Compare and contrast methods of applying authentication, authorization, accounting, and non-repudiation procedures in a network environment.