What information should be utilized to identify network applications that are running on an existing network infrastructure?