Situations derived from the peripheral exploitation reveal different features according to techniques used (we