Identification should include protocols and applications used in a small network.