that's not how it works. you can model different strategies. we settled for one of them which basically assures that nodes open connections to random other nodes. overall this strategy proved not only to be most resilient to eclipse attacks but also had good network graph connectivity properties (i.e. robustness/connectedness of the network, short longest_shortest_path, etc. ).