While this methodology allows each computer to identify other computers which are available over the network, without requiring assistance from a system administrator or other operator, it does require the computers and other resources to broadcast a number of messages.