Method and arrangement for suppressing duplicate network resources
First Claim
1. A non-transitory computer readable medium storing a computer program which when executed by at least one processor identifies computer network resources on a computer network, the computer program comprising sets of instructions for:
- receiving, from a network node, a duplicate suppression message indicating that the network node has different identifiers in different protocols;
receiving first and second network resource messages from the network node, the first network resource message identifying the network node in a first protocol and the second network resource message identifying the network node in a second protocol;
comparing each of the first and the second network resource messages to the duplicate suppression message to determine that said first network resource message and said second network resource message are from the same network node; and
storing, in a list of network resources, a single entry for the network node based on at least one of the first and second network resource messages.
0 Assignments
0 Petitions
Accused Products
Abstract
A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources. The duplicate suppression information for a particular network resource specifies identifiers associated with that network resource for various protocols. Thus, if a particular network resource responds to more than one network resource request from a single requesting entity, that requesting entity will be able to locate duplicate network resource information. Thus, a single unified list of network resources available for various different protocols may be presented with all duplicate network resources removed.
-
Citations
27 Claims
-
1. A non-transitory computer readable medium storing a computer program which when executed by at least one processor identifies computer network resources on a computer network, the computer program comprising sets of instructions for:
-
receiving, from a network node, a duplicate suppression message indicating that the network node has different identifiers in different protocols; receiving first and second network resource messages from the network node, the first network resource message identifying the network node in a first protocol and the second network resource message identifying the network node in a second protocol; comparing each of the first and the second network resource messages to the duplicate suppression message to determine that said first network resource message and said second network resource message are from the same network node; and storing, in a list of network resources, a single entry for the network node based on at least one of the first and second network resource messages. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer readable medium storing a computer program which when executed by at least one processor identifies computer network resources on a computer network, the computer program comprising sets of instructions for:
-
receiving, from a network node, a first message that includes a first identifier that identifies the network node in a first protocol; receiving, from the network node, a second message that includes a second identifier that identifies the network node in a second protocol, wherein the second identifier is different from the first identifier; determining that the first identifier and said second identifier are both identifiers of the same network node; determining which of the first protocol and the second protocol is a preferred protocol; and storing, in a list of network resources, a single entry for the network node based on the preferred protocol. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium storing a computer program which when executed by at least one processor identifies computer network resources on a computer network, the computer program comprising sets of instructions for:
-
receiving, from a network node, a first message that includes a first identifier that identifies the network node in a first protocol; receiving, from the network node, a second message that includes a second identifier that identifies the network node in a second protocol, wherein the second identifier is different from the first identifier; determining that the first identifier and said second identifier are both identifiers of the same network node; storing the first identifier as an entry for the network node in a list of network resources; determining which of the first protocol and the second protocol is preferred; and removing, when the second protocol is preferred, the first identifier as the entry for the network node in the list of network resources and adding the second identifier as the entry for the network node in the list of network resources. - View Dependent Claims (16, 17)
-
-
18. A method for identifying computer network resources on a computer network, the method comprising:
-
receiving, from a network node, a duplicate suppression message indicating that the network node has different identifiers in different protocols; receiving first and second network resource messages from the network node, the first network resource message identifying the network node in a first protocol and the second network resource message identifying the network node in a second protocol; comparing each of the first and the second network resource messages to the duplicate suppression message to determine that said first network resource message and said second network resource message are from the same network node; and storing, in a list of network resources, a single entry for the network node based on at least one of the first and second network resource messages. - View Dependent Claims (19, 20, 21)
-
-
22. A method for identifying computer network resources on a computer network, the method comprising:
-
receiving, from a network node, a first message that includes a first identifier that identifies the network node in a first protocol; receiving, from the network node, a second message that includes a second identifier that identifies the network node in a second protocol, wherein the second identifier is different from the first identifier; determining that the first identifier and said second identifier are both identifiers of the same network node; determining which of the first protocol and the second protocol is a preferred protocol; and storing, in a list of network resources, a single entry for the network node based on the preferred protocol. - View Dependent Claims (23, 24)
-
-
25. A method for identifying computer network resources on a computer network, the method comprising:
-
receiving, from a network node, a first message that includes a first identifier that identifies the network node in a first protocol; receiving, from the network node, a second message that includes a second identifier that identifies the network node in a second protocol, wherein the second identifier is different from the first identifier; determining that the first identifier and said second identifier are both identifiers of the same network node; storing the first identifier as an entry for the network node in a list of network resources after receiving the first message; determining which of the first protocol and the second protocol is preferred; and when the second protocol is preferred, removing the first identifier as the entry for the network node in the list of network resources and adding the second identifier as the entry for the network node in the list of network resources. - View Dependent Claims (26, 27)
-
Specification