Introduction - If you have any usage issues, please Google them yourself
* To protect our network from unauthorized users.
* Access permissions are allowed only to valid users.
* Resources can be shared between the client and the server.
* Server can take a backup copy of what the client request.
* Server also prepare a report of who all accessed , what was
accessed and day of access.