"An example is dynamic re-routing of data for important customers depending on traffic congestion in parts of the network and applying services such as firewall or intrusion detection services depending on threats in the network." . . . .