Method and Arrangement for Suppressing Duplicate Network Resources
0 Assignments
0 Petitions
Accused Products
Abstract
A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources. The duplicate suppression information for a particular network resource specifies identifiers associated with that network resource for various protocols. Thus, if a particular network resource responds to more than one network resource request from a single requesting entity, that requesting entity will be able to locate duplicate network resource information. Thus, a single unified list of network resources available for various different protocols may be presented with all duplicate network resources removed.
-
Citations
39 Claims
-
1-20. -20. (canceled)
-
21. A computer readable medium storing a computer program which when executed by at least one processor identifies computer network resources on a computer network, the computer program comprising sets of instructions for:
-
receiving, from a network node, a duplicate suppression message indicating that the network node has different identifiers in different protocols; receiving first and second network resource messages from the network node, the first network resource message identifying the network node in a first protocol and the second network resource message identifying the network node in a second protocol; using the duplicate suppression message to determine that said first network resource message and said second network resource message are from a single network node. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer readable medium storing a computer program which when executed by at least one processor identifies computer network resources on a computer network, the computer program comprising sets of instructions for:
-
receiving, from a network node, a first message that includes a first identifier that identifies the network node in a first protocol; receiving, from the network node, a second message that includes a second, different identifier that identifies the network node in a second protocol; and determining that the first identifier and said second identifier are both identifiers of the same network node. - View Dependent Claims (30, 31, 32, 33, 34)
-
-
35. A computer readable medium storing a computer program which when executed by at least one processor identifies network resources on a computer network, the computer program comprising sets of instructions for:
-
sending a plurality of requests to a plurality of network resources requesting that the network resources provide identifiers for a plurality of different protocols; using a plurality of identifiers provided in response to the requests to identify each of the network resources uniquely; and providing a single identifier for each of the network resources in a list of network resources. - View Dependent Claims (36, 37, 38, 39)
-
Specification