The first level of subdivision is made by separating the secure low-level computations from the components that concern themselves with network access, security, authentication, billing, accounting, and high-level protocols.