Method and arrangement for supressing duplicate network resources
First Claim
1. A method of identifying computer network resources on a computer network and preventing network resource duplication, said method comprising:
- receiving a duplicate suppression message for indicating that a network node has different identifiers in different protocols, the duplicate suppression message received from the network node across said computer network, said duplicate suppression message including;
a first identifier that identifies the network node in a first protocol; and
a second identifier that identifies the network node in a second protocol, wherein the first and second identifiers are either strings or hash values of the strings;
receiving a first network resource message from said network node, said first network resource message comprising a third identifier identifying the network node in said first protocol;
receiving a second network resource message from said network node, said second network resource message comprising a fourth identifier identifying the network node in said second protocol, wherein said second resource message does not have identical content to said first resource message; and
in order to prevent network resource duplication, comparing respectively said first and second identifiers in said duplicate suppression message with the third and fourth identifiers in the first and second network resource messages to determine that said first network resource message and said second network resource message are from a single network node.
2 Assignments
0 Petitions
Accused Products
Abstract
A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources. The duplicate suppression information for a particular network resource specifies identifiers associated with that network resource for various protocols. Thus, if a particular network resource responds to more than one network resource request from a single requesting entity, that requesting entity will be able to locate duplicate network resource information. Thus, a single unified list of network resources available for various different protocols may be presented with all duplicate network resources removed.
36 Citations
30 Claims
-
1. A method of identifying computer network resources on a computer network and preventing network resource duplication, said method comprising:
-
receiving a duplicate suppression message for indicating that a network node has different identifiers in different protocols, the duplicate suppression message received from the network node across said computer network, said duplicate suppression message including; a first identifier that identifies the network node in a first protocol; and a second identifier that identifies the network node in a second protocol, wherein the first and second identifiers are either strings or hash values of the strings; receiving a first network resource message from said network node, said first network resource message comprising a third identifier identifying the network node in said first protocol; receiving a second network resource message from said network node, said second network resource message comprising a fourth identifier identifying the network node in said second protocol, wherein said second resource message does not have identical content to said first resource message; and in order to prevent network resource duplication, comparing respectively said first and second identifiers in said duplicate suppression message with the third and fourth identifiers in the first and second network resource messages to determine that said first network resource message and said second network resource message are from a single network node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer readable medium storing a computer program which when executed by at least one processor identifies computer network resources on a computer network and prevents network resource duplication, the computer program comprising:
-
a set of instructions for receiving a duplicate suppression message for indicating that a network node has different identifiers in different protocols, the duplicate suppression message received from the network node across said computer network, said duplicate suppression message including; a first identifier that identifies the network node in a first protocol; and a second identifier that identifies the network node in a second protocol, wherein the first and second identifiers are either strings or hash values of the strings; a set of instructions for receiving a first network resource message from said network node, said first network resource message comprising a third identifier identifying the network node in said first protocol; a set of instructions for receiving a second network resource message from said network node, said second network resource message comprising a fourth identifier identifying the network node in said second protocol, wherein said second resource message does not have identical content to said first resource message; and a set of instructions for comparing respectively said first and second identifiers in said duplicate suppression message with the third and fourth identifiers in the first and second network resource messages to determine that said first network resource message and said second network resource message are from a single network node in order to prevent network resource duplication. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A duplicate suppression system for identifying resources on a computer network and preventing network resource duplication, said system comprising:
-
a computer network resource identified by a first name in a first protocol and a second name in a second protocol different than the first; and a computer for receiving from the computer network resource; a) a duplicate suppression message for indicating that the resource is identified by the first name in the first protocol and the second name in the second protocol, the duplicate suppression message including (i) a first identifier that identifies the network node in the first protocol and (ii) a second identifier that identifies the network node in the second protocol, wherein the first and second identifiers are either strings or hash values of the strings; b) a first network response message comprising a third identifier identifying the network node in the first protocol; and c) a second network response message comprising a fourth identifier identifying the network node in the second protocol, wherein said computer compares respectively said first and second identifiers in said duplicate suppression message to determine whether said second network response message and said first network response message are redundant in order to prevent network resource duplication. - View Dependent Claims (23, 24)
-
-
25. A method of identifying network resources on a computer network and preventing duplicate network resources, said method comprising:
-
from a network node, receiving a first message that includes a first identifier that is an identification of the network node for a first protocol; from the network node, receiving a second message that includes a second identifier that is an identification of the network node for a second protocol, wherein said first and second identifiers are different; sending a duplicate suppression request across the computer network; from the network node, receiving a duplicate suppression message, said duplicate suppression message comprising third and fourth identifiers that provide the identification of the network node respectively in the first and second protocols; using said third and fourth identifiers in the duplicate suppression message to determine that the first and second identifiers are for the same network node; and storing only one of the first and second identifiers as an entry for the network node in a list of network resources in order to prevent network resource duplication. - View Dependent Claims (26)
-
-
27. A computer readable medium storing a computer program which when executed by at least one processor identifies network resources on a computer network and prevents network resource duplication, the computer program comprising:
-
a set of instructions for receiving, in a first message from a network node, a first identifier that provides an identification of the network node for a first protocol; a set of instructions for receiving, in a second message from the network node, a second identifier that provides an identification of the network node for a second protocol, wherein said first and second identifiers are different; a set of instructions for sending a duplicate suppression request across the computer network; a set of instructions for receiving a duplicate suppression message from the network node across said computer network, said duplicate suppression message comprising third and fourth identifiers that provide the identification of the network node respectively in the first and second protocols; a set of instructions for using said third and fourth identifiers in the duplicate suppression message to determine that the first and second identifiers are for the same network node; a set of instructions for determining which of the first protocol and the second protocol is a preferred protocol; and a set of instructions for storing one of the first identifier and the second identifier that is an identification of the network node in the preferred protocol as an entry for the network node in a list of network resources in order to prevent network resource duplication. - View Dependent Claims (28, 29, 30)
-
Specification