Comments
Overview in the network Control of all end devices Full flexibility Security against unauthorized access More time Automatic reaction