This image displays how collectors collect data only from network objects with appropriate roles.