110
CONFIDENTIAL
26-Jan-04
© 2002 Procket Networks, Inc. All rights reserved.
How?
Security Exchanges
•
End-to-end in control (mostly…)
Source A
Group set A
Source B
Group set B
…
Customer 1
Customer N
Dedicated or
Shared Backbone
Identical content, two
source sites.
•
PIM-SM
•
Static S,G Joins
•
SSM