Because the operational DCPS has direct access to the secret
data server, and knowing that it is possible to run simulation
versions of DCPS elsewhere in the networking infrastructure,
the DMC abstracts out the identification of and connection
to this server. This abstracted nature reduces the complexity
of the code and of the user interaction, since neither requires
knowledge of the actual route taken to access the secret server.