In Multicasting, the information is sent to only the destined recipients. It is like the TV or radio transmission system in which only those terminals receive the information who have tuned themselves to receive it.
It is the bandwidth-conserving technology that reduces the traffic load over the network. The ideal applications that uses the multicast technology includes video conferencing, stock quotes, distance learning, weather updates, video streaming, news and other distributed software applications in the LAN/WAN network. IP multicasting mechanisms depends upon the two protocols i.e. group management protocol and the routing protocols.
Group Management protocols establish the multicast groups and the routing protocols routes the traffic to the destination. Multicast routing protocols makes the distribution tree for the data forwarding in the network. It is an ideal solution for the distribution applications in the TCP/IP based LAN/WAN networks.
Though it has been successful in many businesses but it is not extensively deployed and used by the average users. Special addressing scheme is assigned while implementing the IP multicasting. These addresses are assigned from the Class D i.e. 224.0.0.0 to 239.255.255.255. The typical multicast applications include the following.
- Video conferencing
- Audio conferencing
- Stock Quotes
- Distributed LAN/WAN Software Applications
- Weather Updates
- Data Conferencing
- Network-based games
- Online Training
- Database replication
Multicasting can be implementing in the following situations.
- For better bandwidth utilization.
- Less Router/Hosts Processing.
- When sending the same data to the multiple receivers is required.
- When the recipient address is unknown.
- When a one-to-many communication systems model is required.
- Enhanced performance.
- Optimized performance.
- One-to-many communication system.

This will disappear from the screen and then the main installation page appears:

The following dialog appears on the screen whilst the install program prepares for installation:
After a minute or so (the timing will vary according to your system), the following screen appears:
















Check that what’s being installed is what you want and then click on 













Enter the query shown below and hit F5 to run it:


In the above screenshot, the TCP/IP network protocol library is disabled. We need to enable it in order that remote servers can talk to the newly installed SQL Server.


From here on I will be referring to Policy Based Management as PBM. For implementing PBM, you will need to understand the following three components:
At the foundation of it all are facets. Facets are basically a sub-system of pre-defined database and server properties.
For example, the database facet contains multiple properties - one of them is the Owner property. Once chosen this property will return the owner of the database.
















