Benefits of Wireless Data Services and Wireless Technologies

Exploring the Impact of Wireless Technologies in Smart Commercial Frameworks

by Anitha Eemani*,

- Published in International Journal of Physical Education & Sports Sciences, E-ISSN: 2231-3745

Volume 14, Issue No. 1, Jan 2019, Pages 151 - 157 (7)

Published by: Ignited Minds Journals


ABSTRACT

Smart Commercial framework might certainly not exist without wireless communication. Mobile access to the framework by individuals, tools, and picking up units guides the requirement for broadcast hookups. Also for repaired embedded sensing devices, installing wire to link the picking up devices to the world wide web is typically a lot also expensive in contrast, wireless connection lessens the capital spending of sensor implementation. Property surveillance, a large market in IoT, asks for a wireless connection in between the resources as well as the item being tracked. We head to the starting point of a transformation in just how our company cope with innovation, coming from a confluence of artificial intelligence (ML), the Internet-of- ThingsIoT), and robotics. A great building screens and likewise refines a significant amount of information accumulated originating from a rich as well as large-circulation of various sensors (e.g., the IoT), along with from internet requests like social networking sites sites.

KEYWORD

wireless data services, wireless technologies, smart commercial framework, mobile access, broadcast connections, fixed embedded sensing devices, wireless connection, capital spending, sensor implementation, property surveillance, IoT, artificial intelligence, Internet of Things, robotics, building monitoring, data collection, sensor networks, social networking sites

I. INTRODUCTION

Straight, using artificial intelligence, patterns as well as connections in the relevant information over the region, option, and likewise request may be identified as well as forecasts may be produced; based on these, sources can be handled, selections may be actually made, and also gizmos may be turned on to maximize metrics, like cost, well-being, security, as well as ease. This paper briefly covers the constructions and needs in enhanced wireless technologies. The escalate of practical mobile devices, along with their higher versatility, convenience, as well as likewise computational potential, has necessitated wireless wideband connect with everywhere security. In 5G, the very much higher files prices each location will be delivered in big part using rich releases of a few issues, which may be connected to a Baseband Hosting Web Server (BBS) utilizing an arrowhead wireless web link, to reduce the expenditure of application. Therefore, a cellphone or sensing device indicator could traverse 2 wireless dives just before striking fibre optics. Setting up wireless technologies are moulding potential possibilities in brilliant transport, which is the most significant functionality of IoT in urban regions. Independent and likewise connected autos and additionally the management of internet site visitor traffic flow to name a few IoT treatments are going to cause far much better monetary truly worth, security, functionality, security and likewise toughness. For instance, far much better tracking and additionally management of mass transit made it achievable for through a potential wireless office framework has the prospective to lessen the about 70% of "stream time" visitors create straight into their taking a trip times, inducing economic cost savings of $60 billion annually. Real-time information, core traffic light devices, integration of passerby as well as bike framework, brilliant metering for auto parking and additionally energies, travelling time cost savings, lowered gas consumption, reallocation of property makes use of, developed autos and also truck sharing, control of water, drainpipe along with electrical power and also minimized transportation physical body failures are one of a few of the conveniences of assets in wireless present-day innovation.

II. ADVANCED WIRELESS TECHNOLOGIES NEEDS

Regardless of the premium in today times' wireless networks, there keep incredibly hard difficulties to meet the needs of the cultivating wise centres, particularly in relations to the volume, information transactions, in addition to diversification of hookups, security, latency, help for low-energy devices, privacy, security, support for some action of free social gain access to, as well as strength. exceeded a lot of people on Earth (6.7 B) in 2008, along with is expected to be concerning 50B . These devices are mosting likely to develop a terrific amount of reports that far surpasses the ability of our existing network. As an example, one driverless automobile will create worrying one gigabyte every second of all. The U.S.A. Smart Platform is supposed to source regarding thousand petabytes annually, which is 5 times what AT&T's whole network composed 2010. Sizing cellular phone details volume through 1000X: Worldwide smartphone files site web traffic increased 63% in 2016 and also is anticipated to account for 66% of internet visitor traffic. The details cost needs to have every system is expected to boost through a variable of one hundred, owing to occurring functions including HD video clip streaming, virtual reality, as well as 3D online video games. Many brand-new heavens user interface technologies, such as millimetre wave (mmWave), substantial MIMO, as well as a likewise little bit of mobile phone densification, are being created to assist the awaited 1000X enhanced cellular phone files heaps. While these technologies make use of considerably greater information expenses in fixed situations, they are not as long-lasting to activity as found microwave (e.g., smartphone and also WiFi) networks. As an example, small mobiles trigger additional frequent handovers, along with the mmWave places, will certainly be actually even more conscious terminal action and also the obstacle of the line-of- attraction through points in the network. An existing technology that was organized to size mobile information amount, the Cloud Program Obtain Gain Access To Network (CRAN), accomplishes in cloud relevant information centres the indicator handling functions that were typically done in base stations. CRANs use extreme restorations in working expenditure as well as power performance as the indication managing facility band bodies (BBUs) in the information centre might be preferably and also dynamically reapportioned to process the information from the low-complexity remote broadcast scalps (RRHs) as web visitor traffic loads function routine spatially at some point. Additionally, the signals arising from numerous RRHs might be mutually fine-tuned in the information centre to acquire high creepy efficiency from spread MIMO handling. Having said that, the mobile phone fronthaul network, which connects the wireless side to the CRAN details centre, has been disclosed to become inadequate about details capacity and additionally latency as well as is certainly not monetarily feasible for a chauffeur unless the driver presently possesses the thread. Protecting the security as well as additionally privacy: As additional tools are linked to every different other and the net, our wireless facilities must be secured arising from cyberattacks, including brand new risks on (and additionally from) IoT tools. The spreading of IoT also raises remarkable personal privacy barriers, array of business for a dizzying selection of goals, making it complicated to apply existing security along with private procedures produced desktop computer and even cellular phone devices. Integrated open door selection: The styles in free WiFi accessibility tell our firm that a brand-new mixed wireless facility must preserve some quantity of open door. While the free nearby Wi-fi networks of the mid- 2000s were also expensive and likewise were folded after a handful of years, the range of firms that make use of free Wi-fi has increased. A 2014 analysis study discovered that business that supplied free Wi-Fi attracted additional consumers, in addition to those customers, dedicated additional possibility and also even more funds on the centres. In 2013, far more than 90% of the most extensive 150 UNITED STATE flight terminals made use of at no cost WiFi, and those that performed undoubtedly not experienced an extremely affordable negative aspect. Satisfying the necessities of the location: Developing a brand-new wireless commercial framework that completely satisfies the requirements of areas is very complicated as well as additionally needs a sight past what the wireless industry alone may supply. Extra collaborations with urban regions as well as likewise municipal affiliations are required to set up all-new modern technology that is going to possess the considered advantages instead of producing brand new problems. It is incredibly quick and easy for engineers, developers, as well as likewise experts to dream up advanced "answers," however significantly harder for these specialists to partner with local authorizations and organizations, featuring law enforcement, public housing, transport, schools, the federal government, in addition to altruistic companies, to find alternatives that are visiting raise the human condition, like broadening receive access to in non-urban as well as lower profit locations as well as a result decreasing the "Digital Distinct." To conclude, our experts require wireless locations that are global (all-around a huge as well as likewise numerous nation), performant, relied on upon, durable and also protected (deserving of society's rely on), energy-efficient, and also inexpensive, to identify intelligent properties that can easily support the outright most enhanced 21st-century neighbourhood.

III. BENEFITS OF WIRELESS

Wireless broadband offers Web accessibility to mobile phones together with allowing network vehicle drivers to stretch their systems past the stable of their wired partnerships. For our factors, a walkie-talkie is one of the most sensible methods to wireless broadband, however other procedures (like infrared lighting or maybe evident signalling) are additionally feasible. Attaching your pc to the Internet (and even a nearby network) through broadcast supplies many

making use of a wired link. Initially, wireless offers valuable get to for portable personal computers; it is surely not important to find a wire or even network data electric outlet. As well as second, it makes it feasible for an individual to make a connection from much more than one website and also to preserve a web link as the consumer relocates coming from location to location. For network managers, a wireless web link makes it feasible to spread ease of access to a network without the need to string cords and even reduce spaces with wall surface designs. Online, get accessibility to without wires suggests that the operator of a laptop computer or perhaps several other portables pcs may wander right into a classroom, a cafe, or perhaps a collection and also connect to the Net using only activating the computer device and also functioning a communication planning. Depending upon the sort of wireless network you are utilizing, you may similarly have the ability to sustain the same connection in a transferring auto. When you are placing your network, it's regularly much less complicated to utilize Wi-Fi hyperlinks to prolong your network as well as likewise your Web connection to a variety of other spaces because a wired body needs to have a bodily path for the wires in between the network router or perhaps modify as well as likewise each home computer. Unless you may choose those cable televisions with a deceiving rooftop or even a few another existing network, this usually indicates that you must lessen holes in your wall structure buildings for records slots and additionally supply cords inside the wall surface surfaces and under the floorings. A radio indicator that experiences those same wall designs is frequently a large amount neater in addition to less intricate.

IV. WIRELESS DATA SERVICES

Given that broadcast indications relocate along with the air, you may easily craft a network link from any sort of spot within an assortment of the network base station's transmitter; it is not essential to take advantage of a telephone product, television cable tv, or perhaps a handful of various other specialized integrated circuits to link your personal computer to the network. Simply turn on the broadcast attached to the computer and also it is going to find the network indicator. There- fore, a show (or maybe wireless) network hookup is frequently a lot more convenient than a wired one. This is certainly not to declare that wireless is constantly the very best choice. A wired network is usually a lot more risk-free and also safe than a wireless gadget because it is actually a great deal harder for unapproved eavesdroppers and also a variety of other snoops to watch on records as it wired web link does not require as lots of stylish contracts between the email sender as well as an additional receiver on procedures etc. In a setting where your computer system never moves off of your work desk and there are no bodily obstacles in between the personal computer unit as well as the network obtain accessibility to the aspect, it is commonly easier to mount an info cable television in between the home computer in addition to a cable box. For that reason presently we have a lot of program transmitters as well as receivers that all operate the very same frequencies plus all utilize the very same form of inflexion. (Modulation is the technique a radio utilizes to integrate some kind of web information, like voice or even electronic records, to electromagnetic radiation.) The adhering to activity is to send some network information via those radios. Numerous various wireless information bodies and additionally solutions perform phone call to hook up laptops as well as other gadgets to neighboring networks as well as the Web, containing Wi-Fi, WiMAX, and also a handful of services based upon the most around date creations of cell cellular phone contemporary technology.

Wi-Fi

The IEEE (Guideline of Electric and additionally Electronics Engineers) has produced a collection of specifications as well as requirements for wireless networks under the headline IEEE 802.11 that explain the types and also concepts of the fairly short-range indicators that provide Wi-Fi answer. The initial 802.11 specs (without letter due to the point) was released in 1997. It takes care of various sorts of wireless media: 2 sort of broadcast transmissions as well as networks that use infrared lighting fixtures. The 802.11 b fundamental offers additional specs for wireless Ethernet networks. An associated file, IEEE 802.11 a, specifies wireless networks that work at greater prices on different super high frequency. Still, other 802.11 radio media criteria together with other letters are similarly readily accessible or coming close to public launch. The 802.11 n specification is the following one in the pipe, in addition to when it is released, it will certainly swap each 802.11 b and 802.11 g considering that it is much faster, a lot more secure and secure, and also much more trusted. The much older specifications will certainly still operate, thus new Wi-Fi resources are visiting assist all 3 (generally together with 802.11 a, which makes use of various super high frequency) as well as likewise instantly match your network user interface to the indicators it spots apiece base station. There are 2 additional titles in the alphabet soup of wireless LAN specifications that you should learn of wireless Ethernet tools. Their paired objectives are actually to analyze as well as accredit that the wireless network tools from each one of their participant carriers might run entirely in the identical network and also to market 802.11 systems as the worldwide criterion for wireless LANs. WECA's advertising geniuses have welcomed the much more helpful label of Wi-Fi (brief for wireless accuracy) for the 802.11 specs. One or two times annually, the Wi-Fi Collaboration conducts an "interoperability bake-off" where programmers coming from bunches of hardware creators confirm that their tools will certainly interact properly with gadgets coming from various other suppliers. Network units that lug a Wi-Fi company logo design have been accredited due to the Wi-Fi Alliance to fulfill the appropriate demands as well as also to pass interoperability examinations. Wi-Fi was targeted to come to be a wireless extension of a wired LAN, so the spans between Wi-Fi base stations and the pcs that correspond using each one of all of them are restricted to about one hundred feet (35 gauges) inside your home or perhaps around 300 feet (one hundred meters) outdoors, meaning there are no obstructions in between the acquire access to variable and the desktop computer. When 802.11 n equipment appears, it will certainly maintain links in between personal computers and additionally base stations at least as much a part as the much older Wi-Fi models. There are techniques to stretch the collection of a Wi-Fi sign, yet those techniques demand exclusive tools as well as watchful installment.

V. ARCHITECTURES

In wireless networks, there are 2 methods for setting up a wireless layout, and likewise locations [1-2] In Impromptu method, devices deliver straight peer-to-peer while on in framework setting, units correspond through an access factor that works as a hyperlink to other networks. The specifications in absolute best use today are 802.11 a, 802.11 b, in addition to 802.11 g. They are the de facto specs taken advantage of through nearly every wireless Ethernet LAN that you are probably to experience in workplaces and also social areas and also in the majority of property systems. It sets you back the problem to check out on the development of those other needs, but also for the min, 802.11 an and also 802.11 g are the ones to make use of for short-range wireless networks, particularly if you're trusting to attach to networks where you don't handle all the components by yourself. resources in the wireless network are straight referring to one another in peer to peer interaction approach (point-to-point). The network possesses no design or fixed elements. No accessibility component is demanded interaction in between devices. The approach is very most satisfied for a little bit of team of units and all of these resources should exist near each other. The efficiency of the network goes through while the quantity of gadgets grows. Obstructions of the approximate unit may occur regularly and also additionally, the Impromptu setting might be a tough job for the network supervisor to deal with the network. The model has another constraint is actually that method networks cannot hook up to wired local area network as well as also may certainly not access the web if without the installment of unique portals. Nonetheless, ad hoc mode operates fine in a little setting and likewise provides the most effective as well as also the least costly means to set up a wireless network.

A. Structure setting

The various other design in a wireless network is a structured method. All devices are linked to wireless connect with the help of getting access to the aspect (AP). Wireless receive access to areas is typically modems or modifications which change airwave documents into wired Ethernet information, operating as a link between the wired LAN and also wireless customers. Attaching multiple get access to components using a wired Ethernet groundwork can a lot better extend the wireless network insurance protection. As a mobile phone moves out of the series of one get access to the element, it moves straight into the selection of an added. Because of this, wireless clients may simply stray coming from one get to the variable domain to yet another and also still sustain soft network connection. The facilities set provides improved security, ease of management, and also a great deal more scalability and additionally stability. Nonetheless, the center‘s method accumulates incorporated expense in establishing gain access to facets like routers or adjustments.

B. Extended Remedy Specify Identifier.

The Extended Service Specify Identification is actually among 2 types of Business Prepare I.d. In an Ad hoc wireless network with no obtaining accessibility to elements, the Basic Provider Establish Acknowledgment is used. In a business facilities wireless network that includes getting to a component, the ESSID is made use of, yet may still be related to as SSID.

There exist a wide array of attacks-- from passive to energetic- on wireless LANs, and also are concentrated on the discretion along with integrity of particular, as well as additionally network accessibility. A variety of the attacks are less likely or perhaps so much more hazardous than others, and some are extra usual than others. This paper briefly gone over regarding the designs and also needs in innovative wireless technologies.

REFERENCES

1. D. Molta (2008). ‗802.11r: Wireless LAN Fast Roaming‘ The Promise of Secure Wi-Fi Mobility, Network Computing, April 2007, retrieved. 2. D. Stanley (2008). ‗Standards Corner: IEEE 802.11m - 802.11 Standard Maintenance‘, The Edge, June 2007, retrieved. 3. D. Halasz (2008). ‗IEEE 802.11i and wireless security‘, Embedded.com, August, 2004, retrieved. 4. C. Jyh-Cheng, J. Ming-Chia, & L. Yi-wen (2005). ‗Wireless LAN security and IEEE 802.11i‘ Wireless Communications, IEEE, Vol. 12, Issue 1, pp. 27 – 36. 5. IEEE 802.11i: WLAN Security Standards, Javvin Network Management & Security, retrieved 01 July 2008, < http://www.javvin.com/protocol80211i.html> 6. Sugandhi Maheshwaram (2016). ―A Comprehensive Review on the Implementation of Big Data Solutions‖, International Journal of Information Technology and Management Vol. XI, Issue No. XVII. 7. Sugandhi Maheshwaram (2018). ―A Novel Technique for Preventing the SQL Injection Vulnerabilities‖, International Journal of Research and Applications, Volume 5, Issue 19. 8. Sugandhi Maheshwaram (2018). ―A Study on Security Information and Event Management (SIEM)‖, International Journal of Research and Applications, Volume 5, Issue 17. 9. Sugandhi Maheshwaram (2018). ―Architectural Framework of Cloud Computing Environment‖, International Journal of Scientific Research in Science, Engineering and Technology, Volume 4, Issue 1. Overview of Open Research Issues in Big Data Analytics‖, Journal of Advances in Science and Technology, Vol. 14, Issue No. 2. 11. Sugandhi Maheshwaram (2018). ―A Study on Vulnerabilities, Applications, Advantages and Routing Protocols in MANET‖, International Journal of Scientific Research in Science and Technology, Volume 4, Issue 1. 12. Sudheer Kumar Shriramoju (2015). "Access Control and Density Based Notion of Clusters", International Journal of Scientific Research in Science and Technology (IJSRST), Online ISSN: 2395-602X, Print ISSN: 2395-6011, Volume 1 Issue 3, pp. 215-220. 13. Sudheer Kumar Shriramoju (2018). ―Review on NoSQL Databases and Key Advantages of Sharepoint‖, International Journal of Innovative Research in Science, Engineering and Technology, ISSN (Online): 2319-8753, ISSN (Print): 2347-6710, Vol. 7, Issue 11. 14. Sudheer Kumar Shriramoju (2017). ―Capabilities and Impact of SharePoint on Business‖, International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN: 2456-3307, Volume 2, Issue 6. 15. Sudheer Kumar Shriramoju (2016). ―Security Level Access Error Leading to Inference and Mining Sequential Patterns‖, International Journal of Scientific Research in Science, Engineering and Technology, Volume 2, Issue 4. 16. Sudheer Kumar Shriramoju (2014). ―An Overview on Database Vulnerability and Mining Changes from Data Streams‖, International Journal of Information Technology and Management, Vol. VII, Issue No. IX. 17. Sudheer Kumar Shriramoju (2012). ―Integrating Information from Heterogeneous Data Sources and Row Level Security‖, Journal of Advances and Scholarly Researches in Allied Education, Vol. IV, Issue No. VIII. 18. Sudheer Kumar Shriramoju (2013). ―A Review on Database Security and Advantages of Database Management System‖, Journal of Advances in Science and Technology, Vol. V, Issue No. X. 19. Sudheer Kumar Shriramoju (2018). ―Security Challenges of Service and Deployment 20. Sudheer Kumar Shriramoju (2018). ―Cloud security - A current scenario and characteristics of cloud computing‖, International Journal of Research and Applications, Volume 5, Issue 18. 21. Sudheer Kumar Shriramoju (2017). ―SECURITY ISSUES, THREATS AND CORE CONCEPTS OF CLOUD COMPUTING‖, Airo International Research Journal, Volume IX. 22. Malyadri K. (2014). ―An Overview towards the Different Types of Security Attacks", International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 8. 23. Malyadri K. (2013). ―Security Threats, Security Vulnerabilities and Advance Network Security Policies‖, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 2, Issue 9. 24. Malyadri K. (2016). ―Need for Key Management in Cloud and Comparison of Various Encryption Algorithm‖, International Journal of Scientific Research in Computer Science, Engineering and Information Technology , volume 1, issue 1. 25. Malyadri K. (2018). ―Integration of Appropriate Analytic tools towards Mobile Technology Development‖, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 6, Issue 6. 26. Malyadri K. (2017). ―A STUDY ON EXPERIENCES ANDLIMITATIONS OF MOBILE COMMUNICATION‖, Alochana Chakra Journal, Volume VI, Issue VIII. 27. Malyadri K. (2018). ―CHALLENGES CONCERNING MOBILEDEVELOPMENT AND MODEL-DRIVEN DEVELOPMENT OF MOBILE APPS‖, Airo International Research Journal, volume XVI. 28. Malyadri, N. Surya Teja (2018). ―Related technologies and the role of mobile app development life cycle‖, International Journal of Research and Applications, Volume 5, Issue 17. 29. Bhagya Rekha Kalukurthi (2018). ―A Comprehensive Review on Challenges and Types of Big Data‖, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 7, Issue 1. Research in Electrical, Electronics and Instrumentation Engineering, Vol. 5, Issue 6. 31. Rakesh Rojanala (2016). ―Components of Data Mining and Big Data Analytics in Intra-Data Center Networks‖, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 5, Issue 7. 32. Rakesh Rojanala (2017). ―An Overview of Intrusion Detection System and the Role of Data Mining in Information‖, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 6, Issue 3. 33. Rakesh Rojanala (2017). ―Machine Learning: Intersection of Statistics and Computer Science‖, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue 8. 34. Malyadri K. (2015). ―A Review on Radio Transmission Technology and Principles of Wireless Networking‖, International Journal of Scientific Research in Science and Technology, Volume 1, Issue 3. 35. BhagyaRekha Kalukurthi (2017). ―Data Mining Strategy for Discovering Intriguing Patterns and Challenges with Bigdata for Global Pulse Development‖, International Journal of Scientific Research in Science and Technology, Volume 3, Issue 3. 36. Yeshwanth Valaboju (2017). ―A Review on The Database Security Requirements and Guidelines‖, International Journal of Scientific Research in Science and Technology, Volume 3, Issue 6. 37. Rakesh Rojanala (2014). ―Cloud Computing Characteristics and Deployment of Big Data Analytics in The Cloud‖, International Journal of Scientific Research in Science and Technology, Volume VIII, Issue II. 38. BhagyaRekha Kalukurthi (2017). ―Big Data Classification and Methods of Data Mining, Big Data‖, International Journal of Scientific Research in Science, Engineering and Technology, Volume 3, Issue 5. 39. Yeshwanth Valaboju (2017). ―IOT Communication Technologies and Future of Internet of Things‖, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume 2, Issue 6.

The Big Data Characteristics‖, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume 1, Issue 1. 41. Bhagya Rekha Kalukurthi (2014). ―Security Vulnerabilities, Security Threats, and Advance Network Security Policies‖, Journal of Interdisciplinary Cycle Research, Volume VI, Issue I. 42. Bhagya Rekha Kalukurthi (2015). ―IMPLEMENTATION OF BIG DATA ANALYTICS AND BIG DATAGOVERNANCE‖, The International journal of analytical and experimental modal analysis, Volume VII, Issue I, May 2015 43. Rakesh Rojanala (2013). ―CLOUD COMPUTING ARCHITECTURAL FRAMEWORK‖, Journal of Interdisciplinary Cycle Research, Volume V, Issue I. 44. Rakesh Rojanala (2012). ―AN OVERVIEW ON CLOUD COMPUTING MODELS AND CLOUD DELIVERY MODELS‖, The International journal of analytical and experimental modal analysis, Volume IV, Issue I. 45. Rakesh Rojanala (2015). ―A COMPREHENSIVE STUDY ON THECHALLENGES OF STREAM DATA MINING AND BIG DATA-ORIENTED STREAM DATAMINING‖, The International journal of analytical and experimental modal analysis, Volume VII, Issue II. 46. Yeshwanth Valaboju (2015). ―A LITERATURE REVIEW ON NEURAL NETWORKARCHITECTURES‖, Journal of Interdisciplinary Cycle Research, Volume VII, Issue II. 47. Yeshwanth Valaboju (2018). ―AN OVERVIEW ON THE TYPES OF PASSWORD AND DOS ATTACKS‖, Journal of Interdisciplinary Cycle Research, Volume IX, Issue XI. 48. Yeshwanth Valaboju (2018). ―AN OVERVIEW ON SAP FIORI DESIGN PRINCIPLES AND FIORI ARCHITECTURE FOR ANALYTICAL APPLICATIONS‖, The International journal of analytical and experimental modal analysis, Volume X, Issue IX.

Corresponding Author Anitha Eemani* Sr. Java Full Stack Developer, National Association of Insurance Commissioners (NAIC), USA