Files
ietf-draft-analyzer/data/reports/blog-series/05-1262-ideas.md
Christian Nennemann d6beb9c0a0 v0.3.0: Gap-to-Draft pipeline, Living Standards Observatory, blog series
Gap-to-Draft Pipeline (ietf pipeline):
- Context builder assembles ideas, RFC foundations, similar drafts, ecosystem vision
- Generator produces outlines + sections using rich context with Claude
- Quality gates: novelty (embedding similarity), references, format, self-rating
- Family coordinator generates 5-draft ecosystem (AEM/ATD/HITL/AEPB/APAE)
- I-D formatter with proper headers, references, 72-char wrapping

Living Standards Observatory (ietf observatory):
- Source abstraction with IETF + W3C fetchers
- 7-step update pipeline: snapshot, fetch, analyze, embed, ideas, gaps, record
- Static GitHub Pages dashboard (explorer, gap tracker, timeline)
- Weekly CI/CD automation via GitHub Actions

Also includes:
- 361 drafts (expanded from 260 with 6 new keywords), 403 authors, 1,262 ideas, 12 gaps
- Blog series (8 posts planned), reports, arXiv paper figures
- Agent team infrastructure (CLAUDE.md, scripts, dev journal)
- 5 new DB tables, schema migration, ~15 new query methods

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-04 00:48:57 +01:00

16 KiB

Where 361 Drafts Converge (And Where They Don't)

The fragmentation goes deeper than competing protocols. It extends all the way down to the idea level.


We extracted roughly 1,700 technical components from 361 Internet-Drafts -- mechanisms, architectures, protocols, and patterns. Then we asked: how many of these ideas does anyone else also propose?

The answer is devastating: 96% appear in exactly one draft. Of 1,692 unique technical ideas in the corpus, only 75 show up in two or more drafts. Only 11 appear in three or more. The fragmentation documented in the previous posts -- 14 competing OAuth proposals, 120 A2A protocols with no interop layer -- is not just a protocol-level problem. It extends all the way down. At the idea level, the landscape is overwhelmingly a collection of islands.

But islands are not the whole story. Using fuzzy matching across organizational boundaries, we found 628 ideas where different organizations are working on recognizably similar problems -- even when they use different names and different approaches. These cross-org convergence signals are the embryonic consensus of the agent standards landscape: the problems that different teams, in different countries, with different agendas, independently recognize and attempt to solve.

These convergence signals are more impressive than they first appear. Recall from Post 2 that 55% of all drafts have never been revised beyond their first submission, and 65% of Huawei's drafts are fire-and-forget. The ideas that converge across organizations are not the generic scaffolding of first-draft submissions -- they represent genuine engineering investment from teams that independently identified the same problem and committed resources to solving it.

The picture that emerges is paradoxical: the raw material for a complete agent ecosystem exists. The convergent ideas point toward the architecture the ecosystem needs. But they exist in isolation -- proposed by separate teams, embedded in separate drafts, with no connective tissue linking them into a coherent blueprint.

The Taxonomy

Every extracted idea was classified by type. The distribution reveals what kind of thinking dominates the landscape:

Type Count Share What It Means
Mechanism 663 37% Concrete technical solutions: auth flows, routing algorithms, token formats
Architecture 280 16% System designs and reference models
Pattern 251 14% Reusable design approaches
Protocol 228 13% Full protocol specifications
Requirement 171 10% Formal requirement documents
Extension 168 9% Additions to existing standards (OAuth, SCIM, DNS)
Other 19 1% Frameworks, profiles, algorithms, schemas

The dominance of mechanisms (663 of 1,780 extracted components) tells us the community is in building mode. These are not abstract position papers -- they are concrete, implementable solutions. The 228 protocols and 168 extensions to existing standards show that much of the work builds on established foundations (OAuth 2.0, SCIM, DNS, EDHOC) rather than starting from scratch.

The 280 architectures and 171 requirements suggest healthy standards development: teams are defining reference models before writing code. But the 251 patterns -- reusable approaches without full protocol specification -- indicate that many teams have identified what needs to be done without committing to how.

Where Teams Converge

By exact title, only 75 ideas appear in multiple drafts. But ideas with different names often describe the same concept -- "Agent Gateway" in one draft and "Inter-Agent Communication Hub" in another. Our fuzzy-matching overlap analysis (using SequenceMatcher at 0.75 threshold) across organizational boundaries found 628 ideas where 2+ distinct organizations are working on recognizably similar problems -- 43% of all unique idea clusters have cross-org validation. These are the genuine consensus signals.

Idea Orgs Drafts Key Organizations
A2A Communication Paradigm 8 5 CAICT, Deutsche Telekom, Huawei, Orange, Telefonica
AI Agent Network Architecture 8 5 China Mobile, Deutsche Telekom, Huawei, Orange, UnionPay
Multi-Agent Communication Protocol 7 8 AsiaInfo, BUPT, China Mobile, China Telecom, Huawei
AI Agent Communication Network (ACN) 7 5 ANP Open Source, China Mobile, Cisco, Five9, Huawei
NLIP (Natural Language Interchange) 7 1 Fordham, IBM, Purdue, ServiceNow, eBay
ELA Protocol 6 6 Bitwave, Cisco, Ericsson, Five9, Inria
AI Gateway 6 4 AsiaInfo, BUPT, China Telecom, Huawei, UnionPay
Agent Communication across WAN 6 3 China Mobile, China Unicom, Deutsche Telekom, Huawei, Orange

The most-converged idea -- "A2A Communication Paradigm" -- draws independent contributions from 8 organizations across 5 countries. This is simultaneously the strongest convergence signal and the strongest fragmentation signal. Eight organizations agree this is important. They are building separate, incompatible versions.

Look at who bridges the divide. In three of the top eight convergent ideas, the same names appear alongside Chinese institutions: Deutsche Telekom, Telefonica, and Orange. These European telecoms show up in "A2A Communication Paradigm," "AI Agent Network Architecture," and "Agent Communication across WAN" -- each time co-listed with Huawei, China Mobile, or China Unicom. Of the 180 ideas that cross the Chinese-Western organizational divide, European telecoms are present on a disproportionate share. The organizations most likely to prevent the agent ecosystem from splitting into incompatible regional stacks are not Google or Microsoft -- they are European carriers operating in both markets. US Big Tech is almost entirely absent from cross-divide convergence.

The organization-pair overlaps reveal where real collaboration happens -- and where it does not:

Org Pair Shared Ideas Signal
China Unicom -- Huawei 32 Deep intra-bloc alignment
China Mobile -- Huawei 27 Deep intra-bloc alignment
Ericsson -- Inria 21 European cross-org collaboration
Tsinghua -- Zhongguancun Lab 20 Chinese academic convergence
Fraunhofer SIT -- Tradeverifyd 10 Verifiable records niche

The pattern is stark: the highest-overlap pairs are Chinese institutions working within established blocs. Formal co-authorship between Chinese and Western organizations is thin -- but idea-level convergence, mediated by European telecoms operating in both markets, is broader than the co-authorship data suggests.

The convergence signals cluster in three areas:

1. Agent communication infrastructure. How agents discover, connect to, and message each other. This is the most active area with the most redundant proposals. The underlying need is clear; the implementation is contested.

2. Authentication and authorization. Action-based authorization, agent registration, cryptographic identity verification. OAuth extensions dominate, but the approaches diverge significantly between pure OAuth extension (add claims/scopes) and novel frameworks (DAAP accountability protocol, STAMP delegation proofs).

3. Network architecture. Agent gateways, agent communication networks, network management architectures. This is where the Chinese institutional ecosystem has the strongest presence, with Huawei and affiliated organizations producing most of the architecture ideas.

Where Teams Innovate

The 96% of ideas appearing in only one draft are a mix: mostly generic components describing what each draft does ("Agent Gateway," "Transport Configuration System"), but scattered among them are genuinely novel proposals that no other team has attempted -- either because they are too new, too specialized, or ahead of their time.

Some standouts from the unique ideas:

Verifiable Agent Behavior Attestation (draft-birkholz-verifiable-agent-conversations) -- A CDDL-based format for cryptographically signing agent conversation records, enabling post-hoc verification of agent behavior. This directly addresses the critical behavior verification gap.

ADOL: Agentic Data Optimization Layer (draft-chang-agent-token-efficient, score 4.5) -- Addresses token bloat in agent communication protocols. As agents exchange increasingly complex context, message sizes explode. ADOL compresses agent communications by 60-80%, a practical necessity that nobody else is working on.

Working Memory (draft-agent-gw) -- A structured context management system that maintains state across multi-step agent operations. Sounds basic -- but no other draft proposes a standard for how agents should manage persistent operational context.

Autonomous Optical Network Operation (draft-zhao-ccamp-actn-optical-network-agent) -- Applies agent architecture to the specific domain of optical network management. This is the kind of vertical specialization that validates the horizontal agent architecture work.

Execution Context Token (ECT) (draft-nennemann-wimse-ect, score 4.0) -- A JWT extension that records what each task did, linked to predecessors via a DAG. This is arguably the single most architecturally significant idea in the corpus: it turns the execution history of a multi-agent workflow into a cryptographically verifiable directed acyclic graph. It is the technical foundation for accountability, rollback, audit, and provenance.

CHEQ Protocol (draft-rosenberg-aiproto-cheq, score 3.9) -- Human confirmation of agent decisions before execution. The only concrete protocol proposal for human-in-the-loop agent oversight. In a landscape of 30 human-agent interaction drafts, CHEQ stands alone as an implementable solution.

The Five Ideas That Matter Most

If you are building agent systems today and need to know which IETF proposals to watch, these five represent the highest combination of quality, novelty, and gap-filling potential:

Idea Draft Score Why It Matters
Execution Context Token draft-nennemann-wimse-ect 4.0 DAG-based execution evidence; foundation for audit, rollback, and accountability
DAAP Accountability Protocol draft-aylward-daap-v2 4.8 Most comprehensive safety proposal; authentication + monitoring + enforcement
STAMP Delegation Proofs draft-guy-bary-stamp-protocol 4.6 Cryptographic proof that an agent was authorized for a specific task
Agent Description Language (ADL) draft-nederveld-adl 4.1 JSON standard for describing agent capabilities, tools, and permissions
Verifiable Conversations draft-birkholz-verifiable-agent-conversations 4.5 Cryptographic signing of conversation records for auditability

Together, these five ideas sketch the outline of the ecosystem architecture that Post 6 will describe in full: ECT provides the execution backbone, DAAP provides the accountability layer, STAMP proves delegation, ADL describes capabilities, and verifiable conversations create the audit trail.

Mapping Ideas to Gaps

The most revealing analysis is mapping which ideas partially address which gaps:

Gap Severity Ideas Coverage
Resource Management CRITICAL 117 Peripheral: ideas touch on task management but not resource contention
Behavior Verification CRITICAL 52 Partial: attestation and monitoring ideas exist but no runtime enforcement
Error Recovery/Rollback CRITICAL 6 Near-zero: 6 ideas from one draft (draft-yue-anima-agent-recovery-networks)
Cross-Protocol Translation HIGH 0 Complete absence: zero ideas in the entire corpus
Lifecycle Management HIGH 90 Partial: registration covered, retirement/versioning not
Human Override HIGH 4 Near-zero: CHEQ exists but no emergency override protocol
Multi-Agent Consensus HIGH 5 Minimal: no conflict resolution framework
Cross-Domain Security HIGH 10 Partial: identity covered, isolation not
Dynamic Trust HIGH 5 Minimal: trust scoring exists conceptually but not as protocol
Performance Monitoring MEDIUM 26 Moderate: benchmarking ideas exist (draft-cui-nmrg-llm-benchmark)
Explainability MEDIUM 5 Minimal: no decision-explanation protocol
Data Provenance MEDIUM 79 Partial: data format ideas exist but no provenance chain standard

The pattern is clear: the gaps with the highest idea counts (resource management at 117, lifecycle at 90, provenance at 79) are gaps where the periphery of existing work touches the problem. Teams building communication protocols think about resources; teams building discovery think about lifecycle. But nobody makes these the central problem.

The gaps with near-zero idea counts (error recovery at 6, human override at 4, consensus at 5, cross-protocol translation at 0) are the ones where no team is even circling the problem. These are true blind spots.

The Ideas Nobody Had

Sometimes the absence is the finding. Here are technical ideas conspicuous in their absence from the entire corpus:

  • Agent capability degradation signaling: No protocol for an agent to advertise that its performance has degraded (model drift, resource constraints, partial failure). Other agents continue relying on it at full trust.

  • Multi-agent transaction semantics: No ACID-like guarantees for multi-agent workflows. If three agents must all succeed or all roll back, there is no two-phase commit equivalent.

  • Agent migration protocol: No standard for moving a running agent from one host to another while preserving state and active connections. Critical for cloud deployments.

  • Privacy-preserving agent discovery: No mechanism for an agent to find capabilities without revealing its intent. "I need a medical diagnosis agent" reveals sensitive information before any trust is established.

  • Agent cost and billing: No standard for agents to negotiate compensation for services. Agents performing work for other agents have no way to express "this costs X" or "you have Y credits remaining."

Each of these absences represents an opportunity for new drafts that would fill genuine needs.

What the Taxonomy Tells Builders

Three practical takeaways for anyone implementing agent systems:

1. Build on the convergent ideas. Agent registration, action-based authorization, and capability-based discovery appear across multiple teams and organizations. These represent genuine consensus about what the infrastructure needs, even if implementations diverge.

2. Watch the single-source innovations. The long tail of single-draft ideas contains the innovations that will differentiate the next generation of agent platforms. ECT, CHEQ, ADOL, and ADL are not widely known but represent some of the most thoughtful engineering in the corpus.

3. Fill the blank spaces. Error recovery, cross-protocol translation, and human override are the clearest opportunities for new contributions. The community has signaled these gaps matter (through the severity of the gap analysis) but has not yet produced the ideas to fill them.


Key Takeaways

  • 96% of ideas appear in exactly one draft -- fragmentation extends all the way down to the idea level; only 75 of 1,692 unique ideas show cross-draft convergence
  • 628 cross-org convergent ideas (43% of unique clusters, via fuzzy matching) reveal where organizations independently agree; highest-overlap pairs are Chinese institutions (China Unicom-Huawei: 32 shared ideas)
  • The critical gaps remain unfilled: error recovery has 6 ideas from one draft; cross-protocol translation has zero
  • Five ideas to watch: ECT (execution DAG), DAAP (accountability), STAMP (delegation proof), ADL (agent description), verifiable conversations (audit trail)
  • Convergence clusters in three areas: agent communication infrastructure, authentication/authorization, and network architecture

Next in this series: Drawing the Big Picture -- 628 cross-org convergent ideas, 12 gaps, and the architectural vision that connects them.


Idea extraction performed by Claude from full-text analysis of each draft. Classification into types (mechanism, architecture, protocol, pattern, extension, requirement) based on the technical content of each proposal. Data current as of March 2026.