. . . "spaces in the distributed computing environment. A similar method as illustrated in FIG. 28 may be used to discover devices and other services using other underlying discovery protocols." .