They can be used for a variety of functions, including
securing the information that is generated in predefined areas, choosing the fastest
route from one point to another, and providing redundant network connections so
that a problem in one area will not degrade network operations in other areas.