HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.142 Development of a network realisation plan

S 2.142 Development of a network realisation plan

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrators

When developing a network realisation plan, it is necessary to determine whether a completely new network configuration, or a modification / extension to an existing configuration is required.

During the configuration of a completely new network, the required steps must be inferred from the network concept which has already been prepared (refer to S 2.141 Development of a network concept). Once planning has been completed, the network is set up by laying the required communications cables, configuring rooms for the technical infrastructure, installing the technical infrastructure itself, integrating the necessary coupling elements (bridges, switches, routers etc.), configuring the network management stations, fitting the terminal devices with corresponding network adapters and configuring these terminal devices.

If an existing network is to be modified or extended, the network concept prepared in accordance with S 2.141 Development of a network concept should be compared with the actual situation as described in S 2.139 Survey of the existing network environment. Based on any resulting differences, a realisation plan for network migration can be outlined, taking into account the above-mentioned measures. Here, it must be noted that the greater the deviation between the network concept and the actual situation, the greater the realisation effort.

Example of migrating from a shared Ethernet to a switched Fast Ethernet

Migration from one network topology to another normally takes place in stages. A migration from a shared Ethernet to a Fast Ethernet with switching technology is outlined as an example in the following. Under real conditions however, the constraints need to be checked thoroughly and a special migration concept needs to be prepared for each individual case.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home