Network to Network
l Scenario 1:
   Employees from two different regional offices want
to synchronize sensitive data and work on the same
project remotely
l Scenario 2:
   System Administrator at Rutgers needs to add more
computers to the computational cluster but has no
more space in the room
l Scenario 3:
   Financial consulting company needs to relay critical
and market sensitive information to a private sector
of a company and needs a secure way to do so