SlideShare a Scribd company logo
Submitted by :
Gaurav das gupta
Ajay singh chauhan
Ankur xalxo
Submitted to:
Ar. Vibha uppadaya
INFRASTRUCTURE SECURITY
 Infrastructure security is the security provided to
protect infrastructure, especially critical
infrastructure, such as airports, highways, rail
transport, hospitals, bridges, etc. Infrastructure
security seeks to limit vulnerability of these structures
and systems to sabotage, terrorism,
and contamination.
Network Infrastructure Security
-LAN Security
-Client-Server Security
-Securing access to data or
application.
-Wireless Security Threats and
Risk Mitigation
-Internet Threats and Security
- Firewall Security Systems
Intrusion Detection Systems
(IDS)
An IDS works in conjunction
with routers and firewalls by
monitoring network usage
anomalies.
Network-based
IDSs
Host-based IDSs
AUTOMATION SOFTWARE
 Automation systems directly receive sensed information from
the peripheries. Usually this vendor-specific software runs on
a computer, where administrators can monitor the collected
information.
 Automation system software shows the input values of the
measurement and usually allows users to monitor the map of
the sensors.
 Unfortunately these systems rarely support exporting the
collected information, though it’s an essential condition to the
integration with CAIFI systems.
 Different automation systems can have different database
and/or file storage formats.
 Automation systems can be integrated with a chosen CAIFI
system, if they are connected with interfaces or if they know
each others’ database and file storage formats and their
locations.
 CAIFM systems usually can open/reach only Geographic
Information System (GIS) and ComputerAided Design (CAD)
files, though there are some limitations.
 Generally objects of CAIFM systems are stored in GIS or CAD-
based graphical files, while peripheral inputs are in other file
formats or in databases, but inputs of sensors that collect
spatial
information (e.g. GPS) are stored in databases, instead of files.
 Latest stored information of each stored sensor periphery
means the current state of the observed objects.
 If only changes are stored or sent, capacity needs in the
system can be significantly reduced, however sometimes
sensed information have to be sent, else any data errors in the
network, processing or storage can result false values in the
CAIFI system.

More Related Content

Viewers also liked

División Honor Juvenil 2015/2016
División Honor Juvenil 2015/2016División Honor Juvenil 2015/2016
División Honor Juvenil 2015/2016
mariodelasanta
 
Segunda regional grupo 2 1516
Segunda regional grupo 2 1516Segunda regional grupo 2 1516
Segunda regional grupo 2 1516
mariodelasanta
 
органи самоорганізації населення
органи самоорганізації населенняоргани самоорганізації населення
органи самоорганізації населення
IURII STALNYCHENKO
 
Stanford University Supports Mothers' Education in South Africa | The Chronic...
Stanford University Supports Mothers' Education in South Africa | The Chronic...Stanford University Supports Mothers' Education in South Africa | The Chronic...
Stanford University Supports Mothers' Education in South Africa | The Chronic...Stefano Montanari
 
Registro Oficial Ley de Alianza Público-Privada Ecuador
Registro Oficial Ley de Alianza Público-Privada EcuadorRegistro Oficial Ley de Alianza Público-Privada Ecuador
Registro Oficial Ley de Alianza Público-Privada Ecuador
Choco Medina
 
Kalin Karakehayov - PBN и изтекли домейни - Black Hat 2016
Kalin Karakehayov - PBN и изтекли домейни - Black Hat 2016Kalin Karakehayov - PBN и изтекли домейни - Black Hat 2016
Kalin Karakehayov - PBN и изтекли домейни - Black Hat 2016
Kalin Karakehayov
 
Wirth Music Academy
Wirth Music AcademyWirth Music Academy
Wirth Music Academy
Johann Weiss
 

Viewers also liked (7)

División Honor Juvenil 2015/2016
División Honor Juvenil 2015/2016División Honor Juvenil 2015/2016
División Honor Juvenil 2015/2016
 
Segunda regional grupo 2 1516
Segunda regional grupo 2 1516Segunda regional grupo 2 1516
Segunda regional grupo 2 1516
 
органи самоорганізації населення
органи самоорганізації населенняоргани самоорганізації населення
органи самоорганізації населення
 
Stanford University Supports Mothers' Education in South Africa | The Chronic...
Stanford University Supports Mothers' Education in South Africa | The Chronic...Stanford University Supports Mothers' Education in South Africa | The Chronic...
Stanford University Supports Mothers' Education in South Africa | The Chronic...
 
Registro Oficial Ley de Alianza Público-Privada Ecuador
Registro Oficial Ley de Alianza Público-Privada EcuadorRegistro Oficial Ley de Alianza Público-Privada Ecuador
Registro Oficial Ley de Alianza Público-Privada Ecuador
 
Kalin Karakehayov - PBN и изтекли домейни - Black Hat 2016
Kalin Karakehayov - PBN и изтекли домейни - Black Hat 2016Kalin Karakehayov - PBN и изтекли домейни - Black Hat 2016
Kalin Karakehayov - PBN и изтекли домейни - Black Hat 2016
 
Wirth Music Academy
Wirth Music AcademyWirth Music Academy
Wirth Music Academy
 

Similar to It infrastructure

Comparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scadaComparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scada
IJARIIT
 
Ids 015 architecture and implementation of ids
Ids 015 architecture and implementation of idsIds 015 architecture and implementation of ids
Ids 015 architecture and implementation of ids
jyoti_lakhani
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
Samiksha880257
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
ssuserec8a711
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMApoorv Pandey
 
Ig3514391443
Ig3514391443Ig3514391443
Ig3514391443
IJERA Editor
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
Amare Kassa
 
Embedded presentation
Embedded presentationEmbedded presentation
Embedded presentation
rohancool
 
Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control System
IOSR Journals
 
Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control System
IOSR Journals
 
MO3.L10 - NATIONAL POLAR-ORBITING OPERATIONAL ENVIRONMENTAL SATELLITE SYSTEM ...
MO3.L10 - NATIONAL POLAR-ORBITING OPERATIONAL ENVIRONMENTAL SATELLITE SYSTEM ...MO3.L10 - NATIONAL POLAR-ORBITING OPERATIONAL ENVIRONMENTAL SATELLITE SYSTEM ...
MO3.L10 - NATIONAL POLAR-ORBITING OPERATIONAL ENVIRONMENTAL SATELLITE SYSTEM ...grssieee
 
Monitoring and Securing a Geo-Dispersed Data Center at Hill AFB
Monitoring and Securing a Geo-Dispersed Data Center at Hill AFBMonitoring and Securing a Geo-Dispersed Data Center at Hill AFB
Monitoring and Securing a Geo-Dispersed Data Center at Hill AFB
Elasticsearch
 
Arctic MDA Brief - Jatin Bains, Channel Logistics
Arctic MDA Brief - Jatin Bains, Channel  LogisticsArctic MDA Brief - Jatin Bains, Channel  Logistics
Arctic MDA Brief - Jatin Bains, Channel Logistics
warrenedge
 
Grid Technologies in Disaster Management
Grid Technologies in Disaster Management Grid Technologies in Disaster Management
Grid Technologies in Disaster Management Videoguy
 
Embedded system notes
Embedded system notesEmbedded system notes
Embedded system notes
TARUN KUMAR
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
OECLIB Odisha Electronics Control Library
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
karlhennesey
 
Advance Technology
Advance TechnologyAdvance Technology
Advance Technology
Export Promotion Bureau
 
indra_isms_integrated.pdf
indra_isms_integrated.pdfindra_isms_integrated.pdf
indra_isms_integrated.pdf
Kumaran637735
 

Similar to It infrastructure (20)

Comparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scadaComparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scada
 
Ids 015 architecture and implementation of ids
Ids 015 architecture and implementation of idsIds 015 architecture and implementation of ids
Ids 015 architecture and implementation of ids
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
 
Ig3514391443
Ig3514391443Ig3514391443
Ig3514391443
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Embedded presentation
Embedded presentationEmbedded presentation
Embedded presentation
 
Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control System
 
Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control System
 
MO3.L10 - NATIONAL POLAR-ORBITING OPERATIONAL ENVIRONMENTAL SATELLITE SYSTEM ...
MO3.L10 - NATIONAL POLAR-ORBITING OPERATIONAL ENVIRONMENTAL SATELLITE SYSTEM ...MO3.L10 - NATIONAL POLAR-ORBITING OPERATIONAL ENVIRONMENTAL SATELLITE SYSTEM ...
MO3.L10 - NATIONAL POLAR-ORBITING OPERATIONAL ENVIRONMENTAL SATELLITE SYSTEM ...
 
Monitoring and Securing a Geo-Dispersed Data Center at Hill AFB
Monitoring and Securing a Geo-Dispersed Data Center at Hill AFBMonitoring and Securing a Geo-Dispersed Data Center at Hill AFB
Monitoring and Securing a Geo-Dispersed Data Center at Hill AFB
 
Arctic MDA Brief - Jatin Bains, Channel Logistics
Arctic MDA Brief - Jatin Bains, Channel  LogisticsArctic MDA Brief - Jatin Bains, Channel  Logistics
Arctic MDA Brief - Jatin Bains, Channel Logistics
 
Grid Technologies in Disaster Management
Grid Technologies in Disaster Management Grid Technologies in Disaster Management
Grid Technologies in Disaster Management
 
Embedded system notes
Embedded system notesEmbedded system notes
Embedded system notes
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Advance Technology
Advance TechnologyAdvance Technology
Advance Technology
 
indra_isms_integrated.pdf
indra_isms_integrated.pdfindra_isms_integrated.pdf
indra_isms_integrated.pdf
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 

Recently uploaded

一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
zvaywau
 
Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)
CristianMestre
 
A Brief Introduction About Hadj Ounis
A Brief  Introduction  About  Hadj OunisA Brief  Introduction  About  Hadj Ounis
A Brief Introduction About Hadj Ounis
Hadj Ounis
 
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
luforfor
 
Codes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new newCodes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new new
ZackSpencer3
 
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
taqyed
 
2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories
luforfor
 
Fed by curiosity and beauty - Remembering Myrsine Zorba
Fed by curiosity and beauty - Remembering Myrsine ZorbaFed by curiosity and beauty - Remembering Myrsine Zorba
Fed by curiosity and beauty - Remembering Myrsine Zorba
mariavlachoupt
 
Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)
SuryaKalyan3
 
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERSART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
Sandhya J.Nair
 
一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单
zvaywau
 
IrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptxIrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptx
Aine Greaney Ellrott
 
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
zeyhe
 
acting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaaacting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaa
angelicafronda7
 
Caffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire WilsonCaffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire Wilson
ClaireWilson398082
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
zeyhe
 
ashokathegreat project class 12 presentation
ashokathegreat project class 12 presentationashokathegreat project class 12 presentation
ashokathegreat project class 12 presentation
aditiyad2020
 
Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)
SuryaKalyan3
 
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
iraqartsandculture
 

Recently uploaded (19)

一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
 
Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)
 
A Brief Introduction About Hadj Ounis
A Brief  Introduction  About  Hadj OunisA Brief  Introduction  About  Hadj Ounis
A Brief Introduction About Hadj Ounis
 
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
 
Codes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new newCodes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new new
 
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
 
2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories
 
Fed by curiosity and beauty - Remembering Myrsine Zorba
Fed by curiosity and beauty - Remembering Myrsine ZorbaFed by curiosity and beauty - Remembering Myrsine Zorba
Fed by curiosity and beauty - Remembering Myrsine Zorba
 
Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)
 
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERSART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
 
一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单
 
IrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptxIrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptx
 
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
 
acting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaaacting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaa
 
Caffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire WilsonCaffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire Wilson
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
 
ashokathegreat project class 12 presentation
ashokathegreat project class 12 presentationashokathegreat project class 12 presentation
ashokathegreat project class 12 presentation
 
Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)
 
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
 

It infrastructure

  • 1. Submitted by : Gaurav das gupta Ajay singh chauhan Ankur xalxo Submitted to: Ar. Vibha uppadaya
  • 2. INFRASTRUCTURE SECURITY  Infrastructure security is the security provided to protect infrastructure, especially critical infrastructure, such as airports, highways, rail transport, hospitals, bridges, etc. Infrastructure security seeks to limit vulnerability of these structures and systems to sabotage, terrorism, and contamination.
  • 3.
  • 4. Network Infrastructure Security -LAN Security -Client-Server Security -Securing access to data or application. -Wireless Security Threats and Risk Mitigation -Internet Threats and Security - Firewall Security Systems Intrusion Detection Systems (IDS) An IDS works in conjunction with routers and firewalls by monitoring network usage anomalies. Network-based IDSs Host-based IDSs
  • 5. AUTOMATION SOFTWARE  Automation systems directly receive sensed information from the peripheries. Usually this vendor-specific software runs on a computer, where administrators can monitor the collected information.  Automation system software shows the input values of the measurement and usually allows users to monitor the map of the sensors.  Unfortunately these systems rarely support exporting the collected information, though it’s an essential condition to the integration with CAIFI systems.
  • 6.
  • 7.  Different automation systems can have different database and/or file storage formats.  Automation systems can be integrated with a chosen CAIFI system, if they are connected with interfaces or if they know each others’ database and file storage formats and their locations.  CAIFM systems usually can open/reach only Geographic Information System (GIS) and ComputerAided Design (CAD) files, though there are some limitations.
  • 8.  Generally objects of CAIFM systems are stored in GIS or CAD- based graphical files, while peripheral inputs are in other file formats or in databases, but inputs of sensors that collect spatial information (e.g. GPS) are stored in databases, instead of files.  Latest stored information of each stored sensor periphery means the current state of the observed objects.  If only changes are stored or sent, capacity needs in the system can be significantly reduced, however sometimes sensed information have to be sent, else any data errors in the network, processing or storage can result false values in the CAIFI system.