These are combined processes for effective network and security processes. Authentication is for identifying a consumer, before the access is allowed with the help of having user name entered by user and valid password. Authorization, the consumer tries to issue commands, after log in into the system. Then the authorization identifies which type of activities or service is permitted to use. Then at last Accounting, which finds the resources consumed during access by the user. It also includes the information about adata sent or received by the user.