Identification should include a discussion of the methods of organizing files on a network using