ad agency information maintained in computerized

22
Ad Agency Information maintained in computerized System The main aim of this project is to provide advertisement details like advertisement cost in various channels. Depending upon the budget the various channels can allot different advertisements. Here the total front end is developed using Asp.Net and backend is developed using SQL server. If an agency does not communicate or relay its client’s goals and creative wishes properly problems can occur. Most Full-Service Agencies work on a combination of fee-based and commission based compensation. The fee is paid by the entity for which the marketing is being done. How ever an agency may have better negotiating powers than your company and save you more money in the long run anyways. There are far more advantages to having the right advertising agency than not An advertising agency or ad agency is a “service business” dedicated to creating, planning and handling Advertising (and sometimes other forms of promotion for its clients. An ad agency is independent from the client and provides an outside point of view to the effort of selling the client's products or services. An agency can also handle overall marketing and branding strategies and Sales Promotion for its clients . FRONT END:PHP BACK END:WAMP SERVER

Upload: manikkan

Post on 21-Jul-2015

51 views

Category:

Documents


0 download

TRANSCRIPT

Ad Agency Information maintained in computerized

System

The main aim of this project is to provide advertisement details like

advertisement cost in various channels. Depending upon the budget the various

channels can allot different advertisements. Here the total front end is developed

using Asp.Net and backend is developed using SQL server.

If an agency does not communicate or relay its client’s goals and creative

wishes properly problems can occur. Most Full-Service Agencies work on a

combination of fee-based and commission based compensation. The fee is paid by

the entity for which the marketing is being done. How ever an agency may have

better negotiating powers than your company and save you more money in the long

run anyways. There are far more advantages to having the right advertising agency

than not

An advertising agency or ad agency is a “service business” dedicated to creating,

planning and handling Advertising (and sometimes other forms of promotion for its

clients. An ad agency is independent from the client and provides an outside point of

view to the effort of selling the client's products or services. An agency can also

handle overall marketing and branding strategies and Sales Promotion for its clients.

FRONT END:PHP

BACK END:WAMP SERVER

Ad Dispenser Server maintained for systematic

The main aim of this project is to provide advertisement details like

advertisement cost in various channels. Depending upon the budget the various

channels can allot different advertisements. Here the total front end is developed

using Asp.Net and backend is developed using SQL server.

If an agency does not communicate or relay its client’s goals

and creative wishes properly problems can occur. Most Full-Service Agencies work

on a combination of fee-based and commission based compensation. The fee is paid

by the entity for which the marketing is being done. How ever an agency may have

better negotiating powers than your company and save you more money in the long

run anyways. There are far more advantages to having the right advertising agency

than not

An advertising agency or ad agency is a “service business” dedicated to

creating, planning and handling Advertising (and sometimes other forms of

promotion for its clients. An ad agency is independent from the client and provides

an outside point of view to the effort of selling the client's products or services. An

agency can also handle overall marketing and branding strategies and Sales

Promotion for its clients.

FRONT END: ASP.NET

BACK END: SQL SERVER

Agent-Based Information maintained in computerized

System

The main aim of this project is to provide advertisement details like

advertisement cost in various channels. Depending upon the budget the various

channels can allot different advertisements. Here the total front end is developed

using Asp.Net and backend is developed using SQL server.

If an agency does not communicate or relay its client’s goals

and creative wishes properly problems can occur. Most Full-Service Agencies work

on a combination of fee-based and commission based compensation. The fee is paid

by the entity for which the marketing is being done. How ever an agency may have

better negotiating powers than your company and save you more money in the long

run anyways. There are far more advantages to having the right advertising agency

than not

An advertising agency or ad agency is a “service business” dedicated to

creating, planning and handling Advertising (and sometimes other forms of

promotion for its clients. An ad agency is independent from the client and provides

an outside point of view to the effort of selling the client's products or services. An

agency can also handle overall marketing and branding strategies and Sales

Promotion for its clients.

FRONT END: VB

BACK END: SQL SERVER

Online Airline Reservation System

The main purpose of this vision document is to list the requirements

of the Airline Reservation System project. This document also helps us to collect

and analyze the ideas gathered for the project. This vision document will be

subject to change, if more requirements are added to the project. This document

is mainly prepared to set stage for the design phase of the project. The document

being prepared is the first version of vision document for the Airline Reservation

System project.

The Airline Reservation System project is an implementation of a

general Airline Ticketing website like Orbitz, which helps the customers to

search the availability and prices of various airline tickets, along with the

different packages available with the reservations. This project also covers

various features like online registration of the users, modifying the details of the

website by the management staff or administrator of the website, by adding,

deleting or modifying the customer details, flights or packages information. In

general, this website would be designed to perform like any other airline ticketing

website available online

FRONT END: ASP.NET

BACK END: SQL SERVER

Defect Bug Tracking System

Bug Tracking System is the system which enables to detect the Defects. It not merely detects the Defects but provides the complete information regarding

Defects detected. Bug Tracking System ensures the user of it who needs to know about a provide information regarding the identified Defect. Using this no Defect will be unfixed in the developed application.

The developer develops the project as per customer requirements. In the testing

phase the tester will identify the Defects. Whenever the tester encounter ‘n’ number of Defects he adds the Defect id and information in the database.The tester

reports to both project manager and developer. The Defect details in the database table are accessible to both project manager and developer.

When a customer puts request or orders for a product to be developed. The project manager is responsible for adding users to Bus Tracking System and assigning

projects to the users. The project manager assigns projects to the developers. The developer develops the projects as per customer requirements. The project

manager itself assigns the developed applications to the “Testers” for testing. The testers test the application and identify the Defects in the application.

When the testers encounter ‘n’ no. of Defects, he generates a unique id number for each individual Defect. The Defect information along with its id are mailed to the project manager and developer. This is “Defect Report”. These are stored in the

database. This is useful for further reference .Defect information includes the Defect id, Defect name, Defect priority, project name, Defect location, Defect type.

This whole process continues until all the Defects are got fixed in the application.

The Defect report is mailed to the project manager and the developer as soon as the

Defect is identified. This makes that no error will go unfixed because of poor communication. It makes ensure that anyone who needs to know about a Defect

can learn of it soon after it is reported.

Defect Tracking System plays a vital role in the testing phase. But it supports

assigning projects for the developer, tester by the project manager. The Defect Tracking System maintains the different users separately i.e., it provides separate

environments for project manager, developer and tester.

FRONT END: ASP.NET

BACK END: SQL SERVER

Online Cyber Space Crime Branch System

The aim of this project is to develop an online crime report and managing system which is easily accessible to the public. The police department

and the administrative department

This system registers the complaints from people through online and it will also helpful to police department in catching criminals, in system and person can give any complaint at any time.

In general people in India are afraid to give a complaint in police station because

they are filled with a false fear about the police department. An online complaint registration system will solve the fear of the public and which also helps police

department catching criminals and taking appropriate action

An online solution is very useful as the solution is inherently distributive .this distributive characteristic of the online solution helps in getting the different police

stations to share information and get in contact with one another

FRONT END: PHP

BACK END: WAMP SERVER

News Paper Proclamation Monitoring System

The prime objective of "News Paper Proclamation Monitoring System" is to

develop fully fledged software, which fulfills the requirements of the marketing sections of the

newspaper. The task is to bring under one umbrella the various calculations and functions of the

marketing sections. The project keenly concentrated on the calculations regarding the booking of

Advertisement in different publications of the News Paper.

Advertisement plays an initial role in economic security of newspaper organizations. The

software has the facility to input the data through, easy to use input forms which facilitate the

easy entry of the data. The major outputs are the final reports generated on various reports are

monthly reports, bills for customer etc. The software guarantees flexible handing by giving all

details about marketing.

The project has been planned to be having the view of distributed architecture, with centralized

storage of the database. The application for the storage of the data has been planned. Using the

constructs of MS-SQL Server and all the user interfaces has been designed using the ASP.Net

technologies. The database connectivity is planned using the "SQL Connection" methodology.

The standards of security and data protective mechanism have been given a big choice for proper

usage. The application takes care of different modules and their associated reports, which are

produced as per the applicable strategies and standards that are put forwarded by the

administrative staff.

The entire project has been developed keeping in view of the distributed client server computing

technology, in mind. The specification has been normalized up to 3NF to eliminate all the

anomalies that may arise due to the database transaction that are executed by the general users

and the organizational administration. The user interfaces are browser specific to give distributed

accessibility for the overall system. The internal database has been selected as MS-SQL server

2005.The basic constructs of table spaces, clusters and indexes have been exploited to provide

higher consistency and reliability for the data storage. The MS-SQL server 2005 was a choice as

it provides the constructs of high-level reliability and security. The total front end was dominated

using the ASP.Net technologies. At all proper levels high care was taken to check that the system

manages the data consistency with proper business rules or validations. The database

connectivity was planned using the latest "SQL Connection" technology provided by Microsoft

Corporation. The authentication and authorization was crosschecked at all the relevant stages.

The user level accessibility has been restricted into two zones namely

FRONT END: ASP.NET

B ACK END: SQL SERVER

Critical Path Method for Project Scheduler

Project scheduling inevitably involves uncertainty. The basic inputs

(i.e. time, cost and resources for each activity) are not deterministic and are

affected by various sources of uncertainty. Moreover, there is a causal relationship

between these uncertainty sources and project parameters; this causality is not

modeled in current state-of-the-art project planning techniques (such assimilation

techniques).

This paper introduces an approach, using Bayesian network modeling that

addresses both uncertainty and causality in projects scheduling. Bayesian networks

have been widely used in a range of decision-support applications, but the

application to project management is novel.

The model presented empowers the traditional Critical Path Method (CPM) to

handle uncertainty and also provides explanatory analysis to elicit, represent, and

manage different sources of uncertainty in project planning.

FRONT END: ASP.NET

BACK END: SQL SERVER

Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

With the character of low maintenance, cloud computing provides an

economical and efficient solution for sharing group resource among cloud users.

Unfortunately, sharing data in a multi-owner manner while preserving data and

identity privacy from an untrusted cloud is still a challenging issue, due to the

frequent change of the membership. In this paper, we propose a secure multiowner

data sharing scheme, named Mona, for dynamic groups in the cloud. By leveraging

group signature and dynamic broadcast encryption techniques, any cloud user can

anonymously share data with others.

Meanwhile, the storage overhead and encryption computation cost of our scheme

are independent with the number of revoked users. In addition, we analyze the

security of our scheme with rigorous proofs, and demonstrate the efficiency of our

scheme in experiments.

FRONT END: ASP.NET

BACK END: SQL SERVER

ONLINE MOBILE PHONE SHOP SYSTEM

The project ONLINE MOBILE PHONE SHOP is to develop an Internet based

sale and purchase system for mobile. As mobile market is increasing very

sharply and will increase with boom in near future. Visualizing the huge

opportunity this is an effort to internationalize the business through Internet. By

developing of this portal and keeping the site searchable on Google hence

increas ing the customer base from a local market to all around the globe

My ongoing project is a web application because nowadays Internet is a

prominent tool of marketing mantra. With the advent of the Internet

technologies, world has become a global village. Every year, millions of people

around the world use the Internet to interact in more ways then ever before till

date. People, who surf on Internet, are thinking about the online purchase

because it is very easy and comfortable to order online than going to market and

purchase their required goods. So considering a big hike in the revenue in this

booming sector and one of the successful businesses through Internet one should

be proud to have such a technica l deal.

FRONT END: PHP

BACK END: WAMP SERVER

Computerizes Monitoring Data Maintenance And

Payment Administration System

Employee payroll system project s implemented in VB platform. Main aim

of the project is to develop a software application for organization through which

they can manage financial information of employees from salary to tax. Using this

application organization we manage employee salary, tax payment, loan details

check for every month etc… Details are maintained in database for future use.

Here are list of few feature that are included in employee payroll

system project employee data, payroll record, rates, union membership docs, taxes,

detections, net pay, gross pay, working hour details, payroll leader, pension plan,

pay slip.

In existing system still many organization use manual method for

managing employee salary. Payments are given to hand which is not a effective

method. This method will be not provided accurate information on tax and pay

related information for employees when they apply for bank loans. In order to

solve this problem we develop a payroll system through which is different aspect

of employee information is managed through a single application.

Feature of system are maintaining employee information records

including time sheet management and other feature like generating salary report

and leave report. The system itself would update whatever we recurred. In normal

manual system the possibilities for error warnings, help etc… Whatever we

recurred

Front end : VB

Backend : MS Access

IMAGE ENCRYPTION DECRYPTION

The Project entitled “IMAGE ENCRYPTION DECRYPTION” is to be developed for digital

image hiding by using the Encryption Decryption.

This project presents a digital image hiding technology by using the Encryption Decryption.

Firstly, apply Arnold transform to original image; secondly, apply Encryption Decryption to the original

image and the open image, gaining their Encryption Decryption coefficients. Thirdly, interpolate their

Encryption Decryption coefficient. Finally, reconstruct the image by using Inverse Encryption

Decryption, and thus get the result image. Simulation results show that this approach is easy to use and

safety.

The technique makes use of Encryption Decryption which represents the latest research result on

multi-resolution analysis. By combining the advantages of the two methods, image edge information is

captured more accurately than conventional spectral methods such as wavelet. Encryption Decryption was

originally proposed for image demising and has shown promising performance.

The digital Encryption Decryption is implemented using the fast discrete Encryption Decryption.

Basically, it is computed in the spectral domain. Given an image, both the image and the Encryption

Decryption are transformed into Fourier domain, and then the convolution of the Encryption Decryption

with the image in spatial domain becomes the product in Fourier domain. The wrapping is done by

periodic tiling of the spectrum using the wedge, and then collecting the rectangular coefficient area in the

centre. Through this periodic tiling, the rectangular region collects the wedges corresponding portions

from the surrounding periodic wedges.

Front end : ASP.NET

Backend : SQL

Result Alerts System Using Mails and SMS

The project Entitled as “Result Alerts System Using Mails and SMS” is developed as a web

application using ASP.NET as Front End and SQL Server 2005 as Back End.

The entire process of the result publishing process is based on the online process, which

is not informed by the universities directly to the students. So some of the students in rural area

are do know the result details.

To overcome this system, this project can specify the website for result alert system using

mails and SMS with automation of result publishing. This system deals e three main users by

providing username and password for each. Admin, Students, Colleges.

Admin have to maintain the whole process, Students have to register their details with

full personal details, educational details, course details, this system will generate username and

password in favor of the registered students, to login and view the results. Short Message Service

is represented as advanced in this concept to know registered students result in their mobiles.

By using the username and password the users can login to the system and view their

results, the entire process is suggested based on the university procedure basis. So, the University

can send results to their mail and mobile number through the websites.

Front End: ASP.NET

Back End: SQL Server 2005

RISK ANALYSIS FOR LOAN APPROVAL

This project entitle “RISK ANALYSIS FOR LOAN APPROVAL” is to maintain the loan

approval for the customer from bank. This system maintains the customer details and exist

transaction done in the bank and also maintain the executive details who make arrange for the

loan to the particular customer. This system is mainly providing every detail which has been

required for the customer to get a loan from the bank.

This system maintain the customer details which contain the existing loan or bank

account details which has been feed by the bank employee from the bank system. The executive

details have been maintained by the system to know which executive has been attended the loan

for the customer who approaches the bank. The executive will feed the loan application details

with the security details which has been submitted by the customer to the bank and it has been

send to the branch manager who making approval of the loan authority.

The bank branch manager view the loan application an security details which has been

submitted by the customer and make approval with some criteria. In this section the manager has

been consider the customer who make regular payment and did his transaction with good

condition and his security valuation is less compare with the loan require. The manager

approvals with the some condition which has been follow from the senior in the bank.

FRONT END: ASP.NET

BACK END: SQL SERVER

ONLINE PRINTING PRESS MANAGEMENT

The Project Entitled as “ONLINE PRINTING PRESS MANAGEMENT” is developed

using VB.NET as Front End and SQL SERVER as Back End. This system can be specifying the

details of purchasing books, sold books, vendors and customers. Using this system the level of

the purchase order has been increased. The Owner or the book shop maintainer has done the

operation day to day by entering the outgoing and incoming of books. The Purchase details of

the books are specified in the systematic procedure of the day to day operation like same as the

sold book item also. Vendor details are important for each and every book shop because the

wholesale order can be make an agreement for every book shops.

Maintainer of the bookshop is responsible for the books and also the details of wanting

books. Selling cost module can specify the cost difference between purchasing and sold off the

books. Report Module can be access the overall project specification in the book store.

The management has the responsibility for the purchasing procedure in the company. The

wholesale order of the books and notebooks are made all over the responsibilities from the

vendors. Rack maintenance of the book shop can be maintained by the series of book authors.

Data have been maintained for several years and there is no chance of missing. Reports have

been represented in the crystal form and these can use for re-purchasing in future.

FRONT END: ASP.NET

BACK END: SQL SERVER

ONLINE HOTEL MANAGEMENT SYSTEM

The Project entitled “ONLINE HOTEL MANAGEMENT SYSTEM” is mainly made

for management of hotel information. The entire process is computerized and also makes the

system to generate useful reports which helps in the business decisions.

This system is mainly used for managing and maintaining the records of customers and

room in the hotel. The rooms have different categories such as A.C., non –AC., dormitory etc.

The charges for the rooms and their records will be maintained accordingly. The user details are

stored in to the database for viewing the reports.

This system has been made in a user friendly interface, so that normal persons can add,

delete the entries of customers and handle all the transactions easily. The proposed system helps

to make use of computers with the help of internet so that this can overcome flaws in the existing

system.

The billing system also made easy by using this system in the hotel room system. The

Hotel Management System serves a very important task that it gives the entire information and

their expertise area of work in short time and error free one, which in turns help the management

to utilizing the system properly.

The “ONLINE HOTEL MANAGEMENT SYSTEM” is developed using ASP.NET as

front end and SQL SERVER as its backend.

Efficient Location Training Protocols for Heterogeneous Sensor and Actor

Networks

In this work, we consider a large-scale geographic area populated by tiny sensors and

some more powerful devices called actors, authorized to organize the sensors in their vicinity

into short-lived, actor-centric sensor networks. The tiny sensors run on miniature no rechargeable

batteries, are anonymous, and are unaware of their location. The sensors differ in their ability to

dynamically alter their sleep times.

Indeed, the periodic sensors have sleep periods of predefined lengths, established at

fabrication time; by contrast, the free sensors can dynamically alter their sleep periods, under

program control. The main contribution of this work is to propose an energy-efficient location

training protocol for heterogeneous actor-centric sensor networks where the sensors acquire

coarse-grain location awareness with respect to the actor in their vicinity.

Our theoretical analysis, confirmed by experimental evaluation, shows that the proposed

protocol outperforms the best previously known location training protocols in terms of the

number of sleep/awake transitions, overall sensor awake time, and energy consumption.

FRONT END: JAVA

BACK END: SQL SERVER

Enabling Public Verifiability and Data Dynamics for Storage Security

Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It

moves the application software and databases to the centralized large data centers, where the

management of the data and services may not be fully trustworthy. This unique paradigm brings

about many new security challenges, which have not been well understood.

This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In

particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud

client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA

eliminates the involvement of client through the auditing of whether his data stored in the cloud

is indeed intact, which can be important in achieving economies of scale for Cloud Computing.

The support for data dynamics via the most general forms of data operation, such as block

modification, insertion and deletion, is also a significant step toward practicality, since services

in Cloud Computing are not limited to archive or backup data only.

While prior works on ensuring remote data integrity often lacks the support of either public

verifiability or dynamic data operations, this paper achieves both. We first identify the

difficulties and potential security problems of direct extensions with fully dynamic data updates

from prior works and then show how to construct an elegant verification scheme for seamless

integration of these two salient features in our protocol design. In particular, to achieve efficient

data dynamics, we improve the Proof of Irretrievability model

\cite{Shacham:ASIACRYPT:2008} by manipulating the classic Markel Hash Tree (MHT)

construction for block tag authentication. Extensive security and performance analysis show that

the proposed scheme is highly efficient and provably secure

FRONT END: JAVA

BACK END: SQL SERVER

Mobility Management Approaches for Mobile IP Networks

In wireless networks, efficient management of mobility is a crucial issue to

support mobile users. The mobile Internet protocol (MIP) has been proposed to support global

mobility in IP networks. Several mobility management strategies have been proposed which aim

reducing the signaling traffic related to the Mobile Terminals (MTs) registration with the Home

Agents (HAs) whenever their Care-of-Addresses (CoAs) change.

They use different foreign agents (FAs) and Gateway FAs (GFAs) hierarchies to concentrate the

registration processes. For high-mobility MTs, the Hierarchical MIP (HMIP) and Dynamic

HMIP (DHMIP) strategies localize the registration in FAs and GFAs, yielding to high-mobility

signaling. The Multicast HMIP strategy limits the registration processes in the GFAs. For high-

mobility MTs, it provides lowest mobility signaling delay compared to the HMIP and DHMIP

approaches.

However, it is resource consuming strategy unless for frequent MT mobility. Hence, we propose

an analytic model to evaluate the mean signaling delay and the mean bandwidth per call

according to the type of MT mobility. In our analysis, the MHMIP outperforms the DHMIP and

MIP strategies in almost all the studied cases. The main contribution of this paper is the analytic

model that allows the mobility management approaches performance evaluation.

FRONT END: ASP.NET

BACK END: SQL SERVER

Modeling and Detection of Camouflaging Worm

Active worms pose major security threats to the Internet. This is due to the

ability of active worms to propagate in an automated fashion as they continuously compromise

computers on the Internet. Active worms evolve during their propagation and thus pose great

challenges to defend against them. In this paper, we investigate a new class of active worms,

referred to as Camouflaging Worm (C-Worm in short).

The C-Worm is different from traditional worms because of its ability to intelligently

manipulate its scan traffic volume over time. Thereby, the C-Worm camouflages its propagation

from existing worm detection systems based on analyzing the propagation traffic generated by

worms. We analyze characteristics of the C-Worm and conduct a comprehensive comparison

between its traffic and non-worm traffic (background traffic).

We observe that these two types of traffic are barely distinguishable in the time domain.

However, their distinction is clear in the frequency domain, due to the recurring manipulative

nature of the C-Worm. Motivated by our observations, we design a novel spectrum-based

scheme to detect the C-Worm. Our scheme uses the Power Spectral Density (PSD) distribution

of the scan traffic volume and its corresponding Spectral Flatness Measure (SFM) to distinguish

the C-Worm traffic from background traffic.

Using a comprehensive set of detection metrics and real-world traces as background traffic, we

conduct extensive performance evaluations on our proposed spectrum-based detection scheme.

The performance data clearly demonstrates that our scheme can effectively detect the C-Worm

propagation. Furthermore, we show the generality of our spectrum-based scheme in effectively

detecting not only the C-Worm, but traditional worms as well.

FRONT END: JAVA

BACK END: SQL SERVER

Multiple Routing Configurations for Fast IP Network Recovery

As the Internet takes an increasingly central role in our communications

infrastructure; the slow convergence of routing protocols after a network failure becomes a

growing problem. To assure fast recovery from link and node failures in IP networks, we

present a new recovery scheme called Multiple Routing Configurations (MRC). Our

proposed scheme guarantees recovery in all single failure scenarios, using a single

mechanism to handle both link and node failures, and without knowing the root cause of the

failure. MRC is strictly connectionless, and assumes only destination based hop-by-hop

forwarding.

MRCis based on keeping additional routing information in the routers, and allows packet

forwarding to continue on an alternative output link immediately after the detection of a failure.

It can be implemented with only minor changes to existing solutions. Inthis paper we present

MRC, and analyze its performance with respect to scalability, backup path lengths, and

load distribution after a failure.

We also show how an estimate of the traffic demands in the network can be used to

improve the distribution of the recovered traffic, and thus reduce the chances of congestion when

MRC is used.Keywords: Networking, Rout

FRONT END: JAVA

BACK END: SQL SERVER

Data Delivery Properties of Human Contact Networks

Pocket Switched Networks take advantage of social contacts to

opportunistically create data paths over time. This work employs empirical traces

to examine the effect of the human contact process on data delivery in such

networks. The contact occurrence distribution is found to be highly uneven:

contacts between a few node pairs occur too frequently, leading to inadequate

mixing in the network, while the majority of contacts occur rarely, but are essential

for global connectivity.

This distribution of contacts leads to a significant variation in the fraction of node

pairs that can be connected over time windows of similar duration. Good time

windows tend to have a large clique of nodes that can all reach each other. It is

shown that the clustering coefficient of the contact graph over a time window is a

good predictor of achievable connectivity.

We then examine all successful paths found by flooding and show that though

delivery times vary widely, randomly sampling a small number of paths between

each source and destination is sufficient to yield a delivery time distribution close

to that of flooding over all paths. This result suggests that the rate at which the

network can deliver data is remarkably robust to path failures.

FRONT END: JAVA

BACK END: SQL SERVER