IP Protocols Part II: Gatekeepers' limitations and the power of composability