I imagine that and all the other examples rely on a centralized router or everybody has to keep a full network routing table, which means there must be barriers to entry so it's not permissionless/open