>
      </reference>
      <reference anchor="A2A2025">
        <front>
          <title>Agent-to-Agent Protocol Specification v1.0</title>
          <author fullname="Google DeepMind"/>
          <date year="2025"/>
        </front>
      </reference>
      <reference anchor="MCP2024">
        <front>
          <title>Model Context Protocol</title>
          <author fullname="Anthropic"/>
          <date year="2024"/>
        </front>
      </reference>
    </references>
  </back>
</rfc>
