Relatively dumb terminals and devices on the network periphery access centralized network services on behalf of their users. The owners of the network are in complete charge of the type and quantity of applications that exist on the network.
An intelligent computer network is most suited for applications in which reliability and security are prime requirements. Application software is centralized and so can be rigorously verified before deployment. This large scale of the network and the ability to verify application operation allows such networks to address very complicated tasks. The costs of development and testing may be spread across many users.
|This page uses Creative Commons Licensed content from Wikipedia (view authors).|