sales@darwinita.co.za
Home IT Services  Data Recovery Networking Cloud Computing IT System Security IT Managed Services

A well-designed computer network will help minimize computer and network problems that can negatively impact productivity.

Like a tuned-up engine, all components of your network must work optimally and together. Servers, desktop workstations, cables, switches, routers, etc.,


we have the knowledge and expertise to build your IT network with the right parts.

We make sure your systems are proficient enough to accomplish your tasks, without being more than you need by designing a system that is scalable enough to grow with your business.


File and Print Servers. It’s important that your employees have access to the data they need when they need it.

With our server installation and support services we organize file sharing and printer usage so that your business operations run smoothly.

WAN and VPN. Wide Area Networks and Virtual Private Networks are important for today’s global and remote business environments.

We help ensure your employees can access their work files conveniently and securely. Cabling. Our cabling services help you avoid cable clutter, building code violations and fire hazards.


It’s likely the largest and most complicated portion of a network server installation, but our technicians make sure even the relatively invisible footprint of your cabling is properly installed and diligently organized.


They are trained to neatly install, store and label cables so they can be easily identified should a problem arise.

Different Types of Computer Networks

There are various types of Computer Networking options available. The classification of network in computers can be done according to their size as well as their purpose.

The size of a network should be expressed by the geographic area and number of computers, which are a part of their networks. It includes devices housed in a single room to millions of devices spread across the world. Following are the popular types of Computer Network:


PAN (Personal Area Network)

PAN (Personal Area Network) is a computer network formed around a person.

Benefits of PAN network
Drawbacks of using PAN network
LAN (Local Area Network)

A Local Area Network (LAN) is a group of computer and peripheral devices which are connected in a limited area such as school, laboratory, home, and office building. It is a widely useful network for sharing resources like files, printers, games, and other application. The simplest type of LAN network is to connect computers and a printer in someone’s home or office. In general, LAN will be used as one type of transmission medium. It is a network which consists of less than 5000 interconnected devices across several buildings.

Important characteristics of a LAN network:

Advantages of LAN


Disadvantages of LAN
WAN (Wide Area Network)

WAN (Wide Area Network) is another important computer network that which is spread across a large geographical area. WAN network system could be a connection of a LAN which connects with other LAN’s using telephone lines and radio waves. It is mostly limited to an enterprise or an organization.

Characteristics of WAN:


Advantages of WAN
Disadvantages of WAN
MAN (Metropolitan Area Network)

A Metropolitan Area Network or MAN is consisting of a computer network across an entire city, college campus, or a small region. This type of network is large than a LAN, which is mostly limited to a single building or site. Depending upon the type of configuration, this type of network allows you to cover an area from several miles to tens of miles.

Important characteristics of the MAN network:

Advantages of MAN
Disadvantages of MAN
Virtual Private Network

A virtual private network is a computer network that gives online privacy to a user by creating an encrypted connection from a device to a network. It uses tunneling protocols to encrypt sensitive data from a sender, transmit it, and then decrypt it at the receiver’s end.

Because the user’s Internet protocol (IP) address is masked and untraceable during this process, it provides a high level of privacy. The most common use of VPN technology is keeping all online recreational activities of an individual untraceable, even when accessed on a private Wi-Fi network.

When used for businesses, a VPN only allows authorized personnel to access data of the organization through the Internet. With the help of a VPN, an organization with multiple offices globally can share its data with its employees, irrespective of location. This can be safely done because their IP addresses are masked, even while accessing public Wi-Fi networks. VPN significantly reduces the threat of cyber-attacks and security breaches.


Shifting from wired to wireless LANs is a result of people's growing need for portability and adaptability in their everyday lives. WLANs are widespread in the modern world. Wireless LANs are available everywhere, from homes to businesses to cafes to many public spaces, guaranteeing that we will always have access to the Internet.


WLANs allow us to stay online even while we're in transit. Because of the freedom it gave its users to roam about while still being productive, smart gadgets have become more popular.


A Wireless Local Area Network (WLAN), also known as a Wireless LAN, is a network comprising two or more computing devices that communicate through radio waves without the need for physical connections. This stands in contrast to a local area network (LAN) that employs wired connectivity, whereby every computer within the network is physically linked to the network switch or hub via an Ethernet cable.

Wireless LANs with infrastructure are equipped with a backbone that operates at high speeds and can be wired or wireless. Access points serve as the intermediary between wireless nodes and the wired backbone. The utilization of access points allows the proficient transfer of network resources among wireless nodes.

Before transmitting information, wireless devices such as clients and access points are required to establish a relationship or association. Data exchange between two wireless stations can only occur once an association has been established.


Purpose of WLAN

WLANs are utilized in different circumstances and serve their purpose.


Networking and Internet services are seen as essential in modern business computing. There is a growing trend of LAN users transitioning towards mobile usage. Mobile users necessitate network connectivity irrespective of location as they seek simultaneous access to the network. Wireless LANs allow users to access shared information without the need for physical connections to their systems, thereby eliminating the need for network managers to install cables and other equipment to set up networks.

The significance of mobile connectivity is often overlooked; however, it becomes especially critical when one is faced with urgent needs but lacks access to a WLAN.

Functionality of WLAN

Understanding the functioning of WLAN is straightforward. The operational principles of LAN networking are nearly identical. The only difference is that WLAN allows the connection of devices to a network without the need for a physical cable.


Secure Network Infrastructure

Network infrastructure devices are certainly the components of a network that transport communications needed for data, applications, services, and multi-media. These devices include routers, firewalls, switches, servers, load-balancers, intrusion detection systems, domain name systems, and storage area networks.

They are targeted by malicious cyber actors because most or all organizational and customer traffic must definitely pass through them:


Organizations and individuals that use legacy, unencrypted protocols to manage hosts and services make successful credential harvesting easy for malicious cyber actors. Whoever controls the routing infrastructure of a network essentially controls the data flowing through the network.

What security threats are associated with network infrastructure devices?

Network infrastructure devices are often easy targets for attackers. Once installed, many network devices are not maintained at the same security level as general-purpose desktops and servers. The following factors can also contribute to the vulnerability of network devices:

How can you improve the security of network infrastructure devices?

The Cyber security and Infrastructure Security Agency (CISA) encourages users and network administrators to implement the following recommendations to better secure their network infrastructure:


Computer Network Planning  Consists of the Following Wireless LAN Standards and Modes

IEEE 802.11 is the standard protocol for wireless local area networks that make it possible to connect securely to high-speed wireless networks while still having mobile access to network infrastructure. Before the advent of this technology, we needed to be connected with cables to the LAN to enjoy the benefits of a fast connection speed while using a network. Several WLAN standards and modes have been designed throughout time by multiple organizations in the business world. The following diagram illustrates many of the most popular WLAN modes and standards. 802.11 was first developed in 1997, and after that various updates are developed as per the requirements.

Home IT Services  Data Recovery Networking Cloud Computing IT System Security IT Managed Services


All Trademarks and Registered Trademarks are the property of their respective Owners.

2005 – 2024 Darwin & Associates IT, All rights Reserved



Whether building a computer network, upgrading or modifying an existing one, we can assist at every step. Prior to network installation an IT systems audit will be carried out to assess your specific requirements.


Darwin IT provides complete network solutions for all small business. By looking at your business as a whole we can advise on hardware-software specification, Internet connectivity, email provision and all networking infrastructure requirements.


In addition, we also provide secure wireless network solutions and can arrange an on-site audit to test for suitability prior to installation.


Network Installation, we have extensive experience in all aspects of computer networks from client/servers to peripheral device configuration, data cabling and email provision.


We will provide a business network to suit your exact requirements and have an outstanding track record in network installation and IT support. Darwin IT has established an impressive portfolio of clients with a business model aimed at 100% customer satisfaction.


The main objective of every installation process is to avoid/minimize client downtime. This is of paramount importance to Darwin IT and as such we offer a weekend install service. Although no downtime can ever be guaranteed we will make every effort to ensure that it is minimized and that business critical systems are given the utmost priority.


We only use branded, tried and tested kit and will perform a free onsite inspection prior to recommending a wireless network solution. If a wireless network is not appropriate we will advise on an alternative solution. Our team will ensure that the best possible hardware - software is specified at the best possible price.


All networks (wired and wireless) installed by us utilize the latest security technology to ensure that your network is fully protected to protect your business and give you peace of mind.

Identifying the applications that you intend to use:

Computer networking may be required diverse environments such as Enterprise Resource Management (ERM), Internet telephony, Instant Messaging (IM), email and others. It is important to discuss the applications that you intend to use such as the above. These in turn are used for estimating the software, hardware, and traffic requirements.


Traffic Requirements:

Computing traffic requirements include several factors. A few points to consider include the following:


Scalability Requirements:

Scalability refers to the extent of network growth that should be supported. For corporate network, scalability is a major consideration. Provision must be made to add users, applications, additional sites, and external network connections.


Geographical considerations:

Consider the LAN and WAN links that may be required. Offices that are separated by large distance can be linked together by a WAN (Wide Area Network) link. Similarly, building complexes within a compound can be linked by a LAN (Local Area Network) link. Typically, the LAN links are high bandwidth (10Mbps and above) and WAN links are of lower bandwidth (64 Kbps - 2Mbps).


Availability:

The availability of a network needs to be given careful consideration while designing a network. It is the amount of time a network is available to users over a period of time and is often a critical design parameter.  Availability has direct relation with the amount of redundancy required. Another important factor that needs to be considered when computing availability requirements is the business loss to the Company due to unavailability of the network for a given amount of time. A right balance needs to be arrived at such that the profitability is maintained.


Security and Accessibility:

Security and accessibility are among the important design phase steps. A security plan needs to be devised that meets the required security specifications.

You must specify:


Cost considerations:

For LANs, the tendency is to minimize the equipment cost (cable cost, minimizing the per port cost, and the labor cost).

For WAN's the primary goal is to minimize the usage of the bandwidth. This is because, the recurring costs for bandwidth are normally much higher than the equipment or labor cost. Therefore, more weightage is given to reliable equipment, and efficient utilization of bandwidth.



Benefits of Network Support Services Benefits of Network What should a good VPN do?

You should rely on your VPN to perform one or more tasks. The VPN itself should also be protected against compromise. These are the features you should expect from a comprehensive VPN solution:


Wireless LANs are further classified into two categories such as:

Ad-hoc Wireless LANs

Ad hoc networks are formed by a group of wireless nodes that establish peer-to-peer communication. The ad-hoc mode has been designed to allow communication only among clients within the transmission range, i.e., within the same cell.

If a client wants to communicate outside the cell, then it’s a must that one of the cells acts as the gateway and performs routing.

Wireless LANs with Infrastructure Disadvantages of Wireless LAN Advantages of WLAN in Computer Networks

Your Internet service provider (ISP)usually sets up your connection when you connect to the Internet. It tracks you via an IP address. Your network traffic is routed through your ISP's servers, which can log and display everything you do online.


Your ISP may seem trustworthy, but it may share your browsing history with advertisers, the police or government, and/or other third parties. ISPs can also fall victim to attacks by cyber criminals: If they are hacked, your personal and private data can be compromised.


This is especially important if you regularly connect to public Wi-Fi networks. You never know who might be monitoring your Internet traffic and what they might steal from you, including passwords, personal data, payment information, or even your entire identity.

Benefits of a VPN connection?

A VPN connection disguises your data traffic online and protects it from external access. Unencrypted data can be viewed by anyone who has network access and wants to see it. With a VPN, hackers and cyber criminals can’t decipher this data.

Secure encryption

To read the data, you need an encryption key. Without one, it would take millions of years for a computer to decipher the code in the event of a brute force attack. With the help of a VPN, your online activities are hidden even on public networks.

Disguising your whereabouts

VPN servers essentially act as your proxies on the Internet. Because the demographic location data comes from a server in another country, your actual location cannot be determined. In addition, most VPN services do not store logs of your activities. Some providers, on the other hand, record your behavior, but do not pass this information on to third parties. This means that any potential record of your user behavior remains permanently hidden.


Access to regional content

Regional web content is not always accessible from everywhere. Services and websites often contain content that can only be accessed from certain parts of the world. Standard connections use local servers in the country to determine your location. This means that you cannot access content at home while traveling, and you cannot access international content from home. With VPN location spoofing, you can switch to a server to another country and effectively “change” your location.


Secure data transfer

If you work remotely, you may need to access important files on your company’s network. For security reasons, this kind of information requires a secure connection. To gain access to the network, a VPN connection is often required. VPN services connect to private servers and use encryption methods to reduce the risk of data leakage.

Disadvantages of using a VPN Speed issues

The stronger the encryption for a VPN, the slower it becomes. This especially holds true for free VPN providers (which come with several other negative points). However, paid services can deliver good levels of encryption at decent speeds. There are several ways to boost speed, for instance, reducing the distance between the device and the VPN server location. Also, upgrading to the necessary number of servers that can take the load of a large number of people using it makes a huge difference.

Increased network complexity

If you require a high-quality VPN, the network that needs to be set up will be more complex. This comprises several network topologies, protocols as well as hardware devices. The complexity can take a while for users to understand.

Security issues

Businesses use VPNs for the primary reason of giving data access to the employees working remotely. The security of the company’s network is then based on the number of users, their devices, and their access points, which reduces control of the VPN.

Types of VPNsRemote access VPNs

Businesses utilize remote-access VPNs to create a secure connection between corporate networks and personal or company devices used by remote employees. Once connected, employees can access information on the company network in the same way they would if their devices were physically plugged in on office premises.

Site-to-site VPNs

Site-to-site VPNs are used in large-scale businesses where a multi-departmental exchange of information needs to be carried out securely and continuously. Such VPNs are not easily implemented and require a great deal of specialized equipment and complex hardware and resources. These VPNs are custom-built and may not come with the flexibility that commercial VPN services offer. Within site-to-site networks are:

Client-based VPNs

Client-based VPNs allow users to be connected to a remote network through an application/client that manages the connection and the communication process of the VPN. For a safe connection, the software is launched and authenticated with a username and password. An encrypted link is then established between the device and the remote network.

Client-based VPNs allow users to connect their computers or mobile devices to a secure network. It’s a great option for employees to access their company’s sensitive information while working remotely.

Network-based VPNs

Network-based VPNs are virtual private networks that securely connect two networks over an unsafe network. An IPsec-based WAN is an example of a network-based VPN. In this VPN, all offices of a business are connected with IPsec tunnels on the Internet.

The three common types of network VPNs include:

Wireless LAN (WLAN)

Whether you are moving into a new building, relocating offices to an already existing building, growing your company through physical expansion, or simply rearranging your current layout and wanting additions, moves and changes made,

Darwin IT is there to make it all happen from running a single cable to multi-floor installations, including the provision of network equipment and peripherals such as switches and server cabinets (wall mount to full height)

With time a company’s server room undergoes many changes, often resulting in cabling and cabinets becoming untidy.

Darwin IT is available to assist with cable management through the tidying of server cabinets, testing, labeling and re labeling of network points, and repairing of faulty points.