. . . "For example, identity of a source may be solely based on IP address, or a combination of IP address and port, or IP address and any other information available to an intermediate node from the packet." . . .