Recovery is the Network's ability to return to a prescribed level of operation after a network failure. This level is where the amount of lost data is nonexistent or at a minimum. Recovery is based on having Back-up Files.
Security is the protection of Hardware, Software and Data from unauthorized access. Restricted physical access to computers, password protection, limiting user privileges and data encryption are common security methods. Anti-Virus monitoring programs to defend against computer viruses are a security measure.
11f. Applications
The following lists general applications of a data communication network:
Electronic Mail (e-mail or Email) replaces snail mail. E-mail is the forwarding of electronic files to an electronic post office for the recipient to pick up.
Scheduling Programs allow people across the network to schedule appointments directly by calling up their fellow worker's schedule and selecting a time!
Videotext is the capability of having a 2 way transmission of picture and sound. Games like Doom, Hearts, distance education lectures, etc..
Groupware is the latest network application, it allows user groups to share documents, schedules databases, etc.. ex. Lotus Notes.
Teleconferencing allows people in different regions to "attend" meetings using telephone lines.
Telecommuting allows employees to perform office work at home by "Remote Access" to the network.
Automated Banking Machines allow banking transactions to be performed everywhere: at grocery stores, Drive-in machines etc..
Information Service Providers: provide connections to the Internet and other information services. Examples are Compuserve, Genie, Prodigy, America On-Line (AOL), etc...
Electronic Bulletin Boards (BBS - Bulletin Board Services) are dialup connections (use a modem and phone lines) that offer a range of services for a fee.
Value Added Networks are common carriers such as AGT, Bell Canada, etc.. (can be private or public companies) who provide additional leased line connections to their customers. These can be Frame Relay, ATM (Asynchronous Transfer Mode), X.25, etc.. The leased line is the Value Added Network.