Professional Documents
Culture Documents
IT Ifrastructure Sri Lasya Priya 4216903
IT Ifrastructure Sri Lasya Priya 4216903
IT Ifrastructure Sri Lasya Priya 4216903
Design
Sri Lasya Priya Annambhatla
4216903
Introduction to IT
infrastructure
END USER
APPLICATIONS
Email & Web
servers
• Email: An email system would be
implemented for communication between
employees and with customers. This would
enable employees to communicate with
each other, and customers to contact the
restaurant with any questions or concerns.
• Web servers: The restaurant's website and
online ordering system would be hosted on
web servers, which would be accessible
through the internet. Customers could place
orders online and access information about
the restaurant and its menu.
• Internet access: Employees
would be able to access
Internet &
information and resources online
since the restaurant has internet
connection
application
scheduling are created.
Employees would access these
programs via desktop computers
or mobile devices, which would
operate on servers.
Storage Devices
Storage Device
• NAS is an acronym that stands for "Network Attached
Storage." It refers to a network-connected storage device that
allows file-level data access to numerous clients through a
network. NAS devices are generally stand-alone systems that
have one or more hard drives, an Ethernet interface, and an
operating system that controls file access and storage.
• NAS device is used to store and exchange information,
media. They provide several advantages, including a simple
setup and maintenance, high data availability and
dependability, and the ability to view files from many
devices and places. Furthermore, NAS devices provides
additional capabilities such as remote access, encryption, and
backup services.
• A NAS device will be installed to store and share files and
data among the restaurant's devices. This would give a
consolidated location for key data including customer
information, purchase history, and personnel records.
Security
component
Firewall
• A firewall is a network security device that monitors
and regulates incoming and outgoing network
traffic based on security rules that have been
predefined. Its major role is to build a barrier
between a trusted, secure internal network and
another network that is neither secure nor
trustworthy, such as the internet. Firewalls function
by evaluating data packets that flow through them
and comparing them to the security rules that the
network administrator has put up. If a packet fits the
rules' requirements, it is permitted to travel past the
firewall and arrive at its destination. If it does not fit
the standards, it is rejected.
• A firewall will be implemented to prevent unwanted
access and threats to the network. The firewall will
monitor and manage incoming and outgoing
network traffic, preventing y suspicious or
malicious activities.
Conclusion
• The IT infrastructure design for Speed Eats involves the implementation of various components
to ensure efficient communication, data storage, and security. The LAN and WAN networks,
cabling, WIFI access points, client and server devices, capabilities such as email and web servers,
storage devices such as NAS along with a deployed firewall for its security