Research trusted infrastructures in the architectures and clarify what is a trusted infrastructure. Describe and discuss some common or unique trusted infrastructures used in our networks. Describe the benefits of adding those trusted infrastructures to the architecture.