scispace - formally typeset
Search or ask a question

Showing papers on "Node (networking) published in 1992"


Journal ArticleDOI
TL;DR: This paper deals with a two-dimensional space-filling approach in which each node is a rectangle whose area is proportional to some attribute such as node size.
Abstract: The traditional approach to representing tree structures is as a rooted, directed graph with the root node at the top of the page and children nodes below the parent node with lines connecting them (Figure 1). Knuth (1968, p. 305-313) has a long discussion about this standard representation, especially why the root is at the top and he offers several alternatives including brief mention of a space-filling approach. However, the remainder of his presentation and most other discussions of trees focus on various node and edge representations. By contrast, this paper deals with a two-dimensional (2-d) space-filling approach in which each node is a rectangle whose area is proportional to some attribute such as node size.

1,573 citations


Journal ArticleDOI
TL;DR: In this paper, the authors consider a 2-layer, 3-node, n-input neural network whose nodes compute linear threshold functions of their inputs and show that it is NP-complete to decide whether there exist weights and thresholds for this network so that it produces output consistent with a given set of training examples.

479 citations


Book
14 Dec 1992
TL;DR: In this paper, a survey of survivability models using node types is presented, including basic inequalities, lifting theorems, partition inequalities, and node partition inequalities for survivability under connectivity constraints.
Abstract: Motivation.- Network survivability models using node types.- Survivable network design under connectivity constraints - a survey.- Decomposition.- Basic inequalities.- Lifting theorems.- Partition inequalities.- Node partition inequalities.- Lifted r-cover inequalities.- Comb inequalities.- How to find valid inequalities.- Implementation of the cutting plane algorithm.- Computational results.

400 citations


Journal ArticleDOI
TL;DR: The first approximation algorithm for the node-weighted Steiner tree problem is given and its performance guarantee is within a constant factor of the best possible unless $\tilde P \supseteq NP$.

394 citations


Patent
21 Jul 1992
TL;DR: In this article, a distributed computer system has a trusted computing base that includes an authentication agent for authenticating requests received from principals at other nodes in the system, and the server process is provided with a local cache of authentication data that identifies requesters whose previous request messages have been authenticated.
Abstract: A distributed computer system has a number of computers coupled thereto at distinct nodes. The computer at each node of the distributed system has a trusted computing base that includes an authentication agent for authenticating requests received from principals at other nodes in the system. Requests are transmitted to servers as messages that include a first identifier provided by the requester and a second identifier provided by the authentication agent of the requester node. Each server process is provided with a local cache of authentication data that identifies requesters whose previous request messages have been authenticated. When a request is received, the server checks the request's first and second identifiers against the entries in its local cache. If there is a match, then the request is known to be authentic. Otherwise, the server node's authentication agent is called to obtain authentication credentials from the requester's node to authenticate the request message. The principal identifier of the requester and the received credentials are stored in a local cache by the server node's authentication agent. The server process also stores a record in its local cache indicating that request messages from the specified requester are known to be authentic, thereby expediting the process of authenticating received requests.

382 citations


Journal ArticleDOI
TL;DR: Properties of neural network performance are investigated by studying the modelling of non-linear dynamical systems, including node selection, prediction, prediction and the effects of noise.
Abstract: Properties of neural network performance are investigated by studying the modelling of non-linear dynamical systems Network complexity, node selection, prediction and the effects of noise are studied and some new metrics of performance are introduced The results are illustrated with both simulated and industrial examples

266 citations


Patent
30 Sep 1992
TL;DR: In this paper, a remote mobile node acquires time-correlated data of its actual position from a global positional system (GPS), and securely transmits the information as a position history to a central facility.
Abstract: A communication system includes a remote mobile node which acquires time-correlated data of its actual position from a global positional system (GPS), and securely transmits the information as a position history to a central facility. The mobile node includes encrypted programming material such as copyrighted video. At the central facility, a comparison is made between the received position history and predetermined signature data representing acceptable time-position histories. If a positive match is detected, a decryption key associated with the matched history is forwarded to the mobile node for decoding of the encrypted programming material.

255 citations


Patent
23 Dec 1992
TL;DR: In this article, a computer cluster architecture including a plurality of CPUs at each of a plurality-of- nodes is described, where each CPU has the property of coherency and includes a primary cache.
Abstract: A computer cluster architecture including a plurality of CPUs at each of a plurality of nodes. Each CPU has the property of coherency and includes a primary cache. A local bus at each node couples: all the local caches, a local main memory having physical space assignable as-shared space and non-shared space and a local external coherency unit (ECU). An inter-node communication bus couples all the ECUs. Each ECU includes a monitoring section for monitoring the local and inter-node busses and a coherency section for a) responding to a non-shared cache-line request appearing on the local bus by directing the request to the non-shared space of the local memory and b) responding to a shared cache-line request appearing on the local bus by examining its coherence state to further determine if inter-node action is required to service the request and, if such action is required, transmitting a unique identifier and a coherency command to all the other ECUs. Each unit of information present in the shared space of the local memory is assigned, by the local ECU, a coherency state which may be: exclusive (the local copy of the requested information is unique in the cluster); 2) modified (the local copy has been updated by a CPU in the same node); 3) invalid (a local copy either does not exist or is known to be out-of-date); or 4) shared (the local copy is one of a plurality of current copies present in a plurality of nodes).

246 citations


Proceedings ArticleDOI
01 Jun 1992
TL;DR: This work presents a technique for computing upper bounds on the distribution of individual per-session performance measures such as delay and buffer occupancy for networks in which sessions may be routed over several “hops.”
Abstract: We present a technique for computing upper bounds on the distribution of individual per-session performance measures such as delay and buffer occupancy for networks in which sessions may be routed over several “hops.” Our approach is based on first stochastically bounding the distribution of the number of packets (or cells) which can be generated by each traffic source over various lengths of time and then “pushing” these bounds (which are then shown to hold over new time interval lengths at various network queues) through the network on a per-session basis. Session performance bounds can then be computed once the stochastic bounds on the arrival process have been characterized for each session at all network nodes. A numerical example is presented and the resulting distributional bounds compared with simulation as well as with a point-valued worst-case performance bound.

238 citations


Patent
31 Jan 1992
TL;DR: In this paper, a packet is provided to a gateway, which inserts the parcel without modification into a packet with address information for the physical through session layers in the packet header, and the packet is then transmitted to another network node, which receives and delivers the unmodified parcel to the addressed destination virtual service.
Abstract: A network or telemetry system which allows virtual services at the application or presentation layer to communicate with other virtual services without regard to the physical interconnections. Each message, called a parcel, includes the information to be transmitted along with a virtual address header. The parcel is provided to a gateway, which inserts the parcel without modification into a packet with address information for the physical through session layers in the packet header. The packet is then transmitted to another network node, which receives and delivers the unmodified parcel to the addressed destination virtual service. A number of parcels from the same or different virtual services can be packed into a single packet for transmission from the gateway in cases where these parcels are all directed to virtual services at the same destination node. Once a session is established, such as between a gateway and a workstation, virtual services at the gateway node and the workstation can communicate with each other without requiring a lot of header overhead for each transmission. Instead, the session need simply be identified. Each gateway typically has one session at a time, but a workstation can support up to 64 sessions simultaneously.

237 citations


Journal ArticleDOI
TL;DR: The message-driven processor (MDP), a 36-b, 1.1-million transistor, VLSI microcomputer, specialized to operate efficiently in a multicomputer, is described and incorporates primitive mechanisms for communication, synchronization, and naming which support most proposed parallel programming models.
Abstract: The message-driven processor (MDP), a 36-b, 1.1-million transistor, VLSI microcomputer, specialized to operate efficiently in a multicomputer, is described. The MDP chip includes a processor, a 4096-word by 36-b memory, and a network port. An on-chip memory controller with error checking and correction (ECC) permits local memory to be expanded to one million words by adding external DRAM chips. The MDP incorporates primitive mechanisms for communication, synchronization, and naming which support most proposed parallel programming models. The MDP system architecture, instruction set architecture, network architecture, implementation, and software are discussed. >

Proceedings ArticleDOI
07 Jun 1992
TL;DR: The clustering technique described provides a basis for automatic feature selection and dimensionality reduction and Adaptation of kernel shape provides a tradeoff of increased accuracy for increased complexity and training time.
Abstract: Probabilistic neural networks (PNNs) learn quickly from examples in one pass and asymptotically achieve the Bayes-optimal decision boundaries. The major disadvantage of a PNN stems from the fact that it requires one node or neuron for each training pattern. Various clustering techniques have been proposed to reduce this requirement to one node per cluster center. The correct choice of clustering technique will depend on the data distribution, data rate, and hardware implementation. Adaptation of kernel shape provides a tradeoff of increased accuracy for increased complexity and training time. The technique described also provides a basis for automatic feature selection and dimensionality reduction. >

Patent
08 Jun 1992
TL;DR: In this paper, a system for making procedure calls can be used with a network of computers, where an application program on a local node calls a desired library procedure on a remote node.
Abstract: A system for making procedure calls can be used with a network of computers. An application program on a local node calls a desired library procedure. The library procedure can be available on the local node or a remote node, and the location need not be known by the application. If the library procedure is available on a remote node, a remote router procedure communicates a procedure identifier to the remote node. The procedure is executed, and any results are returned to the locol node, to be returned to the application program.

Proceedings ArticleDOI
01 Jun 1992
TL;DR: Experiments indicate that the multiplexed R-tree with PI heuristic gives better response time than the disk-stripping (=“Super-node”) approach, and imposes lighter load on the I/O sub-system.
Abstract: We consider the problem of exploiting parallelism to accelerate the performance of spacial access methods and specifically, R-trees [11]. Our goal is to design a server for spatial data, so that to maximize the throughput of range queries. This can be achieved by (a) maximizing parallelism for large range queries, and (b) by engaging as few disks as possible on point queries [22].We propose a simple hardware architecture consisting of one processor with several disks attached to it. On this architecture, we propose to distribute the nodes of a traditonal R-tree, with cross-disk pointers (“Multiplexed” R-tree). The R-tree code is identical to the one for a single-disk R-tree, with the only addition that we have to decide which disk a newly created R-tree node should be stored in. We propose and examine several criteria to choose a disk for a new node. The most successful one, termed “proximity index” or PI, estimates the similarity of the new node with the other R-tree nodes already on a disk, and chooses the disk with the lowest similarity. Experimental results show that our scheme consistently outperforms all the other heuristics for node-to-disk assignments, achieving up to 55% gains over the Round Robin one. Experiments also indicate that the multiplexed R-tree with PI heuristic gives better response time than the disk-stripping (=“Super-node”) approach, and imposes lighter load on the I/O sub-system.The speed up of our method is close to linear speed up, increasing with the size of the queries.

Patent
Charvillat Eric1
29 Jun 1992
TL;DR: In this paper, the authors propose a call admission control (CAC) algorithm to allocate a portion of a free bandwidth resource exclusively to the user for the duration of the call according to established contract parameter values.
Abstract: In a packet (ATM) network, a source node at the entry of the network is responsive to a connection request from a user terminal for invoking a CAC (call admission control) algorithm to accept or reject the request depending on the amount of resource requested by the user, and allocates a portion of a free bandwidth resource exclusively to the user for the duration of the call according to established contract parameter values. Each node of the network responds to a reallocation request from the user for transmitting a copy of the request to a downstream node to elicit an acceptance message therefrom, and reserving a portion of a pool bandwidth resource and invoking the CAC algorithm to additionally reserve a portion of the free bandwidth resource. The node proceeds to allocate the reserved pool bandwidth to the user in response to the acceptance message indicating that the same amount of the reserved pool bandwidth is available in the downstream node. The allocation of the pool bandwidth is temporary. When a portion of the free bandwidth resource is reserved using the CAC algorithm, this portion is exclusively allocated to the user until the end of the call and the temporarily allocated pool bandwidth is returned to the pool resource for other users.

Patent
14 Dec 1992
TL;DR: In this paper, an improved system for administration of license terms for a software product on the network, having an arrangement, for tracking software product usage, with one of the computers acting as a license server, is presented.
Abstract: An improved system for administration of license terms for a software product on the network, having an arrangement, for tracking software product usage, with one of the computers acting as a license server. This arrangement permits the license server (i) to identify the current set of nodes that are using the software product, (ii) to handle license data concerning conditions under which usage of the software product is permitted at any given node, and (iii) to determine whether at any given time the conditions would be satisfied if a given node is added to this set of nodes. The software product may thus include instructions to interface with the license server to cause enforcement of the license terms. The improvement, in one embodiment, to the system includes a policy server database maintained on each node, containing data specifying conditions under which usage of the software product is permitted on the corresponding node. Each node also has a policy server "daemon" in association with the corresponding policy server database, for (i) communicating with the license server, (ii) interfacing with both the software product and the corresponding policy server database, (iii) enforcing the license terms applicable to the software product at a given local node on the basis of both license policy maintained at the local node as well as applicable data from the license server.

Patent
10 Jan 1992
TL;DR: In this paper, a digital switching network for providing simultaneous connections among user processors of processor-based communications equipment is presented, where the user processors act as originators and destinations of data communications packets.
Abstract: A digital switching network for providing simultaneous connections among user processors of processor-based communications equipment. The user processors act as originators and destinations of data communications packets. Packet data connections are through node controllers, which communicate with gateways, which are connected to a switching network via packet links. Control messages are communicated between node controllers, gateways, and an interchange control subsystem via various control message links. All control message processing and packet data transmissions are synchronized with a packet frame synchronization signal, and processing tasks performed by each of the network subsystems are pipelined so that they occur simultaneously. Service requests are queued in a central queue in the interchange control system. The synchronization and queueing simplify the control messages that are required to set up and release the connections.

Journal ArticleDOI
01 Jan 1992
TL;DR: A partial taxonomy for cognitive maps is provided and the notions of NPN (negative-positive-neural) logic, NPN relations, coupled-type neurons, and coupled- type neural networks are introduced and used as a framework for cognitive map modeling.
Abstract: A partial taxonomy for cognitive maps is provided. The notions of NPN (negative-positive-neural) logic, NPN relations, coupled-type neurons, and coupled-type neural networks are introduced and used as a framework for cognitive map modeling. D-POOL a cognitive-map-based architecture for the coordination of distributed cooperative agents, is presented. D-POOL consists of a collection of distributed nodes. Each node is a cognitive-map-based metalevel system coupled with a local expert/database system (or agent). To solve a problem, a local node first pools cognitive maps from relevant agents in an NPN relation that retains both negative and positive assertions. New cognitive maps are then derived and focuses of attentions are generated. With the focuses, a solution is proposed by the local node and passed to the remote systems. The remote systems respond to the proposal, and D-POOL strives for a cooperative or compromised solution through coherent communication and perspective sharing. The utility of D-POOL is demonstrated using two examples in distributed group decision support. >

Patent
25 Feb 1992
TL;DR: In this article, a method and apparatus for initial routing and rerouting of connections to a slave node based on ordering candidate slave connections (502), searching existing connections (507) for candidate best routes and validating the selected best route comparing actual route delays and available bandwith with maximum allowable delays and loading of the candidate slave connection.
Abstract: A method and apparatus for use in a cell network node (10) for initial routing and rerouting of connections to a slave node based on ordering candidate slave connections (502), searching existing connections (507) for candidate best routes and validating the selected best route comparing actual route delays and available bandwith with maximum allowable delays and loading of the candidate slave connection. The invention also provides for programmable queuing delays by controlling queue lengths (212, 214, 216, 218) and for improved justification of reassembled information using actual maximum node delays.

Journal ArticleDOI
TL;DR: A fault-tolerant communication scheme that facilitates near-optimal routing and broadcasting in hypercube computers subject to node failures is described and it is shown that by only using 'feasible' paths that try to avoid unsafe nodes, routing and Broadcasting can be substantially simplified.
Abstract: A fault-tolerant communication scheme that facilitates near-optimal routing and broadcasting in hypercube computers subject to node failures is described. The concept of an unsafe node is introduced to identify fault-free nodes that may cause communication difficulties. It is shown that by only using 'feasible' paths that try to avoid unsafe nodes, routing and broadcasting can be substantially simplified. A computationally efficient routing algorithm that uses local information is presented. It can route a message via a path of length no greater than p+2, where p is the minimum distance from the source to the destination, provided that not all nonfaulty nodes in the hypercube are unsafe. Broadcasting can be achieved under the same fault conditions with only one more time unit than the fault-free case. The problems posed by deadlock in faulty hypercubes are discussed, and deadlock-free implementations of the proposed communication schemes are presented. >

Journal ArticleDOI
TL;DR: An open problem about minimum time gossiping in complete graphs is settled and definitive new optimal time algorithms are derived for complete graphs, rings, regular grids, and toroidal grids that significantly extend existing results.
Abstract: The gossip problem involves communicating a unique item from each node in a graph to every other node. This paper studies the minimum time required to do this under the weakest model of parallel communication, which allows each node to participate in just one communication at a time as either sender or receiver. A number of topologies are studied, including the omplete graph, grids, hypercubes, and rings. Definitive new optimal time algorithms are derived for complete graphs, rings, regular grids, and toroidal grids that significantly extend existing results. In particular, an open problem about minimum time gossiping in complete graphs is settled. Specifically, for a graph with N nodes, at least $\log _\rho N$ communication steps, where the logarithm is in the base of the golden ratio $\rho $, are required by any algorithm under the weakest model of communication. This bound, which is approximately $1.44\log _2 N$, can be realized for some networks and so the result is optimal.

Patent
22 Oct 1992
TL;DR: In this paper, a method for restoring a communication failure in a network comprises the steps of providing a predetermined order for selection to the links included in the network, searching an alternative communication path, and transmitting the first path setup message to a second node also included in a path and connected to the first node by a second link, for effecting a setup of connection therein.
Abstract: A method for restoring a communication failure in a network comprises the steps of providing a predetermined order for selection to the links included in the network, searching an alternative communication path upon a failure in communication occurring in the network, producing, at a first arbitrary node included in the alternative communication path, a first path setup message containing at least information about the number of the paths to be selected in a first link extending from the first node for setting up the alternative communication path, and an identification code of the path that is to be selected at first in the first link for establishing the alternative communication path, transmitting the first path setup message to a second node also included in the alternative communication path and connected to the first node by a second link, for effecting a setup of connection therein. The second node selects paths with the number specified by the path setup message according to said predetermined order of selection and effects a connection to the paths in the first link according to the order of selection.

Journal ArticleDOI
TL;DR: Three heuristics are developed for generating feasible solutions to the topological design problem of computer communication networks and a Lagrangean relaxation of the problem is presented and effective solution procedures of thelagrangean problem are developed.

Patent
17 Aug 1992
TL;DR: In this article, a self healing, passive protected ring network and a method of operation are described. But the authors do not specify how the protection ring can be installed without modifying or adding to active electronic equipment at each node and remains unchanged when the working ring's equipment is upgraded to a higher line transmission rate.
Abstract: A self healing, passive protected ring network and a method of operation are disclosed. The ring network includes a plurality of active nodes interconnected by optical fibers into a working ring. The ring network also includes a passive optical fiber protection ring which interfaces with the working ring through a small number of optical switches located at each node. In the event of a failure in the optical fibers or nodes of the working ring, the optical switches are set to interconnect the protection ring to the nodes on either side of the failure and to bypass all other nodes. It is a particular advantage of the present invention that the protection ring may be installed without modifying or adding to the active electronic equipment at each node and remains unchanged when the working ring's equipment is upgraded to a higher line transmission rate.

Journal ArticleDOI
TL;DR: In this paper, a multihop packet radio network is considered with a single traffic class and given end-to-end transmission requirements, and the decomposition of the problem into a pure routing and a pure scheduling problem is crucial for the characterization of the optimal transmission schedule.
Abstract: A multihop packet radio network is considered with a single traffic class and given end-to-end transmission requirements. A transmission schedule specifies at each time instant the set of links which are allowed to transmit. The purpose of a schedule is to prevent interference among transmissions from neighboring links. Given amounts of information are residing initially at a subset of the network nodes and must be delivered to a prespecified set of destination nodes. The transmission schedule that evacuates the network in minimum time is specified. The decomposition of the problem into a pure routing and a pure scheduling problem is crucial for the characterization of the optimal transmission schedule. >

Patent
22 Jun 1992
TL;DR: In this paper, a Transport Layer Protocol Boundary (TLPB) architecture is described which allows an application program to run over a non-native transport protocol without first generating a protocol compensation package tailored to the transport protocols assumed by the program's application programming interface and by the available transport provider.
Abstract: A Transport Layer Protocol Boundary (TLPB) architecture is described which will permit an application program to run over a non-native transport protocol without first generating a protocol compensation package tailored to the transport protocols assumed by the program's application programming interface and by the available transport provider. All transport functions required by the program are converted to standardized or TLPB representations. When a connection between the first application program and a second remote application is requested, the individual required TLPB transport functions are compared to corresponding functions supported by the transport provider. Compensations are invoked only where there is a mismatch. The node on which the remote application program runs is informed of the compensations so that necessary de-compensation operations can be performed before the data is delivered to the remote application program.

Journal ArticleDOI
TL;DR: A distributed system-level diagnosis algorithm called Adaptive DSD is shown to minimize network resources and has resulted in a practical implementation and is proven correct in that each fault-free node reaches an accurate independent diagnosis of the fault conditions of the remaining nodes.
Abstract: The practical application and implementation of online distributed system-level diagnosis theory is documented. Proven distributed diagnosis algorithms are shown to be impractical in real systems due to high resource requirements. A distributed system-level diagnosis algorithm called Adaptive DSD is shown to minimize network resources and has resulted in a practical implementation. Adaptive DSD assumes a distributed network, in which network nodes can test other nodes and determine them to be faulty or fault-free. Tests are issued from each node adaptively and depend on the fault situation of the network. Test result reports are generated from test results and forwarded between nodes in the network. Adaptive DSD is proven correct in that each fault-free node reaches an accurate independent diagnosis of the fault conditions of the remaining nodes. No restriction is placed on the number of faulty nodes; any fault situation with any number of faulty nodes is diagnosed correctly. An implementation of the Adaptive DSD algorithm is described. >

Proceedings ArticleDOI
01 Oct 1992
TL;DR: A dynamic multi-path routing scheme that has been considered for connection oriented homogeneous high speed networks to bridge the gap between routing and congestion control as the network becomes congested is described.
Abstract: In this paper we describe briefly a dynamic multi-path routing scheme that has been considered for connection oriented homogeneous high speed networks. The fundamental objective of the scheme is to bridge the gap between routing and congestion control as the network becomes congested. Because propagation delay far out shadows queueing and transmission delay in high speed networks, the proposed routing scheme works as a shortest path (minimum hop) first algorithm under light traffic conditions. However as the shortest path becomes congested, the source node uses multiple paths when and if available in order to distribute the load and reduce packet loss. The scheme is a cross between Alternate Path routing and Trunk Reservation.We compare the performance of the proposed scheme with the Shortest Path Only algorithm, the Alternate Path routing algorithm, the Random Routing algorithm, and the Trunk Reservation scheme. The throughput and packet loss performance are compared via simulations. These have been carried out concentrating on a 5 node network with varying traffic patterns, the intention being to gain insight into the strengths and weaknesses of the various schemes.

Patent
Florin Oprescu1
21 Dec 1992
TL;DR: In this article, a bus arbitration scheme is implemented in a system where an arbitrary assembly of nodes on a system bus have been resolved into an acyclic directed graph, where one node designated a root node and all other nodes have established parent/child relationships with the nodes to which they are linked.
Abstract: A bus arbitration scheme is implemented in a system where an arbitrary assembly of nodes on a system bus have been resolved into an acyclic directed graph The hierarchical arrangement of nodes has one node designated a root while all other nodes have established parent/child relationships with the nodes to which they are linked Each node may have a plurality of connected child ports with a predetermined acknowledgment priority scheme established Fair bus access arbitration provides for bus granting in a sequence corresponding to the predetermined port priorities allowing all nodes a turn on the bus The root node may always assert its priority access status to gain bus access which is useful for accommodating a root node which requires isochronous data transfer Alternatively, a token passing arbitration scheme may be implemented where the token for bus access is passed around the nodes according to the above-described predetermined port priority scheme Preemptive bus initialization may be triggered by any node upon detection of a necessitating error or addition or removal of a connection to an existing node

Proceedings ArticleDOI
02 Dec 1992
TL;DR: The authors develop and analyze an optimal synchronous capacity allocation scheme and the optimality of the allocation scheme proposed here is formally proved, and the bounds for its worst case achievable utilization are derived.
Abstract: The authors study the problem of transmitting synchronous messages before their deadlines in communication networks where the timed token medium access control protocol is employed. Synchronous capacity, defined as the maximum time for which a node can transmit its synchronous message every time it receives the token, is a key parameter in the control of synchronous message transmission. To ensure the transmission of synchronous messages before their deadlines, synchronous capacities must be property allocated to individual nodes. The authors develop and analyze an optimal synchronous capacity allocation scheme. An optimal scheme can allocate the synchronous capacities in such a way that the synchronous message deadlines are guaranteed if there exists any allocation scheme that can do so. The optimality of the allocation scheme proposed here is formally proved, and the bounds for its worst case achievable utilization are derived. >