3 How to choose an authentication method?

Given all the choices of authentication methods, which one should you use on your network?

 3.1 Small network with no network-based file systems
 3.2 Low security small to medium networks with shared file systems
 3.3 High security network with shared file systems
 3.4 High security, shared file systems and general access control