The method as recited in claim 1 where N is equal to or greater than 2, which method includes the further step of: transmitting a ghost message, with a target address equal to the target address of said transmitted message, on all outputs of said node other than an output on which said transmitted message is emplaced. 12.