Critical Analysis: The Impact of Cloud on Mobile Applications
VerifiedAdded on 2023/03/30
|13
|2619
|477
Essay
AI Summary
This essay critically evaluates the impact of cloud-based services on mobile applications, focusing on the research by Hu et al. (2016) regarding edge computing. It identifies research questions related to the advantages of cloudlets, key metrics for end-users, the impact of cloudlets on mobile se...

Running head: IMPACT OF THE CLOUD ON MOBILE APPLICATIONS
Impact of the cloud on mobile applications
Enter: Name of the Student
Enter: Name of the University
Author Note
Impact of the cloud on mobile applications
Enter: Name of the Student
Enter: Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1IMPACT OF THE CLOUD ON MOBILE APPLICATIONS
Table of Contents
Introduction......................................................................................................................................2
Research question identified............................................................................................................2
Methodology described...................................................................................................................3
Covering of the pertinent existing research literature with research question.................................3
Agreement between philosophical framework, research question and research methods..............5
Identification of flaw and limitations..............................................................................................7
Ethical prospects of the paper..........................................................................................................8
Data collection and analysis appropriate.........................................................................................8
Research findings support by evidence...........................................................................................9
Analysis of conclusion discussed....................................................................................................9
Reflections on paper......................................................................................................................10
Conclusion.....................................................................................................................................10
Summary........................................................................................................................................10
Reference.......................................................................................................................................12
Table of Contents
Introduction......................................................................................................................................2
Research question identified............................................................................................................2
Methodology described...................................................................................................................3
Covering of the pertinent existing research literature with research question.................................3
Agreement between philosophical framework, research question and research methods..............5
Identification of flaw and limitations..............................................................................................7
Ethical prospects of the paper..........................................................................................................8
Data collection and analysis appropriate.........................................................................................8
Research findings support by evidence...........................................................................................9
Analysis of conclusion discussed....................................................................................................9
Reflections on paper......................................................................................................................10
Conclusion.....................................................................................................................................10
Summary........................................................................................................................................10
Reference.......................................................................................................................................12

2IMPACT OF THE CLOUD ON MOBILE APPLICATIONS
Journal: impact of edge computing on mobile applications. In Proceedings of the 7th ACM
SIGOPS Asia-Pacific Workshop on Systems (p. 5). ACM.
Introduction
The notable determination of this scholar essay to highlight the impact of using cloud
based services on the mobile based applications. This scholarly essay will be critically assessing
the impact of cloud services from the point of view of Hu et al. (2016), the investigators of this
paper have introduced the concept of edge computing which are increasingly used in most of the
mobile devices all over the world. The investigators of the paper stated about the usability of
edge computing which are much helpful to store and compute internet resources. This paper also
have numerous categories and each of the categories are very much significant to cognize the
impact of edge computing in the mobile applications.
Research question identified
The research questions which can be identified from this paper are listed as below:
 Is cloudlet better than most of the cloud computing services?
 Which metrics of cloud based services are most useful to the end users of the mobile
applications?
 How cloud lets impact mobile services?
 Can the latency issue of the cloud based services have an impact on the mobile
applications?
Journal: impact of edge computing on mobile applications. In Proceedings of the 7th ACM
SIGOPS Asia-Pacific Workshop on Systems (p. 5). ACM.
Introduction
The notable determination of this scholar essay to highlight the impact of using cloud
based services on the mobile based applications. This scholarly essay will be critically assessing
the impact of cloud services from the point of view of Hu et al. (2016), the investigators of this
paper have introduced the concept of edge computing which are increasingly used in most of the
mobile devices all over the world. The investigators of the paper stated about the usability of
edge computing which are much helpful to store and compute internet resources. This paper also
have numerous categories and each of the categories are very much significant to cognize the
impact of edge computing in the mobile applications.
Research question identified
The research questions which can be identified from this paper are listed as below:
 Is cloudlet better than most of the cloud computing services?
 Which metrics of cloud based services are most useful to the end users of the mobile
applications?
 How cloud lets impact mobile services?
 Can the latency issue of the cloud based services have an impact on the mobile
applications?
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3IMPACT OF THE CLOUD ON MOBILE APPLICATIONS
This paper have stated the research questions in an organized manner, the paper also
helps to identify the security as well as the privacy issue of cloud computing which can have a
significant impact on the mobile applications. Thus. The research questions are very much
helpful for the readers of this document to understand the prime purpose of this journal.
Methodology described
The investigator of the paper took an experimental approach to describe the specifications
of the offload cloud and cloudlets. The complexities faced by the investigators of this paper
while doing the research was mentioned in this paper (Hu et al. 2016). Thus, it can be said that
this paper considered secondary data collection procedure as data were collected mostly from
other researchers.
The importance of mobile and cloud based environment was presented in the paper as
well. The benefits of offloading were presented in this paper in an organized manner as well. The
paper have stated the dynamic rationing is very much important to address the wireless network
bandwidth as well.
Covering of the pertinent existing research literature with research question
The discussion of the paper success successfully address the researcher questions which
were presented in the earlier sections of the paper. Brief explanation of each of the researcher
questions is described below.
This paper have stated the research questions in an organized manner, the paper also
helps to identify the security as well as the privacy issue of cloud computing which can have a
significant impact on the mobile applications. Thus. The research questions are very much
helpful for the readers of this document to understand the prime purpose of this journal.
Methodology described
The investigator of the paper took an experimental approach to describe the specifications
of the offload cloud and cloudlets. The complexities faced by the investigators of this paper
while doing the research was mentioned in this paper (Hu et al. 2016). Thus, it can be said that
this paper considered secondary data collection procedure as data were collected mostly from
other researchers.
The importance of mobile and cloud based environment was presented in the paper as
well. The benefits of offloading were presented in this paper in an organized manner as well. The
paper have stated the dynamic rationing is very much important to address the wireless network
bandwidth as well.
Covering of the pertinent existing research literature with research question
The discussion of the paper success successfully address the researcher questions which
were presented in the earlier sections of the paper. Brief explanation of each of the researcher
questions is described below.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4IMPACT OF THE CLOUD ON MOBILE APPLICATIONS
The prime advantages of the cloudlet is presented in this paper such as it its high
adaptability with most of the mobile devices. At the same time, it can also be said that the
combined effort from the cloud based services and the cloud lets.
Description of the cloud computing service matric was also presented in the paper in an
organized manner in terms of the quality of service, availability and reliability. Both the
definition as well as the value of the cloud properties was presented in the paper in an organized
manner.
This paper stated that cloud computing has maximum effect on the mobile devices, at the
same time the paper was very much important to comprehend the impact of cloudlets in the
interactive mobile cloud applications. According to the investigators of this paper the improve
growth of the mobile communication systems is mainly due to the flexibility as well as the
mobility of the cloud computing services. However, the investigator of the paper successfully
identified the limitation of the cloudlets also in terms of the delay in data transfer and
collaborative manner. The important of the security measures was stated in the paper as well
which can help in identifying the impact of cloudlets in mobile services.
According to the investigator of this paper stated that cloud service latency can have a
significant impact on the response of the cloud servers. The paper also identified the impact of
the cloud service latency as it can affect cloud service communications. Detailed description of
the cloud service communications was presented in the paper in an organized manner. The
concept of service latency as well as the datacentre legacy was also discussed in the paper. The
The prime advantages of the cloudlet is presented in this paper such as it its high
adaptability with most of the mobile devices. At the same time, it can also be said that the
combined effort from the cloud based services and the cloud lets.
Description of the cloud computing service matric was also presented in the paper in an
organized manner in terms of the quality of service, availability and reliability. Both the
definition as well as the value of the cloud properties was presented in the paper in an organized
manner.
This paper stated that cloud computing has maximum effect on the mobile devices, at the
same time the paper was very much important to comprehend the impact of cloudlets in the
interactive mobile cloud applications. According to the investigators of this paper the improve
growth of the mobile communication systems is mainly due to the flexibility as well as the
mobility of the cloud computing services. However, the investigator of the paper successfully
identified the limitation of the cloudlets also in terms of the delay in data transfer and
collaborative manner. The important of the security measures was stated in the paper as well
which can help in identifying the impact of cloudlets in mobile services.
According to the investigator of this paper stated that cloud service latency can have a
significant impact on the response of the cloud servers. The paper also identified the impact of
the cloud service latency as it can affect cloud service communications. Detailed description of
the cloud service communications was presented in the paper in an organized manner. The
concept of service latency as well as the datacentre legacy was also discussed in the paper. The

5IMPACT OF THE CLOUD ON MOBILE APPLICATIONS
investigators stated that usability of the cloud based services in the mobile applications depends
hugely on the cloud service latency.
The benefits of offloading is presented in the paper in an organized manner, the
investigators of the paper successfully identified the issue of edge computing as well such as the
followings:
 Can the latency issue of the cloud based services have an impact on applications?
 What are the benefits of offloading in cloud computing?
Based on the above discussion of the paper it can be said that the research done in the
paper cover up all the existing research literature as stated by the other investigators. Hosting
services, payment gateways, and development are the different parameters which can have a
direct impact on the cloud based services on the mobile applications. The investigator of the
paper mentioned the impact of the cloud services such as the management of the internet based
data, applications and most of the related services can be seen in the smart phones which are
used in our society. The investigator of the paper stated that the cloud based website applications
can be very much important to be managed so that the efficiency of the cloud based services is
maintained. The investigator of the paper stated that the reality of the customers of cloud
computing is considered highly by the management team of mobile applications.
investigators stated that usability of the cloud based services in the mobile applications depends
hugely on the cloud service latency.
The benefits of offloading is presented in the paper in an organized manner, the
investigators of the paper successfully identified the issue of edge computing as well such as the
followings:
 Can the latency issue of the cloud based services have an impact on applications?
 What are the benefits of offloading in cloud computing?
Based on the above discussion of the paper it can be said that the research done in the
paper cover up all the existing research literature as stated by the other investigators. Hosting
services, payment gateways, and development are the different parameters which can have a
direct impact on the cloud based services on the mobile applications. The investigator of the
paper mentioned the impact of the cloud services such as the management of the internet based
data, applications and most of the related services can be seen in the smart phones which are
used in our society. The investigator of the paper stated that the cloud based website applications
can be very much important to be managed so that the efficiency of the cloud based services is
maintained. The investigator of the paper stated that the reality of the customers of cloud
computing is considered highly by the management team of mobile applications.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6IMPACT OF THE CLOUD ON MOBILE APPLICATIONS
Agreement between philosophical framework, research question and
research methods
Most of the research queries which are mentioned in the paper was successfully
highlighted by the investigator of this paper. The philosophical framework which was used in
this paper is very much beneficial for the readers of this document, the philosophical framework
which was used in this paper considered the network load of pre-partitioned apps as well as the
network load of the comet apps. The chief specification of the framework used on this
organization is the network setup of the experiment which was performed in this project. The
framework can be very much important to link the applications of edge computing and
experimental setup. The different categories of configuration of edge computing was presented
in hierarchical form. The execution time of the comet apps and the response time of the pre-
partitioned application was mentioned in the paper as well. The philosophy of the paper is well
described in the conceptual framework of the paper. The overall discussion of the paper was
briefed using the conceptual framework as well. Numerous possibilities and opinions were
considered in this paper in an organized manner. The valuation of the edge computing was
described in this paper in hierarchal form. Scientific methods were used by the investigator of the
paper for the conceptual framework.
The data collection method which was used in this paper is very much aligned with the
research questions as well as with the conceptual framework. The philosophy as well as the
paradigm which was maintained by the investigator of this paper is supported by the secondary
data collection procedure of the paper. The degree of agreement between the conceptual
framework, research questions, and research method is very much on the higher side.
Agreement between philosophical framework, research question and
research methods
Most of the research queries which are mentioned in the paper was successfully
highlighted by the investigator of this paper. The philosophical framework which was used in
this paper is very much beneficial for the readers of this document, the philosophical framework
which was used in this paper considered the network load of pre-partitioned apps as well as the
network load of the comet apps. The chief specification of the framework used on this
organization is the network setup of the experiment which was performed in this project. The
framework can be very much important to link the applications of edge computing and
experimental setup. The different categories of configuration of edge computing was presented
in hierarchical form. The execution time of the comet apps and the response time of the pre-
partitioned application was mentioned in the paper as well. The philosophy of the paper is well
described in the conceptual framework of the paper. The overall discussion of the paper was
briefed using the conceptual framework as well. Numerous possibilities and opinions were
considered in this paper in an organized manner. The valuation of the edge computing was
described in this paper in hierarchal form. Scientific methods were used by the investigator of the
paper for the conceptual framework.
The data collection method which was used in this paper is very much aligned with the
research questions as well as with the conceptual framework. The philosophy as well as the
paradigm which was maintained by the investigator of this paper is supported by the secondary
data collection procedure of the paper. The degree of agreement between the conceptual
framework, research questions, and research method is very much on the higher side.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7IMPACT OF THE CLOUD ON MOBILE APPLICATIONS
Constructive critical analysis was presented in the paper as well in both the research questions as
well as the conceptual framework as well. Realism is maintained in each of the research
questions, conceptual framework and research methods. Each of the methods are very much
aligned with each other as well, hence the effectiveness of the paper is maintained throughout the
paper starting from the data collection procedure, research methods, and the conceptual
framework.
Identification of flaw and limitations
The investigator of paper was not very much biased in his discussions. Each of the
discussion of the paper is very much systematic in nature. The logical flow of the WiFi
offloading performance includes the cumulative distribution function. Three runs were
conducted in support of this discussion. The increased response time of due to the complexities
of edge computing was presented in the paper. The limitations of edge computing was presented
in the paper as well, such as the offloading performance of AWS. The effects of the interactivity
was also presented in the paper as well, without any flaw. The concept of radio link management
was presented on this paper in a detailed manner. The use of the DRX and the sleep duration was
also presented in this paper as well. The detailed discussion of the LTE loading performance can
be very much beneficial for the readers of this document due to its effectiveness. Since the
investigator of this paper have considered the opinion of the other researcher it can be said that
the paper is very much reliable. Each of the discussion made in this paper is severely critically
analysed which is the main advantage of the paper. One of the other significant advantage of this
paper is a detailed explanation of the experiment which was performed in the paper.
Constructive critical analysis was presented in the paper as well in both the research questions as
well as the conceptual framework as well. Realism is maintained in each of the research
questions, conceptual framework and research methods. Each of the methods are very much
aligned with each other as well, hence the effectiveness of the paper is maintained throughout the
paper starting from the data collection procedure, research methods, and the conceptual
framework.
Identification of flaw and limitations
The investigator of paper was not very much biased in his discussions. Each of the
discussion of the paper is very much systematic in nature. The logical flow of the WiFi
offloading performance includes the cumulative distribution function. Three runs were
conducted in support of this discussion. The increased response time of due to the complexities
of edge computing was presented in the paper. The limitations of edge computing was presented
in the paper as well, such as the offloading performance of AWS. The effects of the interactivity
was also presented in the paper as well, without any flaw. The concept of radio link management
was presented on this paper in a detailed manner. The use of the DRX and the sleep duration was
also presented in this paper as well. The detailed discussion of the LTE loading performance can
be very much beneficial for the readers of this document due to its effectiveness. Since the
investigator of this paper have considered the opinion of the other researcher it can be said that
the paper is very much reliable. Each of the discussion made in this paper is severely critically
analysed which is the main advantage of the paper. One of the other significant advantage of this
paper is a detailed explanation of the experiment which was performed in the paper.

8IMPACT OF THE CLOUD ON MOBILE APPLICATIONS
This paper also provides in-depth discussion of most of the advantages of the cloud let as
well cloud offload. Attributes of both cloud offload and cloud let offload was discussed in the
paper also. The entire logic of this paper is very much simple and argumentative. Broader
relevance was given in support of each of the discussions which are maintained in the paper.
Cyber foraging is the other essential feature of this paper which is readily not found in the other
similar cloud computing journals. Thus, it can be said that the discussions of this paper is very
much consistent, at the same time it can also be said that the discussion of this paper can be
successfully considered in the future cloud computing projects.
Ethical prospects of the paper
Most of the discussions of this paper along with the experimental setup considered the
opinion of secondary sources. All the researchers which works were considered in this paper
were given the acknowledgement and credentials they deserve in the end of the paper. At the
same time, it can also be said that the security and privacy of the data is maintained while this
paper was written and published. There are no changes of data leakage from this paper as the
data is protected according to the famous data protection act of 1998. If any of the data of paper
is leaked under any circumstance the also the data cannot be used for any other purposes. If
anyone want to use the data of this paper then that person have to take the consent of the
investigator of this paper.
Strict ethical guidelines was presented throughout the paper, it can also be said that the
authorization letter is a must to get permission to use the data of this paper. Data from secondary
This paper also provides in-depth discussion of most of the advantages of the cloud let as
well cloud offload. Attributes of both cloud offload and cloud let offload was discussed in the
paper also. The entire logic of this paper is very much simple and argumentative. Broader
relevance was given in support of each of the discussions which are maintained in the paper.
Cyber foraging is the other essential feature of this paper which is readily not found in the other
similar cloud computing journals. Thus, it can be said that the discussions of this paper is very
much consistent, at the same time it can also be said that the discussion of this paper can be
successfully considered in the future cloud computing projects.
Ethical prospects of the paper
Most of the discussions of this paper along with the experimental setup considered the
opinion of secondary sources. All the researchers which works were considered in this paper
were given the acknowledgement and credentials they deserve in the end of the paper. At the
same time, it can also be said that the security and privacy of the data is maintained while this
paper was written and published. There are no changes of data leakage from this paper as the
data is protected according to the famous data protection act of 1998. If any of the data of paper
is leaked under any circumstance the also the data cannot be used for any other purposes. If
anyone want to use the data of this paper then that person have to take the consent of the
investigator of this paper.
Strict ethical guidelines was presented throughout the paper, it can also be said that the
authorization letter is a must to get permission to use the data of this paper. Data from secondary
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9IMPACT OF THE CLOUD ON MOBILE APPLICATIONS
resources were taken in such a way so that there are no chances of plagiarism. The norms and
regulations of the data security and privacy are all application in this scenario.
Data collection and analysis appropriate
The secondary data collection procedure of this paper is very much justified as it helps in
the data was collected primarily from reliable secondary sources. Each of the works of the other
researcher is referenced in the concluding section of the paper in proper IEEE manner. The data
collection procedure of the paper is very much aligned with the time and energy consumption of
edge computing. The advantages of the pre-partitioned applications was presented in the paper in
an organized manner using the secondary data collection procedure.
The data collection process which was presented in this paper is the secondary data
collection procedure. The data which were considered in this paper is mainly non-numeric value,
thus qualitative data analysis procedure was considered for the analysis of the collect data.
Grounded theories were presented in this paper as well.
Research findings support by evidence
The experimental set up of this paper is very much reliable to support the findings of the
paper which states that the edge computing can be very much useful for the users of the mobile
devices as it can success improve the response time and the energy consumption.
Analysis of conclusion discussed
Based on the conclusion of the paper it can be said that the edge computing can be very
much beneficial to enhance the energy computations well as the response time of the mobile
resources were taken in such a way so that there are no chances of plagiarism. The norms and
regulations of the data security and privacy are all application in this scenario.
Data collection and analysis appropriate
The secondary data collection procedure of this paper is very much justified as it helps in
the data was collected primarily from reliable secondary sources. Each of the works of the other
researcher is referenced in the concluding section of the paper in proper IEEE manner. The data
collection procedure of the paper is very much aligned with the time and energy consumption of
edge computing. The advantages of the pre-partitioned applications was presented in the paper in
an organized manner using the secondary data collection procedure.
The data collection process which was presented in this paper is the secondary data
collection procedure. The data which were considered in this paper is mainly non-numeric value,
thus qualitative data analysis procedure was considered for the analysis of the collect data.
Grounded theories were presented in this paper as well.
Research findings support by evidence
The experimental set up of this paper is very much reliable to support the findings of the
paper which states that the edge computing can be very much useful for the users of the mobile
devices as it can success improve the response time and the energy consumption.
Analysis of conclusion discussed
Based on the conclusion of the paper it can be said that the edge computing can be very
much beneficial to enhance the energy computations well as the response time of the mobile
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10IMPACT OF THE CLOUD ON MOBILE APPLICATIONS
applications. However, the limitations of edge computing was not presented in the paper such as
the latency issues, compatibility issues, bandwidth issues, bandwidth cost issues, security issues,
and compliance bridge issues. The paper only stated about the benefits offered by edge
computing to the users of the mobile device.
Reflections on paper
According to me, edge computing can be very much useful for the users of mobile
applications to increase the network speed. I also believe that the latency issue of mobile
applications can be significantly addressed using edge computing.
I also believe that the data generated from degree computing is much safer than other cloud
computing platforms. I also believe that the availability of the data which are circulated between
numerous sources can be improved suing the edge computing. I think that the data breaching
event from the mobile applications can be also decreased using edge computing. The
categorization of the raw data and the structured data can also be quantified in an efficient
manner using edge computing.
Conclusion
The paper is very much useful for the readers to understand both the advantages as well
as the limitation of edge computing. The factors responsible to for the smooth functioning of the
pre partitioned applications can also be determined from the paper. The effectiveness and the
superiority of edge computing while offloading over LTE was presented in this paper as well.
applications. However, the limitations of edge computing was not presented in the paper such as
the latency issues, compatibility issues, bandwidth issues, bandwidth cost issues, security issues,
and compliance bridge issues. The paper only stated about the benefits offered by edge
computing to the users of the mobile device.
Reflections on paper
According to me, edge computing can be very much useful for the users of mobile
applications to increase the network speed. I also believe that the latency issue of mobile
applications can be significantly addressed using edge computing.
I also believe that the data generated from degree computing is much safer than other cloud
computing platforms. I also believe that the availability of the data which are circulated between
numerous sources can be improved suing the edge computing. I think that the data breaching
event from the mobile applications can be also decreased using edge computing. The
categorization of the raw data and the structured data can also be quantified in an efficient
manner using edge computing.
Conclusion
The paper is very much useful for the readers to understand both the advantages as well
as the limitation of edge computing. The factors responsible to for the smooth functioning of the
pre partitioned applications can also be determined from the paper. The effectiveness and the
superiority of edge computing while offloading over LTE was presented in this paper as well.

11IMPACT OF THE CLOUD ON MOBILE APPLICATIONS
Summary
The paper summarized the different factors which are responsible for improving the
performance of edge computing. The paper summarizes the different configurations of the
networking system such as Cloud LTE and Cloud Wi-Fi. The paper also summarizes the
conclusion of the experimental set up considering the Wi-Fi uploading performance, Wi-Fi
offloading and energy, effects of the interactivity and radio link management and the LTE
energy tradeoff.
Summary
The paper summarized the different factors which are responsible for improving the
performance of edge computing. The paper summarizes the different configurations of the
networking system such as Cloud LTE and Cloud Wi-Fi. The paper also summarizes the
conclusion of the experimental set up considering the Wi-Fi uploading performance, Wi-Fi
offloading and energy, effects of the interactivity and radio link management and the LTE
energy tradeoff.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

12IMPACT OF THE CLOUD ON MOBILE APPLICATIONS
Reference
Hu, W., Gao, Y., Ha, K., Wang, J., Amos, B., Chen, Z., Pillai, P. and Satyanarayanan, M., 2016,
August. Quantifying the impact of edge computing on mobile applications. In Proceedings of the
7th ACM SIGOPS Asia-Pacific Workshop on Systems (p. 5). ACM.
Reference
Hu, W., Gao, Y., Ha, K., Wang, J., Amos, B., Chen, Z., Pillai, P. and Satyanarayanan, M., 2016,
August. Quantifying the impact of edge computing on mobile applications. In Proceedings of the
7th ACM SIGOPS Asia-Pacific Workshop on Systems (p. 5). ACM.
1 out of 13
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.