AGTS vs. TCP/IP

Protocol comparison across 13 sections.

Why AGTS is to AI governance what TCP/IP is to networking. 13 sections covering the protocol stack analogy, the Great Inversion, and the clearinghouse model.

Informative
FeatureTCP/IPAGTS
Core unitPacketCanonical leaf
Global identifierIP addresslog_id (SHA-256 of public key)
Reliability mechanismACKs, retransmissionInclusion proofs, consistency proofs
Error signalingICMP, TCP RSTEquivocation Proof, HTTP 422
Flow controlTCP window, congestion controlFail-closed rule, HCE feedback loop
SecurityOptional (IPsec, TLS)Built-in (signatures, transparency, witnesses)
LayeringApplication, Transport, Internet, LinkGovernance, Envelope, Transparency, Verification, Trust Policy
ExtensibilityPorts, protocolsVertical Instantiations (domain plugins)
Governing bodyIETFAGTS Technical Steering Committee
Key invariantPackets arrive (best effort)Leaves are append-only and verifiable

1. Purpose and Scope

AspectTCP/IPAGTS
Primary goalEnable reliable, interoperable communication between heterogeneous networksEnable verifiable, transparent governance of autonomous systems across organizational boundaries
ScopeGlobal data transport — packets, routing, connectionsGlobal governance record — authorization, evidence, audit
Core abstractionThe packet — unit of data deliveryThe canonical leaf — unit of governance record
Key propertyBest-effort delivery with end-to-end reliabilityAppend-only transparency with end-to-end verifiability
Trust modelDecentralized routing; trust in endpointsDecentralized logs; trust in transparency and witnesses

Both define a universal, minimal set of abstractions that enable a global system of independent participants to interoperate without central coordination.

2. Architectural Layers

AGTS defines five logical layers; TCP/IP has four. The layering principles are similar: each layer provides services to the layer above and uses services from the layer below.

TCP/IP LayerAGTS LayerAnalogy
Application (HTTP, SMTP)Governance Layer (RTR measurement, validation)Domain-specific logic — capability measurement and five-gate validation
Transport (TCP, UDP)Envelope Layer (Governance Envelope)Package the payload for delivery — TCP segments data; AGTS envelopes wrap Proof Bundles
Internet (IP)Transparency Layer (Merkle log, STH)Core global infrastructure — IP routes packets; AGTS logs provide append-only records
Link (Ethernet, Wi-Fi)Verification Layer (witnesses, monitors)Cryptographic checks and gossip vs. hardware medium
(Physical)Trust Policy Layer (client policy)Trust policy is like a firewall rule — decides which logs to trust

Key Difference: AGTS layers are designed for cryptographic verifiability and accountability, while TCP/IP layers are designed for data transport.

3. End-to-End Principle

TCP/IP's end-to-end principle: intelligence at the endpoints; the network stays simple. AGTS: governance authority at the institutions; the transparency network stays simple (append-only logs, witnesses, monitors). The network does not need to understand governance decisions; it only needs to provide immutable, verifiable records.

4. Protocol Stack and Encapsulation

TCP/IP uses encapsulation: application data → TCP segment → IP packet → link frame. AGTS uses a similar encapsulation chain:

Governance Decision Proof Bundle Governance Envelope Canonical Leaf Merkle Tree Leaf

Each layer adds its own headers and signatures, analogous to TCP/IP headers. The canonical leaf is the final encapsulated unit that is "transmitted" (appended) to the log.

5. Addressing and Identifiers

TCP/IP: IP addresses identify network interfaces. DNS provides human-readable names.

AGTS: log_id = SHA256(SubjectPublicKeyInfo) uniquely identifies a transparency log. Self-certifying, cryptographic fingerprint. Governance Envelopes carry log_binding.log_id to specify which log is authoritative.

Both use fixed-length identifiers. AGTS's log_id is inherently tied to the log's signing key — authentication by construction.

6. Reliability and Error Detection

Inclusion proof ≈ TCP ACK. Consistency proof ≈ TCP sequence number continuity. Equivocation proof ≈ TCP duplicate ACK indicating forgery.

7. Congestion Control vs. Governance Flow Control

TCP's congestion control adapts sending rate to network capacity. AGTS's governance flow control is the fail-closed rule and the HCE feedback loop. If execution deviates (variance), the system nudges observables and may quarantine future updates — analogous to TCP backing off when packets are lost.

8. Security and Threat Model

TCP/IP was designed in a trusted environment; security (IPsec, TLS) was added later. AGTS builds security into its core:

ThreatTCP/IP MitigationAGTS Mitigation
Packet spoofingIPsec, ingress filteringLogs are self-certifying; signatures on STHs and envelopes
Man-in-the-middleTLSTransparency logs are public; monitors detect equivocation
Denial of serviceVariousLogs are append-only; monitors detect partition attacks
Data tamperingTCP checksumsMerkle tree ensures tamper-evidence

AGTS's threat containment model explicitly separates authorities so no single actor can both authorize and hide actions — a property not present in TCP/IP.

9. Extensibility and Vertical Instantiations

TCP/IP allows different application protocols (HTTP, SMTP) on top. AGTS allows Vertical Instantiations for different domains (finance, healthcare, autonomous vehicles). The core protocol remains the same; domain-specific parameters are defined in vertical documents — analogous to TCP ports and application-layer protocols.

10. Adoption Path and Network Effect

TCP/IP succeeded because it was simple, freely available, and solved a universal problem. AGTS aims for similar adoption:

11. Comparison Summary

See the table at the top of this page.

12. The "Great Inversion" Parallel

TCP/IP inverted the telecom model: from circuit-switched networks (centralized control) to packet-switched (distributed intelligence at edges). AGTS similarly inverts the cloud model: from a single provider controlling compute, data, logs, and billing to a separation where governance authority is independently verifiable and compute providers are merely executors. This is a structural shift analogous to the internet's shift away from centralized telephony.

13. Why AGTS is the "TCP/IP for Autonomous Systems Governance"

Just as TCP/IP provided a common language for computers to communicate, AGTS provides a common language for autonomous systems to be governed and audited. It abstracts away the specifics of AI models, hardware, and execution environments, focusing on the minimal necessary record: an authorized action, with evidence, in an append-only log, independently verifiable.

This universal primitive enables a whole ecosystem of settlement, compliance, audit, and coordination — much like TCP/IP enabled the web, email, and cloud computing.

AGTS applies the design principles that made TCP/IP successful — layering, minimalism, end-to-end argument, and decentralized trust — to the problem of governing autonomous systems. It is not a communication protocol but an accountability protocol, and in that domain it aims to be as foundational as TCP/IP is for networking.
Architecture overview → Protocol specification → Normative vocabulary →