Hello everybody,

As part of our distance learning project, we need in-depth technical 
information about security mechanisms and multicast allocation in the 
AG.  Are there any documents or papers about this?

The team will be doing low-level implementation, so we need  hard-core 
documentation for techies :o)

Thanks,

Dio.-

Reply via email to