With limited view of network: an attacker might have tight control over a network.
Portions of the Internet purposefully not open to public view or hidden networks whose architecture is superimposed on that of Internet.