110
CONFIDENTIAL
26-Jan-04
© 2002 Procket Networks, Inc. All rights reserved.
How?
Security Exchanges
•End-to-end in control (mostly…)
Source A
Group set A
Source B
Group set B
…
Customer 1
Customer N
Dedicated or Shared Backbone
Identical content, two source sites.
•PIM-SM
•Static S,G Joins
•SSM