How?
Security Exchanges
End-to-end in control (mostly…)
Identical content, two
source sites.
Source A
Group set A
Source B
Group set B
Dedicated or
Shared Backbone
•
PIM-SM
•
Static S,G Joins
•
SSM
…
Customer 1
Customer N