With the large-scaled deployment of IPTV services, telecommunication operators have to authenticate users. Users have the rights to access multicast programs only after they pay the fee.
With the large-scaled deployment of IPTV services, telecommunication operators have to authenticate users. Users have the rights to access multicast programs (by joining multicast groups) only after they pay the fee.
This section provides several examples for configuring controllable multicast. These configuration examples explain the networking requirements, configuration roadmap, data preparation, configuration procedure, and configuration files.