Method and arrangement for suppressing duplicate network resources
First Claim
1. A non-transitory computer readable medium storing a computer program which, when executed by at least one processor in a network resource, identifies network resources on a computer network, the computer program comprising sets of instructions to cause the network resource to:
- send, from the network resource, a plurality of identifier requests to a plurality of other network resources requesting that the other network resources provide identifiers for a plurality of different protocols;
receive one or more identifiers from each of the other network resources in response to the identifier requests, each identifier associated with a respective network resource for one of the protocols, wherein a first plurality of identifiers is received from a first network resource;
use the first plurality of identifiers to identify the first network resource uniquely; and
provide a single identifier of the one or more identifiers received from each of the other network resources in a list of network resources.
0 Assignments
0 Petitions
Accused Products
Abstract
A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources. The duplicate suppression information for a particular network resource specifies identifiers associated with that network resource for various protocols. Thus, if a particular network resource responds to more than one network resource request from a single requesting entity, that requesting entity will be able to locate duplicate network resource information. Thus, a single unified list of network resources available for various different protocols may be presented with all duplicate network resources removed.
60 Citations
19 Claims
-
1. A non-transitory computer readable medium storing a computer program which, when executed by at least one processor in a network resource, identifies network resources on a computer network, the computer program comprising sets of instructions to cause the network resource to:
-
send, from the network resource, a plurality of identifier requests to a plurality of other network resources requesting that the other network resources provide identifiers for a plurality of different protocols; receive one or more identifiers from each of the other network resources in response to the identifier requests, each identifier associated with a respective network resource for one of the protocols, wherein a first plurality of identifiers is received from a first network resource; use the first plurality of identifiers to identify the first network resource uniquely; and provide a single identifier of the one or more identifiers received from each of the other network resources in a list of network resources. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for identifying computer network resources on a computer network by a network resource, the method comprising:
-
sending a plurality of identifier requests to a plurality of other network resources requesting that the other network resources provide identifiers for a plurality of different protocols; receiving one or more identifiers from each of the other network resources in response to the identifier requests, each identifier associated with a respective network resource for one of the protocols, wherein a first plurality of identifiers is received from a first network resource; using the first plurality of identifiers to identify the first network resource uniquely; and providing a single identifier of the one or more identifiers received from each of the other network resources in a list of network resources. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for identifying computer network resources on a computer network by a network resource, the method comprising:
-
sending a plurality of identifier requests to a plurality of other network resources requesting that the other network resources provide identifiers for a plurality of different protocols; sending a plurality of duplicate suppression requests to the plurality of other network resources requesting that each of the other network resources provide a duplicate suppression message indicating whether that respective network resource has different identifiers in different protocols; using a plurality of identifiers provided in response to the identifier requests to identify each of the other network resources uniquely; and providing a single identifier for each of the other network resources in a list of network resources. - View Dependent Claims (16, 17, 18, 19)
-
Specification