Proposal Template AI

Free proposal templates in word, powerpoint, pdf and more

Network Design Proposal Template: A Comprehensive Guide + Free Template Download + How to Write it

Introducing the network design proposal template.

As a network administrator, I understand the importance of a well-designed and efficient network infrastructure. In today’s fast-paced and technology-driven world, having a solid network design is crucial for the success of any organization. That’s why I am excited to introduce the Network Design Proposal Template, a comprehensive and professional tool for outlining and presenting network design proposals.

This template is important because it provides a structured format for clearly outlining the proposed network design , including the scope of work, technical specifications , and anticipated outcomes . It serves as a guide for organizing and communicating the details of a network design project in a way that is easy for stakeholders to understand and evaluate.

What sets this template apart from a standard proposal is its specific focus on network design. It includes sections for addressing key networking elements such as topology, security, scalability, and performance, providing a level of detail and specificity that is often lacking in generic proposal templates . With the Network Design Proposal Template, network administrators can ensure that all relevant technical and strategic considerations are thoroughly addressed in their proposals.

Overall, this template is an invaluable resource for network administrators, as it streamlines the proposal process and helps to convey the importance and impact of a well-designed network infrastructure.

Network Design Proposal Template

1. introduction.

  • This section should provide a brief overview of the network design project, including the scope, objectives, and desired outcomes.

Example: Our company, XYZ Corp, is in need of a complete network redesign to improve performance, security, and scalability. The goal of this project is to create a modern and efficient network infrastructure that can support our growing business needs.

My advice on this section: Be sure to clearly outline the specific reasons and benefits for the network design project. This will help stakeholders understand the importance and necessity of the proposed changes.

2. Current Network Infrastructure

  • This section should include a detailed description of the current network infrastructure , including an inventory of hardware, software, and network components.

Example: At present, our network consists of Cisco routers, switches, and firewalls, along with Windows Server 2016 and VMware virtualization. We have a combination of wired and wireless connections, with multiple VLANs to segregate traffic.

My advice on this section: Provide as much detail as possible about the existing network infrastructure, including any pain points or limitations that need to be addressed. This will help the reader understand the specific challenges that the new design will need to overcome.

3. Proposed Network Design

  • This section should outline the proposed changes and improvements to the network infrastructure, including any new hardware, software, and network topology.

Example: The proposed network design includes the implementation of a new Cisco Meraki firewall, switches, and wireless access points to provide a unified and centrally managed network. We will also be upgrading to Windows Server 2019 and implementing a hybrid cloud solution with Microsoft Azure.

My advice on this section: Clearly articulate the specific changes and upgrades that are being proposed, including the rationale behind each decision. This will demonstrate to stakeholders that careful thought and planning has gone into the proposed design.

4. Implementation Plan

  • This section should provide a detailed plan for implementing the proposed network design, including timelines, milestones, and resource requirements.

Example: The implementation plan will be divided into three phases: hardware installation, software upgrades, and network migration. Each phase will have specific timelines and milestones, and will require the coordination of IT staff, vendors, and end users.

My advice on this section: Be as specific and detailed as possible when outlining the implementation plan. This will help stakeholders understand the scope of the project and the resources required , and will also serve as a roadmap for the project team.

5. Cost Estimate

  • This section should provide a breakdown of the costs associated with the proposed network design, including hardware, software, licensing, and labor.

Example: The estimated cost for the network design project is $150,000, which includes the purchase of new hardware and software, as well as implementation services from our vendor partners.

My advice on this section: Provide a detailed breakdown of the costs, including justification for each expense. This will help stakeholders understand the financial implications of the project and make informed decisions about the proposed design.

6. Conclusion

  • This section should summarize the key points of the network design proposal and reiterate the benefits and value of the proposed changes.

Example: The proposed network design will provide XYZ Corp with a modern, secure, and scalable network infrastructure that will support our business needs for years to come. With careful planning and execution, we are confident that this project will be a success.

My advice on this section: Use the conclusion to reinforce the importance and benefits of the proposed network design, and to inspire confidence in the project’s success. This will help to gain buy-in from stakeholders and decision-makers.

Download free Network Design Proposal Template in Word DocX, Powerpoint PPTX, and PDF. We included Network Design Proposal Template examples as well.

Download Free Network Design Proposal Template PDF and Examples Download Free Network Design Proposal Template Word Document

Download Free Network Design Proposal Template Powerpoint

Q: What is a Network Design Proposal Template?

A: A Network Design Proposal Template is a document that outlines a proposed network design for a company or organization. It includes details such as network architecture, hardware and software requirements, security measures , and budget estimates.

Q: Why do I need a Network Design Proposal Template?

A: A Network Design Proposal Template is essential for presenting a comprehensive plan for implementing or upgrading a network infrastructure. It helps to communicate the technical details and requirements to stakeholders and decision-makers.

Q: What should be included in a Network Design Proposal Template?

A: A Network Design Proposal Template should include an overview of the current network infrastructure, proposed improvements, hardware and software requirements, security measures, cost estimates, implementation timeline, and potential risks and mitigation strategies.

Q: Who should use the Network Design Proposal Template?

A: The Network Design Proposal Template can be used by network engineers, IT consultants, or project managers who are responsible for planning and implementing network infrastructure.

Q: How do I customize the Network Design Proposal Template for my specific project?

A: The Network Design Proposal Template is customizable to fit the specific needs of your project. You can modify the provided sections and fill in the details relevant to your organization’s network requirements.

Q: Can I use the Network Design Proposal Template for different types of networks?

A: Yes, the Network Design Proposal Template can be used for various types of networks, including LAN, WAN, wireless, and cloud-based networks. You can tailor the template to meet the specific needs of each network type.

Q: Is the Network Design Proposal Template compatible with different software applications?

A: The Network Design Proposal Template is typically provided in a format such as Microsoft Word or PDF, making it compatible with a wide range of software applications for easy editing and sharing.

Related Posts:

  • Music Business Proposal Template: A Comprehensive…
  • Website Design Proposal Template: A Comprehensive…
  • It Proposal Template: A Comprehensive Guide + Free…
  • Fundraising Proposal Template: A Comprehensive Guide…
  • It And Software Proposal Template: A Comprehensive…
  • Software Project Proposal Template: A Comprehensive…
  • Corporate Event Proposal Template: A Comprehensive…
  • Research Proposal Template: A Comprehensive Guide +…

Network Design and Best Practices

Last Updated: September 16, 2024

With networks at the heart of the most modern business, network design can have a major impact on business outcomes. Finding the right balance of network performance, security, redundancy, and cost require a unique mix of project management and technical skill.

To help you nail your next network design project, we’ll take a deep dive on the topic, provide a basic framework you can follow, and look at some best practices to keep in mind as you go.

A go-to guide for IT pros of every level

Understand spanning tree config, get strategies for why and where to put switches, calculate ports needed, and more best practices to keep your network operating smoothly.

What is network design?

Network design is the practice of planning and designing a communications network.

That process starts with identifying business and technical requirements and continues until just before the network implementation stage (when you actually do the work to deploy and configure what was designed). Network analysis, IP addressing, hardware selection, and implementation planning are all part of network design.

In simple networks, like those found in most homes and small offices, network design is a straightforward process. In large enterprise networks, the network design process is often very complex and involves multiple stakeholders.

Understanding PPDIOO & other network lifecycle models

Before we dive into how to design a network, let’s take a moment to review network lifecycle models. In the context of network design, a network lifecycle model helps explain where and how network design fits into the broader lifespan of your network’s components and overall structure.

One of the most popular network lifecycle models is Cisco’s PPDIOO (Prepare, Plan, Design, Implement, Operate and Optimize) model:

  • Prepare. This is where you define high-level requirements and strategy. For example, your deliverables from this phase may include requirements documentation and current state surveys.
  • Plan. This stage deals with specific network requirements based on information gathered in the planning stages.
  • Design. During the design stage, the information gathered from the previous two stages is used to create a detailed network design .
  • Implement. This is where the work gets done to configure and deploy the network infrastructure. There is often testing to validate the design in this phase.
  • Operate. This is the portion of the lifecycle where the network is in production use. During this stage, monitoring is an important part of validating that the network is working as designed and being able to quickly address issues when it isn’t.
  • Optimize. At some point in most networks’ lifecycle, tweaks and optimizations are needed. This is the stage where those changes are identified. For major changes, the cycle begins again to plan and implement them.

Other network lifecycle models include Cisco’s PBM (plan, build, manage) and the NDLC (network development life cycle). Regardless of which model you choose, the general steps—information gathering, design, implementation, and improvement—and cyclical nature are the same. The important takeaway is understanding any network lifecycle and where network design fits in.

Designing a network step by step

Now that we understand the basics of a network lifecycle model, let’s take a step-by-step look at the process of designing a network infrastructure. While the specifics of your network design will vary based on size and complexity, this general framework can help you make the right decisions.

1. Identify the requirements

Before you begin any network design project, begin by gathering information and developing clear business and technical requirements. Without clearly defined targets, the rest of the design falls apart.

Business requirements help define what you need to do. That means things like:

  • Support a new office
  • Improve end-user experience
  • Comply with a new regulation
  • Improve business continuity

Looking back at the PPDIOO lifecycle model, business requirements align with the prepare stage. This means you should work closely with stakeholders when identifying business requirements.

Once you’ve detailed the business requirements, it’s time to move on to the technical/functional requirements. For example, requirements could include:

  • Security requirements
  • Specific protocols the project must implement
  • RTO/RPO (recovery time objective/recovery point objective) numbers
  • Uptime SLAs (service level agreements)

When you create your requirements, don’t overlook constraints . For example, business requirements will have a budget constraint. Technical requirements may have constraints such as the need to continue supporting legacy apps.

2. Assess the current state of the network

Chances are, in most networks you’re not starting with a clean slate. Sometimes that’s a good thing that makes life easier, other times it can complicate a project. For example, if all the structured cabling is already in place, that’s one less thing to worry about. However, if all that’s in place is Cat5 cable and you need Cat6A to support 10GBaseT, the existing cabling now becomes an issue to deal with.

Whatever the state of the network is, it’s important you know early in the design process. You need to assess the network’s current state before you make any specific design recommendations. At the end of this step, you should understand the network layout, performance, data flows, applications & services on the network, network security, and physical and logical layout.

Some of this can be achieved by reviewing existing network diagrams, policies, and monitoring tools. In other cases, you’ll need to use automatic network mapping tools and security scanners to get the full picture.

3. Design your network topology

Once you know your requirements and understand the current state of your network, you can begin blocking out the functional components of your network. During this step, you’ll need to consider both the physical and logical aspects of your network.

When it comes to physical network design you’ll need to address things like:

  • Running copper and fiber cabling
  • Number of switch ports required
  • WiFi access point positioning
  • Rack layout

Cooling and power

Logical network design deals with things like:

  • IP addressing/subnetting
  • Network topology

At the end of this step, you should be able to create a static map of the physical and logical network you’re designing. If you need help, check out Auvik’s The No Sweat Guide to Network Topology , which covers the ins and out of this step in more detail.

Tip: Don’t forget about cloud workloads and cloud networks. Your network design will need to account for on-premises and cloud data flows.

Hierarchical network design: What are core, distribution, and access layers?

Before we move on to the next step, let’s take a look at two key network design concepts: hierarchical network layers and top-down vs bottom-up design.

A traditional hierarchical network design is based on the idea of three basic network layers. Each layer handles a separate portion of the dataflows on a network. Those layers are:

  • Core layer. This is the layer that routes traffic between different geographical sites. In other words, it’s the network backbone. The core layer is where high-throughput, expensive core routers shine.
  • Distribution layer . The distribution layer sits between the core and access layers. It acts as a boundary and implements network policies to restrict or allow data flows between different subnets within the network. Less expensive routers and L3 switches are the common workhorses of the distribution layer.
  • Access layer. The access layer is the layer for endpoint devices like user PCs, printers, and VoIP phones. Smaller “access switches” are responsible for switching packets and routing traffic at this layer.

In some cases, you may not need all three of these layers. For example, many networks bypass the distribution layer altogether.

Top-down vs bottom-up design

Top-down and bottom-up are two approaches to network design based on the OSI model . With a top-down approach, you start designing your network at the application layer and work your way down the model finishing with the physical layer. The bottom-up design is exactly the opposite.

Top-down is generally considered a better approach when you start with business requirements and work your way down. However, top-down is also often more time-consuming. Bottom-up network design starts with the physical aspect of the network and works upwards.

As a result, bottom-up can be quicker but can often lead to missed requirements or compromises on desired outcomes, as designing a network from the bottom up locks you into certain outcomes before you get to the application layer where users get work done.

4. Choose the hardware and software

This step entails identifying the hardware and software you’ll use. In some cases, this will happen in parallel with step 3. In others, some of the hardware or software may be specified early in the project. As a rule, selecting the specific hardware and software you’ll use after you know what the network needs to do gives you the most flexibility.

During this stage, you’ll choose specific cables, racks, network devices, servers, applications, cloud services, etc. to make your design a reality. For custom parts or large orders, keep in mind potential supply-chain issues. If you can’t get your structured cabling or access switches in time, you can slow down project completion.

5. Plan for implementation and beyond

With your network design and hardware/software selections ready, you can now plan for the implementation and beyond. This step entails creating a plan to deploy, configure, and test the network. In some cases (usually larger networks) this step may include small-scale test deployments to validate the design works before scaling out.

Tight project management and keeping stakeholders informed are key parts of getting your plan right. A network deployment has a lot of moving parts and your plan should account for project milestones, change management , and key deliverables. Additionally, if the network will be managed by a different team than those doing the implementation, you’ll need a transition plan. If you’re responsible for network management going forward, developing a plan for how you’ll monitor and maintain the network is important as well.

Top 5 network design best practices

Now that we have a framework to follow, let’s take a look at some network design best practices for making better decisions throughout the process.

1. Integrate security early on

There is a reason the idea of “ shifting security left ” has become so popular in the DevOps world: it works. By making security a priority from the beginning of the project, you’re less likely to have gaps in your security posture. You’re also more likely to improve your overall network performance because security won’t be inefficiently shoehorned in after most decisions have been made.

Treat security requirements with just as much priority as performance requirements and spec them into a project early on. Ideally, we should all have a “security is everyone’s responsibility” mindset, but in practice that isn’t always the case. It’s usually a great idea to have a security-focused stakeholder(s) involved in the project end-to-end.

2. Know when to use top-down vs bottom-up

In most cases where you’re starting from scratch, top-down design is the “better” choice. By designing top-down, you focus on the business requirements and maximize your chances of getting it right.

However, there are many network design projects where the resource and time investment in going top-down just doesn’t make sense. For example, if you’re already familiar with an organization’s overall business requirements and simply need to expand a network or increase bandwidth, bottom-up can be much more efficient.

3. Standardize everything

If it can be standardized, standardize it. It will make troubleshooting, patching, maintenance, and asset management drastically easier in the long run.

Here are some examples of things you can and should standardize:

  • Hostnames (e.g. printer5.office2.lan3)
  • Hardware models
  • IP address schemes
  • Cable colors (e.g. one color for VoIP, one for data, etc)
  • Security policies

4. Plan for growth

Network bandwidth consumption today isn’t going to be the same a year from now. You have to consider how much you expect bandwidth consumption to increase over the lifecycle of the network, and design with that expectation in mind.

One answer is obvious: just build in additional bandwidth based on your expectations. However, making sure the network is flexible and modular enough to easily accommodate expansion is arguably more important. After all, you can’t know for certain what your requirements will be in the future, but you can design with the idea you may need to extend the network in mind.

5. Create and maintain network documentation

Missing, stale, or incomplete network documentation is a major source of tech debt, wasted time, and added frustration. Do your future self — or your friendly neighborhood network administrator — a favor and make sure your network design and implementation deliverables include layer 1-3 network maps . Then, once they’re created, be sure to maintain them going forward.

Interested in a deep-dive on network docs? Check out Network Documentation Best Practices: What to Create & Why!

Considerations for designing computer networks

Copper vs fiber, logical topologies, IP addressing, VLANs, bandwidth, and WiFi coverage are some of the most obvious considerations when you’re designing a network. However, that’s far from an exhaustive list. There is a lot that goes into designing a network, and it can be easy to overlook things. Here are some key considerations to keep in mind for your next project.

Regulatory requirements

When you’re designing a network, you need to account for legal regulations that impact both the physical and logical design of your network. For example, local building codes may impact how you run structured cabling. Similarly, the National Electrical Code in the US has requirements relevant to the electrical power your network devices will require. From a logical perspective, regulations like HIPAA, PCI DSS, and GDPR can impact both data in transit and data at rest.

During the network design process, you’ll need to keep these requirements in mind to build a compliant network.

Network resilience and redundancy

Because of the importance of network availability to business operations, enterprise networks need some level of fault tolerance. To make that happen, N+1, 2N, or 2N+1 redundancy (or even higher) is often part of modern network design.

Of course, resilience and redundancy come with a budgetary cost. Your network design will need to balance resilience and redundancy against the expense. In other words, reliably achieving five-nines (99.999% uptime) is great if you can do it, but it ain’t cheap!

A good way to frame this tradeoff is: considering your cost of downtime (i.e. how many dollars per minute/hour will you lose if the network goes down) and balancing that against your exposure to downtime with your current redundancy plan.

Cloud vs. on-prem

It’s no longer a given that on-premises are the best place to run a given workload. Once you have your business and technical requirements, you should carefully consider whether or not a cloud network makes sense as a solution. We won’t rehash the entire cloud vs on-prem debate here, but make sure you don’t lock yourself into an on-premises solution when the cloud may be a better fit (or vice versa!).

It can be easy to overlook the cooling and power requirements of a network. Don’t make this mistake! If you can’t meet your power requirements, you’ll never get your deployment off the ground. If you don’t account for all the heat dissipation of your new network equipment, devices can overheat and prematurely fail. Here are a few points to consider about power and cooling:

  • Make sure your electrical panels and electrical outlets can accommodate your new equipment.
  • Make sure to account for power-over-Ethernet (PoE) loads when sizing UPS (battery backups) and other power equipment.
  • Make sure your server room cooling can handle the additional heat generated by your new network gear or plan to invest in supplemental cooling.

There’s no one size fits all network design. With the right approach, however, you can create a design that matches your business requirements. Of course, as network lifecycle models like PPDIOO demonstrate, it doesn’t stop after the design stage!

Network design and implementation are only the beginning. Once a network goes live, that’s when the real work begins. Proactive network monitoring helps you ensure the network is working as it should and can inform your decisions when it comes time to expand or refresh the network.

Your Guide to Selling Managed Network Services

Get templates for network assessment reports, presentations, pricing & more—designed just for MSPs.

What do you think?

Share your thoughts and read what others have to say

This was an incredibly interesting read. I am currently studying Network & System Security, I am after reading several of the articles posted on your site, written both by Steve Petryschuk and Kevin Dooley. They are all very well written, explaining high level concepts in a concise easy to understand manner. Great work.

Absolutely outstanding breakdown!!!! This is like learning 10 years of network design in 10 mn. Great thanks

This article is what I just needed now! I’m currently looking for materials to get my Course1 assignment started (design a good network for a company struggling for a reliable and scalable network management infrastructure). Your article did the coursework for me because the breakdown is well detailed. You are Godsent – it’s a fact.

Awesome! Glad we could help, and good luck!

What an awesome 😱 notes.,I learned alot and just ready to have practical network in our Institute of Accountancy Arusha (IAA)

Can you please send me the methodologies of network design used in LAN

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Share your thoughts here *

Enter your name *

Enter your email address *

Save my name, email, and website in this browser for the next time I comment.

Getting Started With Syslog in Auvik

How to troubleshoot network connectivity problems with auvik, network troubleshooting: a guide for it professionals, what’s your shadow it risk factor.

  • The impact shadow IT has on an organization
  • How to evaluate tools
  • Tips on security
  • A quiz to help you determine the severity of shadow IT in your org
  • Solutions to solve these problems

CBT IT Certification Training

Unlimited IT Certification Courses via Streaming Video

Remember me

  • Lost your password?

Enter your username or email:

  • Back to login

Network Design Methodology

This chapter will cover the following topics:

Network design is becoming more complex due to the increasing development in technology and the different types of traffic added to the network backbone. As a result, it is necessary to have methodologies, processes, and architectures in place that support network design plans. Overall, this will support the company’s business goals.

You can learn more advanced network design concepts in our Cisco CCNP certification course .

Back to index.

The following issues have resulted in new network architectures:

  • The growth in different types of applications
  • The evolution of IT, from basic network connectivity to converged intelligent systems
  • Increased business expectations from networks

Network Design Principles

When building a network, choosing the network hardware and software components must be completed with careful design, planning, deployment, and support. These design principles will be covered in detail in the sections to follow.

Business Policies and Procedures

Today’s modern organizational models try to leverage internetworking power and the benefits of the global Internet. This modern approach is different in many ways from the traditional organizational model that was based on a vertical network design.

Traditional companies have a closed structure and a limited ability to integrate with other organizations and other companies from an IT standpoint, resulting in limited access to information. These companies are difficult to both partner and interact with because most of the processes and applications are done internally. Therefore, companies that adopt this model are unable to adapt and take advantage of new technologies. It is also quite difficult for them to create and maintain optimal relationships with their stakeholders (e.g., partners, customers, and investors).

These disadvantages created the need for a new modern networking organizational model based on a horizontal network design that allows partnership and collaboration with other entities. It also provides a more focused expertise over the products and services vital to a company’s business model. The key issue in network design is the ability to share information, both internally and externally. The Internet offers a way to accomplish this by giving companies access to unlimited resources that bring value. This makes stakeholder relationships as important as the actual products or services offered by a company, which is key to the company’s success.

The power of relationships is a key aspect of corporate information sharing and system integration. The process of building a system that integrates all of the stakeholders is referred to by Cisco as an ecosystem. The main objective of this CCDA manual is to learn how to design this ecosystem, whether this is done internally or with external partners, suppliers, vendors, or customers. The design of an ecosystem must include a scalable and flexible network infrastructure that will be able to leverage enterprise networking and the Internet. Creating an environment that is highly accessible and collaborative, and that can break geographical boundaries, will promote an efficient integration of all the stakeholders.

Modern Organizational Model

Figure 2.1 – Modern Organizational Model

The modern organizational model shown in Figure 2.1 above involves the following four entities:

  • Vendors and suppliers

The most important entity is the employees because they are the most important asset of any company. This consists of human resources information, data about benefits, job openings, stock reports, schedules, and expense reporting, all of which depend on the corporate Intranet. This Intranet provides instant access to the most recent information, services, and application updates used by all the employees.

The most important customer-related aspects of a company are online support, technical support, and providing different types of customer services. Depending on the situation, customers might need to access some of the company’s resources, for example, opening a support ticket.

The vendors and suppliers are involved in the process of ordering, billing, and delivery of the products the company uses. These processes can be very time and labor intensive, so organizations can leverage their existing internetworks to create links to their suppliers and vendors. This lowers costs per transaction and is part of an efficient organizational ecosystem.

The fourth component in the organizational model is strategic partners, with which the company creates strategic relationships in order to leverage their resources and services to complete in-house expertise and skills.

This modern organizational model applies to small, medium, and large companies and serves all their current and future business needs. For example, by externalizing certain services, a company can lower cost structures, allowing the possibility of increasing employees’ salaries. A company can also benefit from information sharing with its customers through modern means (e.g., websites, portals, etc.), or from better communication with its employees through the Intranet. Companies that use this model are also more flexible in the event of rapid market changes than companies based on the traditional vertical model are.

The modern horizontal organizational design is built around a modular architecture that uses technology consistent with the needs of the organization. This modular approach also allows companies to have a network infrastructure that is better suited for scalable applications.

Organizational Architecture of the Network

When discussing the architectural components of the network, the architecture that Cisco recommends is divided into multiple layers (Figure 2.2) that make the processes in the organization easier to expand, implement, and scale.

Organizational Architecture of the Network

Figure 2.2 – Organizational Architecture of the Network

Each layer has its own specialized functions or tasks within the organizational process. Applications and services comprise the top layer and include organizational goals. Applications and services offer a concrete set of functions that can be accessed by the network, but only by authorized users (e.g., employees, strategic partners, customers, vendors, and suppliers). This layer also includes productivity tools (e.g., word processing, databases, browsers, e-mail services, file transfers, and custom tools).

Intelligence solutions, and structured data and business logic comprise the middle layer. These elements make the modern network much more intelligent and help support applications and services in an efficient manner. This level also includes functions such as messaging (e.g., chat, VoIP, video conferencing, etc.), database structures, and other content networking solutions.

The bottom layer is the foundation of the organizational architecture, the network infrastructure. This is composed of the network platform, the connections that work together to provide a highly available, secure, and scalable network.

All of these layers are combined and offer a foundation for all the organizational policies, goals, and procedures that are put in place by management and then handed to other departments in the company to support the overall goals and mission of the organization.

Some general considerations regarding the organizational model are that it should mirror the logical structure of the company, it should be consistent with the organizational processes, and it should get constant input from the stakeholders. In addition, control and access mechanisms should be implemented so that the model is manageable. The core application should be implemented first and the other features should be developed around it.

Organizational Policy

Before designing a network, an important aspect must be considered: all organizations have policies, at one level or another. Even if the procedures are not written, there is some kind of understanding at the management level about the goals of the organization.

Organizational policy and procedures are generally a collection of specific guidelines and rules in written form that are understood, implemented, and maintained at every level of the organization in order to reach well-defined goals. The organizational policy cycle contains the following three components, or steps:

  • Set the policy
  • Enforce the policy
  • Maintain and change the policy

Note:     Company policies dictate what technologies to use. For example, the decision to use a specific hardware device or network protocol is derived from a specific business need.

Policies are set by the management (e.g., CEO, CIO, board of directors, etc.). The same entities monitor the implementation of the policies and measure their impact on the organization. Senior managers might designate to middle managers the ability to hire and fire individuals based on their willingness or ability to adhere to the organizational policies and procedures. Maintaining the policy means reevaluating it based on new technologies, business logic, and security needs. Security is a key area where policies are often changed because new threats arise constantly.

The policy makers include the following, from top to bottom:

  • Board of directors, executives (CEO, CIO, CFO, etc.), and senior management
  • Departmental management (unit managers, area managers, supervisors, etc.)
  • Employees (people with expertise in various fields who can be relied on to formulate the procedures)
  • External consultants
  • Strategic partners

After understanding the company’s policies, a network designer must also understand how information flows through the organization. This is a complex process, and it differs based on the size of the company and the number of departments involved in a specific task. For example, a sales order process initiated by a customer will go through the sales, financial, management, and distribution departments. This process also generates interaction with strategic partners and suppliers. Every step of this process might be backed up by specific applications that cover certain tasks. The network designer must understand how these applications affect the underlying network infrastructure.

Network Infrastructure Essentials

As mentioned before, a flexible network infrastructure helps the organization and its customers meet the needs, policies, and procedures to help facilitate information flows. Designing that network infrastructure involves considering the following essential features recommended by Cisco:

  • Availability: Critical business applications need to have complete access to network resources on a 24/7 basis. All the components of the network infrastructure should be redundant and resilient.
  • Efficiency: The best equipment and software that is tuned for optimal results should be provided. This should be accomplished with reasonable costs and investment (the most efficient network at the lowest cost) by implementing features such as Quality of Service (QoS); Authentication, Authorization, and Accounting (AAA); and filtering.
  • Functionality: The network infrastructure must support the business applications and services in terms of efficiency and availability.
  • Manageability: Management tools (CiscoWorks, etc.) should include technologies (configuration management, performance monitoring, and fault detection) that improve the control of the network, such as SNMP.
  • Performance: The important applications should get all the bandwidth they need. Scalable and modular hardware should be used, IOS should be properly configured, and special technologies should be used when needed (QoS, etc.).
  • Scalability: This includes the ability to grow and expand with the organizational goals of the policies and procedures. Scalability studies might be required, for example, in a situation where company acquisitions are planned.

Cisco Intelligent Information Network

Cisco Intelligent Information Network (IIN) represents a multi-phased architecture that injects intelligence into a network infrastructure. Its single integrated system provides intelligence across multiple layers and aligns the network infrastructure with the rest of the IT infrastructure, integrating the network with applications, software, servers, and services. In other words, the network becomes an active participant in the total delivery of applications and services. Cisco sees this as an evolving environment (i.e., ecosystem) that responds to constantly changing business requirements.

Cisco IIN features the following capabilities:

  • Integrated system: The network is integrated with applications and services.
  • Active delivery: The network fully participates in monitoring, management, optimization of service delivery, and applications.
  • Policy enforcement: The network enforces policies that allow it to reach business goals, link business processes, and establish rules and procedures.

As mentioned, Cisco IIN is an evolutionary approach comprised of the following three phases:

  • Integrated transport: This involves the convergence of data, voice, and video into a single transport network. An example of this is Cisco’s Unified Communications platform. As new applications are delivered, there is an infrastructure in place for integrated transport. Unified messaging is an example of applications where users integrate voice messaging, e-mail, text, or voice recording.
  • Integrated services: This represents the merger of common components, such as data center server capacity or storage, virtualization technologies that allow the integration of servers, and storage and network components. By virtualizing systems with redundant resources, the network infrastructure can offer services in case the local network fails, in addition to enhancing disaster recovery and business continuity.
  • Integrated applications: At this level, the network becomes fully application aware and can proactively optimize application performance by integrating application message handling, application security, and application optimization. Cisco calls this integrated application technology Application Oriented Networking (AON).

Service Oriented Network Architecture

Service Oriented Network Architecture (SONA) is an ongoing architectural framework that supports emerging technologies, IT strategies, and initiatives. SONA is a three-layer model, as shown below in Figure 2.3.

SONA Three-layer Model

Figure 2.3 – SONA Three-layer Model

The bottom layer is comprised of the physical infrastructure, which is also referred to as the network infrastructure layer. This is where the servers, storage, and clients are located and includes different modular design areas (e.g., WAN, enterprise edge, branch, campus, data center, and teleworker).

The core common services comprise the middle layer. These are integrated into an interactive services layer along with the services management and include the following:

  • Real-time communications
  • Mobility services
  • Storage services
  • Application delivery
  • Management services
  • Virtualization technology
  • Transport services

The top layer comprises the applications platform, which includes the following:

  • Commercial applications
  • In-house developed applications
  • Software as a Service (SaaS)
  • Product Lifecycle Management (PLM)
  • Customer Relationship Management (CRM)
  • Enterprise Resource Planning (ERP)
  • Human Capital Management (HCM)
  • Supply Chain Management (SCM)
  • Procurement applications
  • Collaboration applications (instant messaging, IP contact center, video delivery, etc.)

All of these components work together as an architectural framework. The advantages they offer include the following:

  • Functionality
  • Supports enterprise operational requirements
  • Scalability
  • Expansion and growth of the organizational tasks, as it separates the functions into layers and components
  • Facilitates mergers and acquisitions
  • Hierarchical design that allows network resources to be added easily during times of growth
  • Availability of services from any location in the enterprise, at any time

The SONA network is built from the ground up with redundancy and resiliency to prevent network downtime. The goal of SONA is to provide high-performance, fast response times and throughput by assuring QoS on an application-by-application basis. The SONA network is configured in order to maximize the throughput of all critical applications, such as voice and video. SONA also provides built-in manageability, configuration management, performance monitoring, fault detection, and analysis tools. SONA provides an efficient design with the goal of reducing the total cost of ownership (TCO) and maximizing the company’s existing resources when application demands increase.

PPDIOO Lifecycle Model

In addition to knowing the essential features of a flexible network, a network designer should also follow a methodology that must guide the entire lifecycle of the design process. In this regard, Cisco developed the PPDIOO model, which is a six-phase model that every network implementation will go through during its operational lifetime, as follows:

The PPDIOO lifecycle model (Figure 2.4) and SONA have one common benefit: they both lower the TCO. In the early phases of the process, technology requirements are evaluated and validated, which allows for proper planning in response to changes in the infrastructure and requirements for resources. It also improves network availability by using a solid network design, and along the way, network operations are validated. In addition, it makes the company more agile by establishing business requirements and technology strategies and adjusting them on a regular basis. Finally, it speeds access to applications and services by improving the following issues:

  • Availability
  • Performance
  • Reliability

PPDIOO Lifecycle Model

Figure 2.4 – PPDIOO Lifecycle Model

The network’s lifecycle might not go through these six phases in this particular order without some type of iterative process. For example, after the implementation phase, you might need to go back to the planning or design phase and make some changes at that level. It can also be an iterative process where the flowchart can be modified based on changing technologies, budget, infrastructure, business needs, or business structure. Unplanned actions can happen, especially in the operation phase. Each phase is covered in detail below:

  • Prepare Phase: The first phase of PPDIOO is the prepare phase. This is where you establish the company’s requirements and goals. The IT and the network/security infrastructure must always be in line with the company’s goals and business requirements. At this stage, a network strategy and high-level architecture to support that strategy is developed. Possible technologies that can support that architecture must be identified. A business case must also be established in order to have a financial justification for the overall network strategy. Representations from the company’s board of directors (CIO, COO, etc.) might be involved in this phase.

In the plan phase, you will characterize the network and perform an analysis against best-practice architectures, and look at the operational environment overall. A project plan must be created in order to help manage the tasks, identify the responsible parties or individuals, set the milestones, and identify the resources needed for the design and implementation of the project. This generated project plan must be followed through the remaining phases of the PPDIOO lifecycle.

Note:    Remember, security is a top-priority consideration in any phase.

  • Design Phase: The next phase involves designing the network according to the company’s policies, procedures, business goals, and available budget and technologies. The design phase also might mean meeting with policy-makers, team leaders, and end-users in the process of gathering and analyzing data, and auditing all key activities. Results of the design phase are the basis for the approach taken in the next phase, which involves implementation. The focus of the CCDA blueprint is comprised of the first three PPDIOO phases – prepare, plan, and design – among which the design phase is the most complex. As such, the design phase will be covered in more detail later in this chapter and in the remaining chapters of the manual.
  • The implement phase includes configuration, installment, maintenance, and so on. This is where the new equipment is installed and configured using the command line interface (CLI) or graphical tools (SDM, ASDM, etc.). Old devices might be replaced with new devices, or some components might be upgraded (memory, operating systems, etc.). The project’s plan must be followed during the implement phase. Planned network changes should occur here, and they should be communicated through control channels in meetings and receive the appropriate approvals.Each step in the implement phase should have a description, detailed implementation guidelines, a time estimate, and instruction steps for falling back to a previous state in case something goes wrong. It will also combine additional reference information, from either RFCs, white papers, case studies, or other Cisco documentation. Any changes implemented here should be tested before moving on to step 5 – the operate phase.
  • This phase involves maintaining the day-to-day operational maintenance and health of the network infrastructure. This includes managing the network components, monitoring, conducting analysis and creating reports, routine maintenance, managing the upgrades of the systems (hardware, software, of firmware), managing performance, and identifying and correcting any network faults or security incidences. This final test of the design process involves analyzing the actual operations of the implemented network system. Network management stations (NMSs) should monitor network health parameters, through SNMP traps (and certain thresholds reached) or other real-time monitoring solutions.

Optimization refers to proactive network management, meaning identifying and resolving issues before they move throughout the entire network. The optimize phase might also generate a modified network design if too many problems appear in the implement and operate phases. Sometimes, you might need to go back to the design phase in order to solve those problems and implement new solutions.

The goal of this entire process is constant improvement, and the IT Infrastructure Library (ITIL) might be used          as a basis for network design and administration.

The following section will focus on the primary goals of a network designer in detailing the design phase and                analyzing some design methodologies used in PPDIOO.

Note:    A seventh phase, referred to as the retirement phase, is activated when equipment needs to be taken out        of production.

A proven method for network design is necessary because it provides consistency in the design process, it offers a framework from which to work, and it assures the network designer that no steps will be left out of the process.

Design Phase Methodology

As with the previous phases, the design phase is based on the requirements of the company as they align with their technical requirements. The goals of the design phase include the following parameters:

  • High availability
  • Assures redundancy
  • Failover and fallback mechanisms, both at the software and hardware level under network-enabled devices
  • High availability of dynamic routing protocols
  • Scalability (the ability to grow the project based on future growth models)
  • Performance models and goals

In this particular phase, the team involved in the design process might request input from different areas of the company, from security professionals, or from various department leaders. The gathered information will be compiled, logical and physical diagrams will be created, and analysis and reports will be generated based on the conclusions. The initiated project plan will be modified and updated during the design phase. The project plan also should be finalized in this phase because the next phase is implantation and no more modifications should be made to the plan during this phase.

Design phase methodology involves the following three steps:

  • Identify network requirements: This is accomplished with the help of the decision-makers, the stakeholders, or the steering committee. Proposals for the conceptual architecture must be defined, followed by another prepare phase.
  • Characterize the existing network: The existing network must be assessed in order to determine necessary infrastructure to meet the requirements previously defined. This step will define what resources exist and what resources need to be procured to meet the goals. The network will be assessed based on functionality, performance, and quality.
  • Design network topology and solutions: The network topology is designed to meet all the business and technical requirements. A detailed design document will be generated in this phase, based on the project plan. This will include design solutions, such as network infrastructure, voice over IP (VoIP), content networking, and intelligent network services (Cisco NetFlow, etc.).

As mentioned earlier, in the design phase, the focus is on the first three phases of the PPDIOO process: prepare, plan, and design.

Identify Network Requirements

Step one of the design phase is to define the network requirements. This process can be made for the company or for their customers and consists of the prepare phase of the PPDIOO lifecycle model.

In this phase, you will identify current and future applications and their importance in the organization. For example, e-mail is considered a critical system, but different applications have different priorities in the organization. The applications and services must be analyzed, along with the data plane traffic (i.e., traffic that moves from client to client or from client to server, not traffic destined to network devices).

The next step is to examine how the identified network applications and services map to the organizational goals. The organizational goals must align with the IT infrastructure, and they must include improving customer support in the case of service providers or improving service desk support if internal users are served. The objectives that must be analyzed in this phase include decreasing the costs and increasing competitiveness in a specific field or industry.

Next, the network designer must define the possible constraints in meeting the organizational goals. These might include the following:

  • Budget constraints
  • Personnel constraints (the prepare, plan, and design phases might have less resources allocated to them than the implement and operate phases do)
  • Organizational policy constraints
  • Security policy constraints, for example, open source solutions may be preferred to proprietary solutions (EIGRP)
  • Need for external contractors and consultants
  • Scheduling constraints (timeframe)

Note:     Design is one of the most commonly overlooked and unprovisioned areas in network construction, and this issue might lead to a waste of time and money in the end.

After defining the constraints, the technical goals must be defined. These should be aligned with the organizational goals, and they typically consist of the hardware and software that will help meet the organizational goals. The response and throughput of the network should be improved while decreasing network failures and downtime that affect corporate productivity. Network management should be simplified so results and analysis can be obtained quicker and more time can be allocated to incidents and troubleshooting. Network security, availability, and reliability of mission-critical applications (e.g., e-mail or database) also should be improved. Outdated technologies should be updated according to a well-defined plan that includes milestones. Network scalability also should be improved as system evolution and growth is planned.

The technical goals mentioned above might have some constraints, such as a lack of proper wiring capacity to support all the applications or a lack of bandwidth (i.e., FastEthernet links instead of GigabitEthernet links). Another constraint would be having legacy equipment that does not support newer features to meet the organizational and technical goals, or having legacy applications that cannot be replaced and need to be accommodated within the network infrastructure.

The following techniques must be mastered in this process:

Scope assessment: The network designer must decide whether to start with a new network implementation or build upon an existing network infrastructure. With a new implementation, step two of the design methodology (characterize the existing network) is skipped. Another important decision is whether to design the entire enterprise network or just a subset of it (e.g., specific departments). This concerns the modular network design concept. The technologies used also must be determined (LAN, WAN, VoIP, security, etc.). The scope assessment technique is closely related with analyzing the OSI reference model, because it must be determined whether the scope will cover just the Physical Layer and Layer 3 technologies (addressing, NAT, routing, etc.) or also the Application Layer.

Gathering the necessary data: The information for the design phase is generally extracted from certain documents called RFPs (request for proposal) or RFIs (request for information). An RFP is a more formal document sent to vendors, suppliers, or strategic partners to ask them for proposals to help meet a company’s organizational needs with their products or services. On the other hand, the RFI is a more informal document with the purpose of gathering ideas and information from vendors and partners about a specific project or a specific area of the implementation. These different proposals and requests are used for different reasons, including gathering information from existing and potential customers (initial requirements), and following up by creating draft documentation that will describe the initial design requirements. This information must be verified with customers, management, and vendors. This data-gathering process will be revised as necessary as things change within the organization. All the documents (RFPs, RFIs, customer queries, etc.) can be modified based on the feedback received from the stakeholders.

Identifying organizational goals: This technique must always precede the process of establishing the technical goals and means. A network designer must understand what the management considers a success and a failure. In addition, the customers’ expectations must be determined, along with the organizational short-term and long-term goals. Most companies want to use IT and networking tools to lower their expenses, increase their applications and services, and obtain a competitive advantage. From a business standpoint, the infrastructure must be as flexible and as reliable as possible.

Common organizational goals for most companies, despite their size, are as follows:

  • Utilizing available resources efficiently
  • Maximizing profits and revenue
  • Reducing development and production cycles
  • Increasing competitiveness
  • Improving availability of data
  • Enhancing interdepartmental communications
  • Boosting customer support and customer satisfaction
  • Broadening information infrastructure to stakeholders

Identifying organizational limits: This step usually covers the following categories:

Unfortunately, network designers are often forced to find the most affordable solution instead of the optimal technical solution. This means certain things might need to be compromised, such as scalability, manageability, performance, or availability. The available budget should include all the purchases, equipment, licenses, and training. The budget should be the final decision, but in most cases, it is the primary consideration. Network designers must find areas in which they should make compromises in order to improve the overall goals of a specific project and obtain an effective solution.

Another limitation concerns available personnel involved in the project and their expertise. Additional training might be necessary if the available resources are not very technically skilled. In addition, you should analyze the number of contractors and the level of outsourcing in the project. For the implementation and the maintenance phase, adequately trained and technical staff must exist in order to fulfill the organizational goals.

The organizational limits will be dictated by the organizational policies and procedures. This includes what vendors are being used, what standards are in place (e.g., open standards), policies about protocols, and different applications.

The last aspect includes the timeframe, particularly the deadlines that must be met. These organizational limits can make the network designer’s job either easier or more complicated. This includes how long it will take to deploy applications and train users. This part is taken care of by the project manager, who must create milestones for the design and implementation processes.

Identifying applications and services: The next phase in determining the needs of the customer is finding out what applications and services will be used. After discussions with key decision-makers, a detailed analysis must be made that will take into consideration the following aspects:

  • Application category (e-mail, productivity, database, security, web browsers, management, etc.)
  • Application choices for each category (low, medium, high, or critical)
  • The level of importance of the application or service

All of this information can be identified based on a brainstorming session with the stakeholders or team leaders in order to determine the necessary applications and their level of importance.

Reaching technical goals: This technique involves isolating and reaching the technical goals. The network designer should be an expert in determining what these goals should be and how to achieve them under all the limitations of budget, personnel, time, procedures, and policies. A list of some common technical goals includes the following:

  • Maximize performance and productivity
  • Enhance security
  • Achieve reliability for critical core applications (99.9% for most organizations)
  • Reduce downtime
  • Update obsolete hardware and software (depending on the budget constraints)
  • Boost network scalability (modular solutions)
  • Simplify network management

Identifying technical restraints: A successful design engineer must recognize the technical obstacles and restraints in the organizational design. This usually falls into the following categories:

  • Limitations of existing equipment (updates might be required)
  • Availability of bandwidth (mostly related to WAN connections)
  • Compatibility of applications (the use of a single vendor might be required)
  • Adequacy of trained personnel (more training might be required)

Characterize the Existing Network

Step two in the design phase is to characterize or classify the network. This is where the network designer will identify the major features and characteristics of the network, as well as define the tools used to analyze, audit, and monitor network traffic.

Information gathering always occurs in an early phase in any multi-step process, such as in application development or designing the security model. The information gathering process consists of the following three steps:

  • Compile all existing information and documentation.
  • Conduct a network audit.
  • Perform traffic analysis.

Information gathering compiles all the existing information in any form, in any existing documentation. This must happen first to avoid duplicating work, especially work that has already been done by somebody else.

The second step is conducting a network audit with as much pre-information as possible. The network audit might need to be performed by a Certified Information System Auditor (CISA). Network auditing tools should be used, along with the necessary documentation and network management tools (e.g., CiscoWorks, Tivoli, and so on) that will give information about the network’s device inventory, configuration, and status.

The audit must give information about the version of the software used, IOS, management software (e.g., ASDM, SDM, etc.), the configuration on the devices, Layer 1 and Layer 2 information and topology, interface speeds, CPU and memory utilization, WAN types, and VPN types. Manual auditing of the network devices will involve using a wide variety of “ show ” commands on Cisco devices, such as “ show tech-support ” that will generate a huge report on individual systems, “ show version ”, or “ show running-config ”.

Other tools that might be used in the auditing phase include the following:

  • Packet sniffers (e.g., Wireshark)
  • Network Based Application Recognition (NBAR) from Cisco, an IOS tool that helps identify well-know applications, protocols, and services
  • NetFlow, a very popular solution that runs on Cisco and third-party devices that consists of reporting tools that record information about traffic patterns that cross devices

A network checklist is useful in the auditing phase. This should include available topology segments, IP addressing schemes, or WAN connections.

All the tools presented above can be used in the third step of the information gathering phase, which is performing traffic analysis. In this phase, the designer should discover the following:

  • Network response time
  • Available bandwidth
  • QoS mechanisms used, especially when using VoIP
  • Security features implemented, such as segmenting the network using VLANs

Performing traffic analysis might involve a large team that can find the necessary documentation to cover the mentioned analysis tests.

Network designers are often in a situation where the network infrastructure is already in place, and the new design will involve only restructuring or upgrading the existing network implementation. The network designer must review the existing documentation and diagrams that the customer has about the network, get input from different IT personnel, perform some kind of network auditing, define and describe the existing topology, and conduct some traffic analysis.

Five components that describe the network can be defined as follows:

  • Layer 3 topology
  • Layer 2 topology
  • Network services
  • Network applications
  • Network modules

The first step in the process is to obtain a Layer 3 topology of a network from the existing documentation or diagrams. The topology example below in Figure 2.5 shows that the core of the network (backbone) is comprised of high-end routers. Other network areas include the internal server zone, the network management area, the WAN connection, the PSTN connection, the Internet connection, and the DMZ (web servers).

Network Components

Figure 2.5 – Network Components

Important information that can be gathered at Layer 3 includes routing protocols (e.g., EIGRP, OSPF, etc.) used in the network core or at the edge, the Internet connection capacity, applications that are accessed through the Internet, and WAN connection type and capacity (e.g., Frame Relay, ATM, etc.).

The Layer 2 topology map can be a separate map or it can be built by adding elements to the existing Layer 3 topology. The recommendation is to isolate and document the network areas based on shared bandwidth capacity (e.g., GigabitEthernet or FastEthernet) and the switches used at different layers (e.g., Access Layer, Distribution Layer, and Core Layer). Layer 2 technologies also include the WAN connections (e.g., Frame Relay, ATM, etc.) that might connect the company branch offices.

The next step is to isolate the network services and map them into a separate document as follows:

  • Domain name services: DNS
  • Network management services: SNMP, TFTP
  • Security services: TACACS, access lists on the routers, IPSec, NAT
  • Routed protocols: IP, IPX
  • Routing protocols: EIGRP, OSPF

The fourth aspect includes the applications that run on the network, such as the following:

  • File sharing applications (FTP)
  • Web applications
  • E-mail applications
  • Instant messaging
  • IP Telephony
  • Microsoft Exchange
  • Multicast applications

Once the Layer 2 and Layer 3 network topology, the network services, and the applications have been identified, the gathered information must be divided into logical modules in order to obtain a modular design. Based on the depicted topology in Figure 2.6 below, the following modules might be of interest:

  • Backbone module
  • Network management module
  • PSTN access module
  • Corporate Internet module
  • Public access module
  • Internal server farm
  • LAN (Access Layer) module

Modular Network Map

Figure 2.6 – Modular Network Map

The next step is identifying the components and proprieties for each network device (e.g., router, switch, firewall, etc.). This includes the following:

  • Device model
  • Utilization
  • IOS version
  • Device configuration
  • Routing tables
  • Modules/slots

This information can be obtained from the IT staff, or it can be gathered individually by accessing the network management station and connecting to each network device in the topology.

Note:     The process of gathering configuration and performance information about a specific network device is also called device auditing. The Cisco solution for network auditing and monitoring is called CiscoWorks.

A network designer might also need to use network analysis tools in order to find information about traffic flows, QoS techniques, security information, traffic profiles, and the way certain applications and protocols use the available traffic. Some of the tools that can be used in this regard are the Cisco NetFlow analyzer tool or the Wireshark packet capturing tool (sniffer). The screenshot below (Figure 2.7) is an example of a Wireshark FTP capture session.

FTP Session Packet Capture

Figure 2.7 – FTP Session Packet Capture

The last step in describing the existing network is to combine the created Layer 2 and Layer 3 topology maps with the discovered services and applications, and create a summary report that can be presented to key decision-makers and policy-makers within the organization. This document can include the following:

  • Number and type of devices
  • IOS version used
  • Memory capacity and upgrade recommendations
  • Discovered points of congestion and recommendations
  • Suboptimal paths and recommendations
  • Routed and routing protocols and upgrade recommendations
  • Survey of applications and services
  • Impact assessment (cost, personnel, time, etc.)

Design Networking Topology and Solutions

The third step of the design phase is designing the networking topology and solutions. An effective approach for this is a structured design (Figure 2.8) that allows you to develop a complete system with an optimum design at the lowest cost, while meeting all of the following customer requirements:

  • Flexibility

Design Network and Topology Solutions

Figure 2.8 – Design Network and Topology Solutions

The network designer’s goal in this phase should be to develop a systematic approach that takes into consideration the business’s needs; the organizational goals, policies, and procedures; the technical goals and constraints; and the existing and future network infrastructure. This includes physical models, logical models, and functional models.

The best approach in this phase, and the one recommended by Cisco, is the top-down approach, which is suitable for a medium-sized network to a large enterprise campus design. Using this approach ensures that you have an overview of the design before focusing on the design details. This basically means beginning with Layer 7 of the OSI model and then moving down from the Application Layer to the Presentation, Session, Transport, Network, Data Link, and Physical Layers.

The network and physical infrastructure should be adapted to the needs of the network applications and services. In other words, you should not choose your network devices or your hardware and software technologies until the requirements for the applications are fully analyzed and met.

The concepts of SONA and IIN should also be incorporated into the design process and combined with the business’s needs and organizational requirements. This includes considering issues such as organizational and technical constraints.

The top-down approach is usually a very time-consuming process and a bit more costly, but it is preferred over bottom-up solutions, where the design is based on previous experience and you are just looking for a quick fix or solution. The problem with the bottom-up approach is finding an inappropriate design in the medium- to long-term in which the organizational requirements and constraints are not included. This could result in process rollbacks at later phases of the project.

Note:     To learn more about the Cisco approach to top-down network design, refer to the book Top-Down Network Design, 3rd Edition , published by Cisco Press in 2010.

Figure 2.9 below presents an example of the top-down network approach methodology:

Example of the Top-down Approach

Figure 2.9 – Example of the Top-down Approach

The diagram above starts at the top with applications and services, which includes the Application, Presentation, and Session Layers. Based on the applications’ requirements and needs, and the way they map to the organizational goals, you will apply a network infrastructure and services design to meet the application requirements of the organization. This includes the data, the type of traffic and network services needed, and the type of design that will meet the needs of those applications.

Once the goals are met, the network should be modularized using a modular approach, including the core of the network, the data center, the server farm, the branch, the Distribution and Access Layers, and the Internet connectivity layer. After the network is modularized, you will then apply the decisions made for infrastructure and services to different modular areas of the network by dealing with certain segments of the network at a time.

The next step is to take this modular implementation and create logical subdivisions that will be addressed on a project-by-project basis. From a project management or steering committee standpoint, these will be logical subprojects. Different subprojects might exist for the following:

  • Choosing the technology, acquisition, and provisioning
  • Physical topology design (placing design at different layers)
  • Addressing design scheme, including NAT solutions
  • Routing selection and design
  • Quality of Service design (traffic management)
  • Security design
  • IP Multicast design (for video and audio streaming)
  • IPv6 provisioning design

Design Process: Final Steps

The final steps of the design process within PPDIOO include the following:

Plan the network implementation: This step involves a high degree of documentation and diagramming. A step-by-step procedure must be established for each aspect of the modular design. This must be well documented and detailed, must describe every step (with references to the different documents, diagrams, or reports created), and must include a detailed guideline for implementation. In case of a pitfall or a design failure, the network designer must have a rollback plan in place. In addition, project managers and other staff members must be consulted to give them an estimation of the time required for implementation. Tests must be made at every step in the process and complex procedures must be broken down into smaller pieces, such as when implementing complex technologies, for example, IP Telephony.

Pilot and prototype testing: The network designer must be sure to verify the design once it is completed. This can be accomplished with a prototype or a pilot network involving a sample implementation that helps test the solution. Depending on the solution, some organizations might implement both the pilot and the prototype testing, or just one of them.

A pilot site is a live location that serves as a test site before the solution is deployed. This is a real-world approach to discovering problems before you deploy the network design solution to the rest of the internetwork. A pilot network tests and verifies the design before the network is implemented or launched. It can also be a subset of the existing network infrastructure where the design is tested. The pilot test might take place within a particular module or a particular building or access area before extending the design to other areas.

A prototype is a subset of the full design tested in an isolated environment, unlike the pilot test, which is implemented in the production network. The benefit of using a prototype is that it allows the full testing of the network design before it is deployed, without having any negative effects on the production network. A prototype test is often used before applying a redesign to an existing network.

Note:     Pilot networks are used when building a network from scratch and prototypes are used in redesign situations.

The results of the pilot or prototype tests will be documented in a proof of concept section in the final design document.

A prototype is most often preferable because, generally, some kind of infrastructure already exists and this makes the network designer’s job much easier. Like in other phases, the customer’s needs and requirements must always be at the top of the priority list. Prototype or pilot network implementation has two possible results: it is either successful or it fails the design goals. If the prototype does not meet all the objectives, it is a failure. A success means it has proved the concept of the actual network design, including the planning, preparation, and design phases, which will allow it to move into the implementation phase. Sometimes a success in this step concludes the network designer’s job, who must then hand over the project to the personnel or outside consultants handling the implementation of the hardware and software solutions.

A failure in this phase does not mean the entire project failed. It simply means some corrections must be made to the actual design, after which a prototype test must be repeated until it is considered a success. Any failures that occur during the testing phase allow you to go back to the iterative process and correct either the planning, preparation, or design aspects and repeat the pilot/prototype tests to correct any weakness that might have a negative effect in the implementation process.

Fully document the design : The design document is the final document that will be created, and it is a complementary document to the planning document. The design document should include the following components:

  • Introduction (description of project goals)
  • Design requirements, including organizational and technical constraints
  • Existing network infrastructure (logical Layer 3 topology diagram, physical topology diagram, audit and analysis results, routing protocols, applications and services summary, device list, configuration, and description of any identified issues)
  • Design section (specific design information, logical topology design, physical topology design, IPv4 and IPv6 design, routing protocols, and security configurations)
  • Proof of concept (the conclusion of the pilot/prototype testing phase)
  • Implementation plan (useful in the next phase of the PPDIOO process, presenting the steps that must be followed by the implementation team in order to implement the new system or the network upgrade successfully)
  • Appendix (white paper, case studies, additional information, and configuration)

An example of a design document structure is presented below:

  • Introduction
  • Requirements for the Design
  • Layer 1 Topology
  • Layer 2 Topology
  • Layer 3 Topology
  • Audit Results
  • Recommendations
  • Applications
  • Design Summary
  • Design Details
  • Implementation Details
  • Prototype Details
  • Prototype Results
  • Implementation Plan

This document might be cross-referenced with other documents used during the design process in order to describe fully the proposed solution.

In summary, the design steps presented below can be structured as an eight-step methodology:

  • Recognize customer needs
  • Describe the existing network
  • Design networking and topology solutions
  • Plan the network implementation
  • Construct a prototype network
  • Fully document the design
  • Implement the design
  • Verify, monitor, and modify as needed

From a technical standpoint, in the eight-step design methodology (Figure 2.10), step six (fully document the design) and step seven (implement the design) represent the separation between the network designers and the network engineers that take care of the implementation. In the CCDA context, only the first six steps are of interest to network designers. Steps seven (implement the design) and eight (verify, monitor, and modify as needed) should be of interest to implementation engineers.

Eight-Step Design Methodology

Figure 2.10 – Eight-Step Design Methodology

Designing Network Management

After the implementation phase, each network needs to be maintained at proper parameters by monitoring and management tools and processes. This section will cover the basic techniques used to deploy solid network management solutions.

Network Management Essentials

Simple network management protocol.

The network management system is usually based on the Simple Network Management Protocol (SNMP), which is a TCP/IP Application Layer protocol that uses IP within UDP. SNMP is used to share management information between network devices, usually between a management workstation and routers, switches, or other devices, as illustrated in Figure 2.11 below.

Network Management Using SNMP

Figure 2.11 – Network Management Using SNMP

SNMP has evolved over the years and has now reached version 3 (SNMPv3). Network designers should demand that every environment uses SNMPv3, instead of the older unsecured SNMP versions 1 and 2, because of the advanced security features it provides. SNMP is used by network administrators and engineers to accomplish the following:

  • Control network performance
  • Troubleshoot
  • Plan scalable enterprise solutions and intelligent services

SNMP accesses detailed information in Management Information Bases (MIBs) and it uses SNMP agents. The MIB is an object-oriented hierarchical database system stored locally on the network device. An example of a MIB entry is 1.3.6.1.2.1.2.2.1.20.0, with 1 being the root of the MIB tree and 0 being the final leaf.

The SNMP agent is used to send and receive information from the device to the Network Management Station (NMS), and vice versa. In order to do that, different types of SNMP messages are used. The NMS will run some kind of network management software (e.g., CiscoWorks) that retrieves and displays the SNMP information in a Graphical User Interface (GUI) format. The displayed information is used for controlling, troubleshooting, and planning.

Another SNMP concept is represented by community strings, which is the access control method. A community is a password that controls what group of people has access to certain information on the device.

The managed device contains the SNMP agent and the MIB that stores all the information. Different types of messages are used in order to get information from the NMS to/from the managed device (i.e., the monitored device), as shown below in Figure 2.12.

SNMP Messages

Figure 2.12 – SNMP Messages

The first message is called the Get Request. This is sent to the managed device when the NMS wants to get a specific MIB variable from the SNMP agent that runs on that device. The Get Next Request information is used to return the next object in the list after the Get Request message returns a value. The Get Bulk message works only in SNMPv3 environments, and it can be used to retrieve a large chunk of data (e.g., an entire table), reducing the need to have to use many Get Request and Get Next Request messages. This in turn reduces the overhead on bandwidth utilization on the link.

The Set Request message is sent by the NMS and is used to set a MIB variable on the agent. The Get Response message is the response from the SNMP agent to the NMS Get Request, Get Next Request, or Get Bulk messages.

A Trap is used by the SNMP agent to transmit unsolicited alarms to the NMS when certain conditions occur (e.g., device failures, state changes, or parameter modifications). Different thresholds can be configured on the managed device for different parameters (e.g., disk space, CPU utilization, memory utilization, or bandwidth utilization), and Traps are sent when the defined thresholds are reached. SNMPv3 introduced another message called the Inform Request. This is similar to a Trap message and is what a managed device will send to the NMS as an acknowledgement to other messages.

Note:     SNMPv3 is defined by the following RFCs: RFC 2571, RFC 2572, RFC 2573, RFC 2574, and RFC 2575.

SNMPv3 provides the following security levels:

  • NoAuthNoPriv: No authentication and no privacy mechanisms
  • AuthNoPriv: Authentication (MD5, SHA) but no privacy mechanisms
  • AuthPriv: The highest level of security; uses authentication (MD5, SHA) and privacy (DES)

Remote Network Monitoring

Remote Network Monitoring (RMON) is actually a management information base that allows you to monitor LAN traffic in the network environment proactively. It tracks individual data packets, and the number and size of those packets, as well as broadcast packets, network utilization, errors, and statistics.

RMON agents run on various network devices, such as routers, switches, or servers. If you do not want to run RMON on those specific devices because of the overhead, you can configure special RMON workstations as probes on specific network segments. RMON offers the possibility to diagnose faults within the LAN, which allows network tuning and planning for growth and utilization.

RMON is implemented in two versions, RMON 1 and RMON 2. RMON 2 is the most recent version and it offers more functionalities. RMON 1 operates only at the Physical and Data Link Layers, so it must be used only to probe, tune, plan, and search for faults on hubs (at the Physical Layer) and switches (at the Data Link Layer). RMON 2 provides much more functionality and can be used for Network Layer (Layer 3) applications, as well as for Layers 4 through 7. RMON 2 can also monitor database servers, exchange servers, e-mail, and web traffic.

Note:     RMON is documented in RFC 1757.

A better solution to RMON in a Cisco environment is to use the proprietary solution called NetFlow. NetFlow is a monitoring and measurement technology that is superior to a simple SNMP/RMON solution, providing much more detail on the data that passes through a specific interface. NetFlow scales to a large number of interfaces and this makes it a great enterprise solution.

NetFlow is also a great solution for service providers because it supports customer service programs, and uses popular data warehousing and data mining solutions that are critical for competitive vendor offerings (e.g., flexible accounting and billing that can consider application usage, the time of day, the bandwidth utilization, or QoS elements). NetFlow is also a great tool for network scalability planning and overall analysis, as it can help lower the organization’s TCO.

The NetFlow management architecture (Figure 2.13) consists of the following components:

  • NetFlow data export service
  • NetFlow flow collector service
  • NetFlow data analysis

NetFlow Management Architecture

Figure 2.13 – NetFlow Management Architecture

Data export service is at the top of the three-tier NetFlow architecture. This is where the data warehousing and data mining solutions occur. It captures the accounting statistics for traffic on the networking devices and it uses UDP to export data. This is a three-part process, which includes the following:

  • Data switching
  • Data export
  • Data aggregation

The data is then exported to the second tier, the NetFlow flow collector service. At this level, using servers and workstations, you can complete actions such as data collection, data filtering, aggregation, data storage, and file system management using existing or third-party file systems.

Network data analysis is at the lowest tier, at the Access Layer. At this level, you can use network planning tools, overall network analysis tools, and accounting and billing tools, and you can export data to various database systems or Excel spreadsheets.

Cisco Discovery Protocol

Cisco Discovery Protocol (CDP) is a proprietary Cisco protocol that operates at Layer 2 (Data Link) between Cisco devices. Its main job is to summarize information it discovers about directly connected routers, switches, or other Cisco devices. The Cisco devices themselves do not forward any CDP frames to their other neighbors because their role is to share device information only between directly connected devices.

CDP is media and protocol independent, and it operates with TCP/IP, IPX, or AppleTalk. It can also run across different media types, such as LANs, ATM, and Frame Relay networks. Running CDP on external Internet connections is not recommended due to security issues (i.e., you should not expose information about your devices to outside users). In addition, it should not be configured on links going to non-Cisco devices because it is unnecessary.

Running the “ show cdp neighbor ” command on a device will give CDP-related information such as the following:

  • MAC address of the directly connected neighbor
  • Local interface connecting to that particular neighbor
  • Information about the device type (router, switch, or other)
  • Device platform/mode
  • Port numbers

FCAPS Network Management Model

This section discusses the International Organization for Standardization (ISO) network management model, called FCAPS, which represents the following:

  • F ault management
  • C onfiguration management
  • A ccounting management
  • P erformance management
  • S ecurity management

Fault Management

The first functional area of the FCAPS model is fault management. This area deals with error conditions that can cause administrators and users to lose functionality, resulting in not being able to use certain network resources. This is a key area for network management.

Fault management activities include finding abnormal network operations, and isolating and correcting the faults that occur. This is accomplished in the following five steps:

  • Detect the problem.
  • Diagnose the fault.
  • Bypass and recover.
  • Resolve the situation.
  • Track and manage the problem.

The two main components of fault management (Figure 2.14) are as follows:

  • The event generators (devices that generate the events, such as routers, switches, access servers, hosts, etc.)
  • Event collectors (devices that receive SNMP/Syslog messages from the event generators); event collectors, also called event management systems (EMSs), can be third-party servers or CiscoWorks machines

Fault Management

Figure 2.14 – Fault Management

The events sent from the event generators to the event collectors can be one of the following:

  • State events, sent when a network device changes its state (a link goes down due to a configuration change, changes in the routing protocols, etc.)
  • Performance events (disk space usage, link errors thresholds, high CPU utilization, etc.).

Once the event generator produces events, they are collected and processed by the EMS (CiscoWorks). This follows a five-step process outlined below:

  • Event collection
  • Event normalization (normalizing Syslog events based on their timestamps)
  • Event filtering (ignoring low priority events)
  • Event correlation
  • Event reporting (in a text or GUI format)

Configuration Management

The configuration management area of FCAPS is the process of collecting different information on the network, driving consistency throughout all the network devices, tracking changes in the network, and ensuring network documentation is up to date (e.g., from Cisco.com or other standardization organizations), using the most recent versions.

The configuration management process also includes tracking and storing software versioning of all the network devices, and making sure the most recently updated IOS and the most recent software builds are used for all of the systems. It also allows the availability of improving all the devices, with the overall goal of configuration management to lower the time and cost overhead. For example, by building an efficient configuration management system within CiscoWorks, you can lower the TCO of the network infrastructure because fewer administrators will be required to work on those specific tasks.

Configuration management includes activities such as documentation, configuring control settings in the Cisco IOS, object mapping (ensuring objects are properly managed and associated), overall data collection for configuration information (configuration files on a server that can be downloaded via TFTP) and change configuration, and ensuring the TCO is lowered by being able to track all the network devices’ configuration changes. These activities are then stored in a database or presented in a GUI format within CiscoWorks.

CiscoWorks ensures that the organization complies with the newest standards by keeping up with the software versioning and updates, ensuring standard IP addressing and naming convention (DNS) schemes are used, and ensuring that an efficient DHCP process is in place. In addition, by using CiscoWorks, you can ensure that the organization uses standard configurations that are compatible with other companies and that configuration upgrades are in place. Moreover, a step-by-step procedure should exist for making configuration changes on the network devices. This can be accomplished using CiscoWorks templates to make the process easier.

Accounting Management

The accounting management area usually uses AAA services. There are a few different approaches regarding accounting management, for example, intra-organization management or inter-organization management.

If the AAA services are implemented within the company, you need to make sure people are who they claim to be when they try to access an object or do something on a device. Then you must authorize what they can do with those objects or devices. After that, you must account for what activities they engage in, sometimes for billing purposes.

Account management helps manage resources between the individuals in the company, security groups, different departments, and business entities to track expenditures, for example, or for security auditing. It can also be used for helping departments stick to their budgets and ensuring that everyone has enough resources for their types of networking activities (e.g., IP Telephony, multimedia applications, or video-conferencing). The overall goal of accounting is to measure and regulate network utilization. As mentioned, the accounting process will have a different purpose when used inside the company than when used between companies (e.g., an ISP scenario).

An ISP would use the accounting management aspect to offer flexible billing plans to their customers and to track the usage of network resources on a customer-by-customer basis. This allows network administrators to retrieve, display, and create bills for their customers.

IP accounting is based on the source or destination IP addresses, or on the IP precedence value in the IP header, when using QoS technologies in order to attain granularity. Other aspects of IP accounting include the data type, the number or size of the packets, MAC addresses, and violations to access control list settings using event logging.

The accounting management process is typically carried out with a RADIUS or TACACS+ server, especially for the authentication and authorization parts. The NetFlow solution mentioned earlier also provides powerful accounting services with its NetFlow collector, accounting, and billing applications.

An example of using the accounting management solution would be within a VPN remote access module on the enterprise edge to account for and to audit the company dial-up connections and the sessions on the WAN and ISDN links.

Performance Management

The performance management area is usually managed by a system administrator or by a network administrator/engineer. Nevertheless, the network designer should ensure that the organization has performance management techniques in place so that overall management guidelines are followed.

The goal of performance management is to keep the network uncongested 24/7, with all the devices accessible. Another goal is to reduce overhead and downtime (a recommended target to achieve is 99.9% network uptime). An important part of performance management is to provide service-level management (SLM) or service-level agreements (SLAs) established with the customers. This is a proven methodology to ensure that you can deliver the promised services to the organization, to individual departments, to business services, and to customers (in the case of ISPs).

Part of performance management is to identify trends in network operations, such as the usage of bandwidth, application usage, and other support services and intelligent services, as well as performing a “what-if” analysis. This means finding the optimal level of operations for the company. Another step in this process is creating baselines of activity within the organization with the help of system engineers, as a point of reference in order to analyze deviations from normal network behavior (e.g., peak activity for bandwidth and applications). This aspect is related to a concept called exception management, which creates a baseline of activity (thresholds of normal activity) and figures out when exceptions (violations of the thresholds) will occur and what those exceptions will be (e.g., peak CPU utilization or exhaustion of other resources).

Performance management also includes QoS management. This is important, especially for an ISP that offers solutions such as IP Telephony, multicasting, or video-conferencing. The implemented QoS techniques should be managed, including the way packets are prioritized as they travel through the network. This includes concepts such as Committed Access Rate (CAR) or Class Based Weighted Fair Queuing (CBWFQ), using queuing mechanisms to achieve QoS.

When a violation in performance is detected, the network staff must be able to fix that particular issue as quickly as possible and with little impact on the users in the organization.

Security Management

The last area of FCAPS is security management. The goal of security management is to ensure that you have access control to network resources, and you can prevent intentional or accidental changes to a particular object or device and unauthorized access to sensitive corporate information.

Some of the protocols and tools that can be used within security management on the routers, switches, and other devices include the following:

  • Telnet and SSH for connecting to the devices (SSH is preferred due to its encryption abilities)
  • SNMP for management and monitoring of the device parameters (SNMPv3 is preferred due to its authentication and privacy features)
  • HTTP and HTTPS for web access to the device
  • RADIUS and TACACS+ for authentication and authorization

More information about assessing the security within the network design will be presented in Chapter 8.

SLA Resources

Many companies, vendors, and service providers must provide service-level contracts (SLCs) to their partners or customers. A service-level agreement (SLA) is a component of the overall service level contract.

The SLC designates connectivity and the performance level that the service provider guarantees to its customesr and the organization guarantees to its end-users. The SLA defines specific parameters and performance measurements between devices (e.g., routers, servers, workstations, or other equipment).

The main resource regarding Cisco SLA concepts is the Cisco SLA portal www.cisco.com/go/saa , where the following white papers containing information about implementing SLCs can be found:

  • Service-Level Management: Best Practices
  • Deploying Service-Level Management in an Enterprise
  • Service-Level Management: Defining and Monitoring Service Levels in the Enterprise

Network design includes the following features:

  • Manageability

The Cisco Intelligent Information Network (IIN) is a complete architecture that consists of the following phases:

  • Integrated transport: Voice, data, and video converged into a single transport
  • Integrated services : Services such as VoIP or storage networking that rely on the underlying network transport mechanism
  • Integrated applications: Applications (e.g., Cisco IP Communicator) leverage services (e.g., VoIP) that rely on network transport

The Cisco architectural approach to designing an IIN is the SONA framework, which contains the following layers:

  • Network infrastructure layer
  • Infrastructure services layer
  • Application layer

SONA offers the following benefits to network design:

Cisco categorizes the network lifecycle into six phases identified within the PPDIOO concept. The components of PPDIOO are as follows:

PPDIOO’s lifecycle approach offers the following benefits:

  • Reduces total cost of ownership (TCO)
  • Improves network availability
  • Allows business networks to respond quickly to changing needs
  • Accelerates access to network applications and services

Designing a network in conjunction with the PPDIOO approach involves the following steps:

  • Identify customer requirements: To identify customer requirements, the following information must be obtained:
  • Business goals
  • Constraints imposed by the customer
  • Technical goals
  • Constraints imposed by technical limitations
  • Characterize the existing network : To identify characteristics of the current network, the following tasks must be completed:
  • Collect existing network documentation (with the understanding that the documentation might be somewhat dated and unreliable) and interview organizational representatives to uncover information not available in the documentation.
  • Conduct a network audit to identify information such as network traffic types, congestion points, and suboptimal routes.
  • Supplement the information collected in the two previous tasks by performing a network traffic analysis with tools such as Cisco Discovery Protocol (CDP), Network Based Application Recognition (NBAR), NetFlow, Network General Sniffer, Wireshark, or Remote Monitoring (RMON) probes.
  • Design the network topology : Using information collected in steps one and two, network design can be completed. Although designing a network can be a daunting task, Cisco’s recommended top-down design approach assists the network designer by breaking down the design process into smaller and more manageable steps. The term top-down refers to beginning at the top of the OSI reference model (i.e., the Application Layer) and working your way down through the underlying layers.

Using a top-down design strategy, as opposed to a bottom-up design strategy (i.e., where the design begins at the Physical Layer of the OSI model and works its way up), provides the following benefits:

  • Does a better job of including specific customer requirements
  • Offers a more clearly articulated “big picture” of the desired network for both the customer and the network designer
  • Lays the foundation for a network that not only meets existing design requirements but also provides for scalability to meet future network enhancements

When using the OSI reference model in the top-down design approach, the network designer should determine what design decisions, if any, are required for each of the seven layers. For example, when considering the Application Layer, the network designer might determine that voice applications such as the Cisco IP Contact Center and the Cisco Unity converged messaging system are applications needed for the design.

Network Layer design decisions might include the selection of a routing protocol (e.g., Enhanced Interior Gateway Routing Protocol [EIGRP] or Open Shortest Path First Protocol [OSPF]). In addition, when analyzing the Network Layer, the network designer might need to determine an appropriate IP addressing scheme for the network (e.g., the use of private versus public IP addresses and subnet masks to be used) to provide for future network scalability.

Physical Layer and Data Link Layer design decisions might involve the selection of LAN/WAN technologies (e.g., GigabitEthernet, FastEthernet, Frame Relay, ATM, or PPP) to provide media transport.

With the multitude of design decisions required in larger networks, network designers often benefit from network design tools such as the following:

  • Network modeling tools: Generates suggested configurations based on input information, which can then be further customized (e.g., adding redundancy or support for additional sites)
  • Strategic analysis tools: Enables a network designer to experiment with various “what-if” scenarios and observe resulting network effects
  • Decision tables: Records design decisions based on network requirements
  • Simulation and verification tools/services: Verifies design decisions in a simulated environment to reduce the need to implement a pilot network

Even with the availability of simulation tools, some network designs still benefit from building a small prototype network to serve as a proof of concept. An alternative to prototype networks, which are usually implemented in an isolated environment, is building a pilot network, within a specific network module.

After the implementation phase, each network must be maintained at proper parameters by monitoring and management tools and processes. Basic techniques related to network management include:

FCAPS is an ISO network management model that comprises the following elements:

content-filler

This site has been created to help you make the best out of your IT career. Whether you are trying to get your first job, get promoted, or start your own IT business, we have a course for you.

MOST POPULAR

  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses

Secure Site

website security

network methodology proposal

How to Design a Network: 6 Best Practices for Success

Picture of Makenzie Buenning

  • by Makenzie Buenning , IT Editorial Expert reviewed by Stan Hunter , Technical Marketing Engineer
  • Last updated October 16, 2024

Featured image for SCCM vs WSUS: What You Need To Know

What is network design?

Network design, or network topology , is planning and mapping out the infrastructure of an IT network. It requires identifying the various design requirements of the network and creating a plan that is both aligned with those requirements and can be successfully implemented. Network design is necessary because individual organizations will have unique requirements for their computer network.

A network provides a way for many computers to all be connected and exchange data with each other simultaneously. It allows members of organizations to quickly complete tasks, share information, and carry out any computing responsibilities that rely on a working network. It’s important for each organization to ensure that their network design is suitable for their needs.

How to design a network

Designing a functional network for your organization will lead to smoother computer tasks and efficient business operations. Here are five key steps for how to design a network:

Write down network design requirements

Each individual network may have slightly different requirements, which depend on the size of an organization and the operations that will be carried out using the network. Consider if the network will serve users that are all on the same floor with a local area network (LAN) , or whether the network will span a couple of levels. The network might also need to reach across campus or even miles apart with a campus area network (CAN) or wide area network (WAN).

Choose necessary devices

Determine the hardware and software that will be used within your network. A few standard network devices include things such as network servers , a reliable internet connection, modems, routers, and firewalls. The types of computers that will be connecting to the network, the operating system, applications, and more all have an effect on the network as a whole, so it is important to choose ones that are compatible with each other.

Decide the type of network topology

There are many various types of network topology, so you should choose one that will meet the needs of the organization and allow operations to be effectively completed. Network topology types include ring, star, bus, mesh, tree, and more. Whatever your network needs are, these types can be used or modified to help you reach your organization’s network standards.

Map out network connections

Draw the connections that will need to be made within your network. You will want to have a network specialist either review the connections or map out the connections to ensure that it is successful and doesn’t lead to connectivity issues.

Create a plan for successful network design implementation

Once the network design has been completed, begin making preparations for implementing the design in your IT environment. A great network design will only be helpful to your organization if it is executed properly. After the design has been implemented, you can use network monitoring tools to ensure your design functions well.

6 best practices for network design

Here are six best practices for your organization’s network design:

1) Simplify

The best network designs have simple and straightforward connections, and everything in the design serves a specific purpose. Avoid adding unnecessary components to your network or making unnecessary connections. This will make it easier to set up, operate, and restore if ever needed.

Install firewalls to protect your organization’s network. The firewall allows you to view and prevent traffic coming to and from your network on your various endpoints. Depending on the size of your organization, you may need a few firewalls, or one might be enough.

3) Document

Record your network design and store it in your IT documentation . Company SOPs and other instructions related to the setup and operation of your network should also be documented. If anything needs to be altered, or fixed, something goes wrong with your network, or if your IT environment goes into full disaster recovery, you will have documentation provided to help you restore and operate your network.

4) Consider scalability

As your business grows, you will want to have your network grow with it to accommodate the growing needs of the company. Functionally design your network now so it has the ability to work well now and also change and evolve in the future.

Continually monitor your network to ensure that all devices are working properly. Active monitoring supports network uptime because it gives you clear visibility of what is operating efficiently and what might be lacking. If you can determine areas of weakness in your network design early on, you can fix those issues and update the design in your organization’s documentation.

6) Make changes as needed

Just because a network design has been finalized does not mean that it is unalterable. If a certain aspect of your network design isn’t working as effectively as originally planned, analyze a few network design examples and make changes to your design.

Set a solid foundation for your IT environment with network design

Designing a network is a crucial first step in creating a functional network for your organization. With the help of knowledgeable network experts combined with careful planning and preparation, a reliable network design can be created.

NinjaOne provides network management software so you can track activity and performance to ensure your network design is optimal for your organization. Sign up for a free trial today.

  • Category: IT Ops

You might also like

An image of a staircase.

IT Department Guide: How to Reduce IT Expenses Without Compromising Service

An image of a money tree.

Guide: Tips and Best Practices for IT Budgeting

A group of individuals with their devices.

Complete Guide: Benefits of Integrated IT Management Systems

A group of people putting puzzle pieces together.

9 Common Integration Issues and How to Solve Them

Cost Guide: How to Manage IT Costs Effectively blog banner image

Cost Guide: How to Manage IT Costs Effectively

network methodology proposal

Network File System (NFS): Overview & Setup

Ready to become an it ninja.

Learn how NinjaOne can help you simplify IT operations.

See NinjaOne in action!

Start your 14-day trial

No credit card required, full access to all features

network methodology proposal

NinjaOne Terms & Conditions

By clicking the “I Accept” button below, you indicate your acceptance of the following legal terms as well as our Terms of Use :

  • Ownership Rights : NinjaOne owns and will continue to own all right, title, and interest in and to the script (including the copyright). NinjaOne is giving you a limited license to use the script in accordance with these legal terms.
  • Use Limitation : You may only use the script for your legitimate personal or internal business purposes, and you may not share the script with another party.
  • Republication Prohibition : Under no circumstances are you permitted to re-publish the script in any script library belonging to or under the control of any other software provider.
  • Warranty Disclaimer : The script is provided “as is” and “as available”, without warranty of any kind. NinjaOne makes no promise or guarantee that the script will be free from defects or that it will meet your specific needs or expectations.
  • Assumption of Risk : Your use of the script is at your own risk. You acknowledge that there are certain inherent risks in using the script, and you understand and assume each of those risks.
  • Waiver and Release : You will not hold NinjaOne responsible for any adverse or unintended consequences resulting from your use of the script, and you waive any legal or equitable rights or remedies you may have against NinjaOne relating to your use of the script.
  • EULA : If you are a NinjaOne customer, your use of the script is subject to the End User License Agreement applicable to you (EULA).
  • There are no suggestions because the search field is empty.
  • Managed Services
  • Wired Networks
  • Wireless Networks
  • Structured Cabling
  • Cybersecurity
  • Network Analytics
  • Physical Security
  • Enterprise Mobility
  • Services Overview
  • Higher Education
  • Large Venue
  • Manufacturing
  • Warehouse / Logistics
  • Cable Products
  • Servers & Storage
  • Environmental Sensors

search

What Needs to be Included in a Network Design Proposal?

network methodology proposal

When the time comes to make some changes to your network capabilities, and you’re tasked with evaluating network design proposals aimed at delivering  the most suitable, cost-effective solutions , it’s important to make sure you’re not overlooking any essential factors. If you don’t know exactly what you should be looking for from a prospective provider, the process is apt to become complicated and frustrating, and you’re unlikely to end up with the outcomes you’re expecting.

A network upgrade or implementation project affects your budget and your operations, so you want to make sure that you’re considering all necessary components and enabling a smooth undertaking with  a provider that’s fully equipped to meet your needs.  The best way to prepare for this effort is to educate yourself on the key aspects of a solid network design proposal.

Is your WiFi up to snuff? Take our free wireless assessment to evaluate the  strength and ability of your network.

In this article, you’ll get a clear picture of what you need to consider as you assess each proposal, and learn how to select one that’s poised to return the positive results you’re seeking. Consult this outline of key network design proposal inclusions to determine  which provider can deliver the most value and fulfill all of your requirements.

Analysis and Problem Identification

This section is the foundation of the entire proposal, as it shows an understanding of the reasons why you need a network design in the first place. A prospective provider can’t begin to  map out where your network should be headed  until they completely comprehend the details surrounding your current situation. Make sure the proposal reiterates an awareness of the following issues:

  • Whether you have an existing network or are implementing one from scratch
  • How many users are expected to utilize the network and in what capacities
  • What the entire scope for your network is, including location(s) and number of buildings
  • What your user profiles look like
  • What types of systems and applications will rely on network usage
  • Any user priority levels
  • The types of data that will be transmitted
  • The level of security that is necessary for your specific industry and operations
  • Your storage and speed requirements
  • Your scalability needs
  • Long term total cost of ownership (TCO)
  • Impact on the business if the network has an outage
  • The level of ongoing maintenance and support you are seeking

Unless the provider has a holistic view of these components, you may end up with inaccurate quotes or expend lots of wasted time and effort. Furthermore, if you are upgrading an existing network, it will be essential for the provider to complete a full  network assessment  to perform an even deeper audit of your network needs, including factors such as:

Capabilities and Shortcomings

What are the strengths and weaknesses of your network? What are the sources of any interference? Where are the areas of user density? Which applications are expending the most bandwidth? Which devices are causing the most congestion? Where are the current bottlenecks?  Where are potential bottlenecks based on the upgrades being implemented? What aspects are your network designers and managers already doing right?

Bottlenecks Causing Performance Problems

What’s leading to your network bottlenecks? Are they being impacted by outdated hardware, the number of users during peak times, specific locations of high density, or specific applications (business or non-business? What type of connections (such as fiber optic, copper, etc.) are being utilized? Are there issues with equipment installation or network devices (e.g., routers)? Where can bottlenecks be freed up for improved performance and strengthened infrastructure security?  Was one part of the network upgraded, thereby moving the bottleneck to another sector of the network?

Inventory of Hardware and IT Assets

What do you already have? What do you need? What’s there that shouldn’t be? Is there hardware on the network that is slowing things down or causing security gaps due to its age? Is there any firmware that needs to be updated? What hardware and devices are running on your network? Which ones are unsafe or come with unnecessary vulnerabilities?  Are there outdated drivers, or older software revisions that are not taking advantage of newer protocols or releases?

Proposed Actions

Based on the provider’s analysis and problem identification, they should be able to outline recommendations and proposed solutions. The action items in this section will vary depending on your specific situation, but some of the ones you will likely need to take under consideration include:

  • Whether your network’s bandwidth is sufficient for your needs and goals or whether it requires an upgrade
  • A possible increase in the number of access points in your network infrastructure
  • A cabling solution that can carry your network through the next 5-10 years before it becomes obsolete
  • Options to beef up security measures
  • Vital changes to your BYOD policy
  • Ways to alleviate the pressure on IT staff and make their jobs more efficient and effective

This section may also offer a diagram of the proposed network design, illustrating  how the provider plans to create an infrastructure that will support your stated needs and address the challenges exposed in their network assessment.

Proposed Products

In order to execute a network installation or upgrade, various products will need to be purchased and employed. Whether old equipment needs to be replaced or new products are needed to fulfill a requirement, there should be an explanation of these recommendations for you to consider, including:

  • Explicit reasoning for the product
  • Technical capabilities
  • Quantity, cost and availability
  • Warranty and maintenance information

From initial network assessment and site survey to full implementation and ongoing maintenance, a network design proposal should lay out a full timeline of expected events and roll-outs. A provider’s ability to carry out these plans and services in a reasonable time frame, one that minimizes the burden or impact on your daily operations, will be a key factor in  your decision-making process.

With all of these recommendations, proposed products and provider man hours comes the cost of doing business. This is the area your high-level decision-makers will be most interested in, as they’ll want to see a return on the investment.

Is the provider showing a true value proposition and itemizing not just the costs, but also the long-term financial benefit this investment is poised to bring? For instance, the cost of solutions to ramp up security may save your organization from the thousands to millions of dollars incurred from a single data breach.Some of the most important costs you can expect to see in a network design proposal include:

  • New devices and equipment
  • Design implementation and deployment
  • Managed services

Failure to prioritize any of these elements could result in faulty network performance that diminishes the capabilities your organization is equipped to deliver. Be sure to factor these components into your expense projections, and consider  the value each provider proposes  to deliver, so you can make the smartest investment.

Ultimately, the task of deciding how to move forward with your network implementation can be a complex and overwhelming one. The choice regarding which provider can best meet your needs requires a dynamic, multifaceted approach.  Get expert advice and information about how to ease this process and make the best decision for your organization by downloading  Your Guide for Choosing an IT Solutions Partner.

By Craig Badrick

Sign up for the tti newsletter.

COMMENTS

  1. Introducing Network Design Concepts - Pearson

    Objectives. Upon completion of this chapter, you should be able to answer the following questions: What are the benefits of a hierarchal network design? What is the design methodology used by network designers? What are the design considerations for the core, distribution, and access layers?

  2. A Comprehensive Guide to Crafting a Network Design Proposal

    A network design proposal outlines the plan for designing and implementing a new or improved network infrastructure. It includes details on the network’s architecture, topology, security measures, and expected performance.

  3. Network Design Requirements: Analysis and Design Principles

    It is important in any design project that network designers carefully analyze and evalu-ate the scope of the design before starting to gather information and plan network design. Therefore, it is critical to determine whether the design task is for a green field (new) network or for a current production network (if the network already exists, the

  4. Network Design Proposal Template: A Comprehensive Guide ...

    A: A Network Design Proposal Template should include an overview of the current network infrastructure, proposed improvements, hardware and software requirements, security measures, cost estimates, implementation timeline, and potential risks and mitigation strategies.

  5. Network Design and Best Practices - A Guide - Auvik

    Finding the right balance of network performance, security, redundancy, and cost require a unique mix of project management and technical skill. To help you nail your next network design project, we’ll take a deep dive on the topic, provide a basic framework you can follow, and look at some best practices to keep in mind as you go.

  6. Network infrastructure design: planning and implementation

    Discover the key components of network infrastructure design and learn best practices for implementing a scalable and performant network.

  7. Network Design Methodology - howtonetwork.com

    Learn the network design lifecycle from proper planning to design methods. Analyze network protocols and traffic and make intelligent decisions.

  8. How to Design a Network: 6 Best Practices for Success

    Network design, or network topology, is planning and mapping out the infrastructure of an IT network. It requires identifying the various design requirements of the network and creating a plan that is both aligned with those requirements and can be successfully implemented.

  9. Analyzing Business Goals and Constraints of Network Design

    This chapter covers typical network design business goals and constraints and talks about the top-down process for gathering information on goals, and the importance of using systematic methods for network design.

  10. What Needs to be Included in a Network Design Proposal?

    Consult this outline of key network design proposal inclusions to determine which provider can deliver the most value and fulfill all of your requirements.