Identification should include how the network layer uses IP protocols for reliable communications.