This module goes through two types of perforating strategies cluster perforating and limitedentry perforating