|
Hello Reader, The last couple of weeks have been action-packed for Gen AI! Two specific announcements were at the forefront - MCP (Model Context Protocol) and A2A (Agent To Agent). In today's edition, we will learn the similarities and differences between both, and answer which parts YOU need to know for the job and interviews. MCPMCP is released by Anthropic. Before we understand MCP, let's understand the existing challenges. Let's say you send a prompt to the app, "What's the weather in Tokyo?". The LLM in the app doesn't know about the current weather, hence it invokes an agent that runs some code. This code reaches out to an external weather tool, which sends weather data in JSON to the agent. Agent passes it to the LLM, and the LLM formats the data in nice natural language and sends it to the user. Question is - how does the agent code interact with the weather tool? Via API. And to do that, as shown below, the agentic code, needs to know the API URL, required header information, and payload. This works, but there are some challenges too:
Hence, MCP was born! MCP standardizes the communication between the agentic code and tools (and local datasources, but tool is the most widely used). What does this mean?
Okay, so MCP standardizes the interaction between the Agent and the underlying tools. But what is this new A2A then? Let's find out. A2AMCP handles the communication between the agent and tools (and local datasources). But how about agent-to-agent? Let's look at the diagram below Agent B has the logic to get the stuff done with tools/datasources using MCP, and this part we understood from above. Now, Agent A needs to call Agent B. How does this happen BEFORE A2A was in the picture: Similar to any other API call, Agent A will invoke the API URL of Agent B, and pass AuthN/Z parameters, and a payload. This brings similar challenges as above:
A2A (or Agent2Agent) standardizes the communication between agents. What does this mean? A2A + MCP Flow
In summary, MCP standardizes the connection between LLM Agents and tools, and A2A standardizes the connection between two agents. They work hand in hand because they complement each other and do not compete with each other. This is a pretty detailed subject, and if you want a more detailed explanation with code snippets, check out video below: If you have found this newsletter helpful, and want to support me 🙏: Checkout my bestselling courses on AWS, System Design, Kubernetes, DevOps, and more: Max discounted links AWS SA Bootcamp with Live Classes, Mock Interviews, Hands-On, Resume Improvement and more: https://www.sabootcamp.com/
Keep learning and keep rocking 🚀, Raj |
Free Cloud Interview Guide to crush your next interview. Plus, real-world answers for cloud interviews, and system design from a top AWS Solutions Architect.
Hello Reader, Agents are everywhere. But there’s a big difference between using an agent and building one end-to-end. Let's face it - if you tell a recruiter that you played with Claude or ChatGPT, or even created a workflow using n8n, that won't impress them. Because when a company hires you, it expects you to know how to build agent using the infrastructure components. With that in mind, let's turn our attention to how to build an agent. Good Agent Let's take a look at building a good...
Hello Reader, If you listen to the loudest voices online, you’d think cloud careers are over. AI agents will design architectures. AGI will explain that to the executives. Coding agents will write everything. As per Anthropic CEO Dario Amodei - Software engineers will be obsolete in 6 - 12 months. And they are the brightest and smartest. If they are doomed, what chances do us, the mere mortals, have? If you look at open Solutions Architect positions, even at AWS, or Microsoft, or Google, it...
Hello Reader, In today’s post, let’s look at another correct but average answer and a great answer that gets you hired to common cloud interview questions. Question - How will you secure your application on AWS? Common but average answer(s) I will use KMS, IAM, and firewall for security I will use KMS for encryption, IAM for access, Security Group, Private subnet Why average? What the interviewer is looking for is you understand different attack vectors and how to mitigate them. Explain what...