Related content
Previous snippet
Figure 9-7 happens to use unstereotyped ports on a general block distributed to users, and stereotyped ports on its specializations for implementation, but the modelers might have not used stereotypes at all, if they did not care whether the model met those constraints (such as no behaviors on proxy ports, or no internal binding connectors to full ports).