. . . . "It provides the necessary facilities to identify users and execute different types of access and services." .