The optimization of multicast routing is discussed and the delay-constrained minimum cost multicast tree is constructed by simulated annealing algorithm. A model of multicast routing is presented and the result of simulation is shown. Compared with genetic algorithm , simulated annealing algorithm has the ability to get the optimal solution in a short time. The result indicates that the simulated annealing algorithm has characteristics such as high-efficient in multicast routing.
A key management approach of multicast is provided in this paper. It is based on the approach of assignment key to
every group member through key center. In view of some management schemes where members join, leave or are
deleted, key service center must distribute new key through unicast another time. The bigger amount of members the
greater expenses will be spent. In this paper with member varying their upper key service center still distribute the new
keythrough multicast and an ID is assigned to every member to identify their transmission message so as to implement
data origin authentication. The essential principle of this approach is distributing a key generator for each member. For
example a random number generator depending on certain algorithm can be distributed. And every member needs store
a seed table. In this project key can automatically be renewed as time goes by or immediately renewed. Replace unicast
by multicast to renew key decrease the spending. It is not only suitable for the key centralized management scheme
with fewer members but also for the key separated management scheme with large group members and member
In this paper an implementation approach of IPSec inside host operating system is given, which is composed of three
main modules: Kernel IPSec module, where AFT, ESP and theirs encapsulation in kernel are implemented, Key
Management Process module, where IKE consultation and its connection with other parts are implemented, and
Interface module. The whole implementation approach is introduced and each component part is detailed. The
implementation diagram is shown. Several key points such as policy management and so on which should be
considered in implementation are provided. Main software flow diagrams are illustrated. Some functions are
mentioned. The integrated approach inside operation system presented in this paper is modularized to three parts, and
every part is supported by its backstage procedure. So this approach is characterized by easily disposal and transplant.
For example it also can be conveniently applied to router software to implement integration inside router.