Hi Joshua,
It should mostly be managed for you, but you'll probably not get a definite answer to this open-ended question, as the original author of BACnet4J hasn't posted on the forum in quite a while.
I know a significant part of its use it to ensure a device configured expecting to be able to find a remote device doesn't flood the network trying to discover it over and over again (assuming the remote device isn't responding).
But, you'd have to see how it's used to see the purpose of its design. I wouldn't expect a complete set of declarative sentences to avail itself.