Your network infrastructure is the foundation upon which every other technology decision rests. Email, file sharing, cloud applications, VoIP phone systems, security cameras, printers, point-of-sale systems — every single one depends on a reliable, well-designed network. For a growing UK business, getting the network right is not just a technical consideration; it is a strategic one that directly impacts productivity, security, and the ability to scale.
Yet network planning is one of the most commonly neglected areas of IT for small and medium-sized businesses. Too often, the network grows organically: a consumer-grade router from the ISP, a cheap switch bought from Amazon, Wi-Fi access points added haphazardly as the team expands. The result is a fragile, poorly performing network that becomes increasingly difficult and expensive to fix as the business grows. This guide provides a structured approach to planning network infrastructure that will serve your business well today and scale comfortably as you grow.
Start with the Internet Connection
Every business network begins with its internet connection, and choosing the right one is critical. For a growing UK business, the three main options are standard business broadband (FTTP or FTTC), a dedicated leased line, or a combination of both for redundancy.
Standard business broadband — particularly full-fibre FTTP connections now widely available across UK cities — offers speeds of up to 900 Mbps download and is perfectly adequate for many small businesses. However, the upload speeds are typically much lower (around 100 Mbps), and the connection is contended, meaning you share bandwidth with other premises in your area. During peak times, performance can drop noticeably.
A leased line provides a dedicated, uncontended connection with symmetrical speeds — meaning upload and download are equal. This is essential for businesses that rely heavily on cloud services, video conferencing, or VoIP, where consistent upload bandwidth is critical. Leased line costs have fallen significantly in recent years, with 100 Mbps connections available from around £200 per month in many parts of the UK.
For businesses with 20 or more employees, or those heavily reliant on cloud services, a dual-WAN setup is strongly recommended. This involves having two separate internet connections — typically a leased line as the primary and a business broadband or 4G/5G connection as backup. A properly configured firewall can automatically fail over to the backup connection if the primary fails, ensuring your business stays online. The cost of a backup connection is trivial compared to the cost of a complete internet outage.
Selecting an ISP: Beyond the Price Tag
When choosing an internet service provider for your business, the headline speed and monthly cost are only part of the equation. The quality of the provider's support, the terms of their service level agreement (SLA), and their track record for reliability matter far more in a commercial context than saving a few pounds per month on the tariff.
A business-grade ISP should offer a guaranteed uptime SLA — typically 99.9% for leased lines — with financial penalties if they fail to meet it. They should provide a UK-based support desk staffed by qualified engineers, not a consumer call centre reading from a script. Response times for fault resolution should be clearly defined: for a leased line, you should expect a four-hour fix time as standard, with options to upgrade to a faster response where critical operations depend on connectivity.
It is also worth considering the ISP's network architecture. Providers who own and operate their own core network infrastructure generally deliver more consistent performance than resellers who lease capacity from third parties. Ask prospective providers about their peering arrangements, their network redundancy, and whether they can provide diverse routing to your premises — meaning the physical cable takes a different path to the exchange, protecting you against a single point of failure such as a digger cutting through a duct.
Choosing the Right Firewall
The firewall is the gateway between your internal network and the internet. It is also your first line of defence against cyber threats. Consumer-grade routers — including the ones supplied free by ISPs — are completely inadequate for business use. They lack the processing power, security features, and management capabilities that a business network requires.
A business-grade firewall provides stateful packet inspection, intrusion detection and prevention (IDS/IPS), content filtering, VPN connectivity, traffic shaping, and detailed logging. For UK SMEs, the leading options include Cisco Meraki MX series, Fortinet FortiGate, SonicWall TZ series, and WatchGuard Firebox. Cloud-managed platforms like Meraki are particularly popular because they allow your IT provider to monitor and manage the firewall remotely without needing on-site access.
VPN and Secure Remote Access
For businesses with remote workers, multiple office locations, or staff who travel frequently, the firewall also serves as the gateway for secure remote access. A properly configured site-to-site VPN connects branch offices to your main site over an encrypted tunnel, allowing staff at every location to access shared resources as though they were on the same local network. Client VPN connections allow individual remote workers to securely connect from home or whilst travelling.
Modern firewalls support multiple VPN protocols, but IPSec and WireGuard have emerged as the most reliable options for business use. When planning your VPN configuration, ensure that the firewall has sufficient processing power to handle the encryption overhead for all concurrent VPN connections. A firewall that performs adequately for 20 office users may struggle significantly when 15 of those users connect simultaneously via VPN, as each encrypted tunnel places additional demands on the processor.
It is equally important to implement split tunnelling thoughtfully. With split tunnelling enabled, only traffic destined for corporate resources travels through the VPN tunnel, whilst general internet traffic goes directly to the internet from the user's local connection. This reduces the load on your firewall and improves performance for the remote worker, but it does mean that their internet browsing is not protected by your corporate firewall's content filtering and security policies. For businesses handling sensitive data, full tunnelling may be the safer choice despite the performance trade-off.
For 1-15 users: Cisco Meraki MX68 or FortiGate 40F (£400-£600). For 15-50 users: Meraki MX85 or FortiGate 60F (£700-£1,200). For 50-100 users: Meraki MX105 or FortiGate 100F (£1,500-£2,500). Always size your firewall for where your business will be in 3-5 years, not where it is today. An undersized firewall creates a bottleneck that throttles your entire network.
Structured Cabling: Get It Right First Time
Structured cabling is the physical backbone of your network. Whilst Wi-Fi is essential for mobile devices and flexible working, wired Ethernet connections remain the gold standard for desktop workstations, VoIP phones, printers, servers, and access points themselves. A wired connection provides consistent, full-speed connectivity with none of the interference, congestion, or latency issues that affect wireless.
When planning cabling for a new or refurbished office, install Cat6A cabling throughout. Cat6A supports speeds of up to 10 Gbps over distances of up to 100 metres, providing ample headroom for future needs. Cat5e, whilst still functional, only supports 1 Gbps and is a false economy given the minimal cost difference. Always install more cable runs than you think you need — adding cables after the walls are plastered and the carpet is laid is vastly more expensive than installing them during the initial fit-out.
Plan for at least two Ethernet points per desk position, plus additional points for printers, meeting rooms, and access point locations. Each cable run should terminate in a central patch panel in your comms cabinet or server room, where it connects to your network switches. Label everything clearly and maintain documentation — future you (or your IT provider) will be grateful.
The Comms Room: Your Network's Nerve Centre
Every business network needs a central location where cabling terminates, core networking equipment resides, and connections to the outside world are made. For smaller offices, this might be a wall-mounted comms cabinet in a cupboard or utility room. For larger premises, a dedicated server room is appropriate. Regardless of size, this space deserves careful attention because it houses the most critical components of your IT infrastructure.
Temperature control is paramount. Networking equipment generates heat, and excessive temperatures shorten the lifespan of electronic components and cause intermittent failures that are notoriously difficult to diagnose. Ensure adequate ventilation or, for larger installations, dedicated cooling. A simple temperature monitoring sensor connected to your network can alert your IT provider if the room temperature exceeds safe limits — an inexpensive insurance policy against costly equipment failures.
Physical security should not be overlooked either. Your comms cabinet or room should be locked, with access restricted to authorised personnel. An unprotected network switch provides trivial access to your entire network for anyone who can plug in a cable. Keep the space tidy and organised, with cables neatly managed using cable trays and Velcro ties rather than cable ties, which damage patch cables when removed. An unruly comms cabinet is a hallmark of an unmanaged network, and troubleshooting in a tangle of unlabelled cables turns a straightforward task into a protracted ordeal.
Network Switches: The Heart of Your LAN
Network switches connect all your wired devices together and to the rest of the network. For a business network, managed switches are essential. Unlike unmanaged switches (which simply pass traffic between ports with no intelligence), managed switches support VLANs, Quality of Service (QoS), port security, SNMP monitoring, and remote management.
Consumer / Unmanaged Switches
- No VLANs — all traffic on one flat network
- No QoS — VoIP competes with file downloads
- No monitoring or alerting capabilities
- No port security or access control
- Cannot be managed remotely
- Typically 3-year lifespan
Business Managed Switches
- VLANs separate voice, data, and guest traffic
- QoS prioritises VoIP and video conferencing
- Full SNMP monitoring with alerts
- 802.1X port authentication for security
- Cloud or on-premises remote management
- Typically 7-10 year lifespan with support
Power over Ethernet (PoE) switches are worth the modest additional cost. PoE delivers electrical power over the same Ethernet cable that carries data, eliminating the need for separate power supplies for devices like Wi-Fi access points, VoIP phones, and IP cameras. This simplifies installation, reduces cable clutter, and makes it easier to place access points in optimal locations without worrying about nearby power sockets.
Switch Stacking and Network Resilience
For growing businesses, network resilience becomes increasingly important. A single switch failure should not bring down your entire office. Switch stacking — where multiple physical switches are connected together and managed as a single logical unit — provides both increased port capacity and redundancy. If one switch in a stack fails, the remaining switches continue to operate, and your IT provider can replace the failed unit without a complete network outage.
Link aggregation is another resilience technique worth considering. By bundling multiple physical connections between switches into a Link Aggregation Group, you increase the available bandwidth and provide redundancy — if one cable or port fails, traffic continues over the remaining links. For the uplink between your access layer switches and your core switch or firewall, a link aggregation group with two or more connections is strongly recommended for any business that cannot afford network downtime.
Quality of Service configuration on your switches is also essential if you use VoIP telephony or video conferencing. QoS rules ensure that time-sensitive voice and video packets are prioritised over bulk data transfers such as file downloads or backups. Without QoS, a large file transfer can consume all available bandwidth on a switch uplink, causing voice calls to break up and video feeds to freeze — a common complaint in offices where the switching infrastructure has not been properly configured.
Wireless Network Design
Wi-Fi is no longer a convenience — it is a critical business service. Employees expect to connect their laptops, tablets, and phones wirelessly. Meeting rooms need wireless connectivity for presentations and video conferencing. Visitors and clients expect guest Wi-Fi. Designing a wireless network that delivers reliable, secure, high-speed connectivity throughout your premises requires more than simply plugging in a few access points.
A professional wireless deployment begins with a site survey. This involves using specialist tools to map the radio frequency environment in your premises, identifying sources of interference, dead spots, and optimal access point placement. Factors such as wall materials (concrete and metal are particularly problematic), floor layout, ceiling height, and the expected number of concurrent devices all influence the design.
Enterprise-grade access points from manufacturers like Cisco Meraki, Aruba, or Ubiquiti UniFi provide far superior performance compared to consumer equipment. They support higher client densities, offer better roaming between access points, include dedicated management radios, and integrate with your network security policies. For a typical office of 500-1,000 square metres, expect to need three to six access points depending on the building construction and user density.
Choosing the Right Wi-Fi Standard
Wi-Fi technology evolves rapidly, and choosing the right generation of equipment matters. Wi-Fi 6 (802.11ax) is the current mainstream standard and offers significant improvements over Wi-Fi 5 (802.11ac), particularly in high-density environments. Key features include OFDMA, which allows an access point to communicate with multiple devices simultaneously rather than sequentially, and BSS Colouring, which reduces interference from neighbouring networks. Target Wake Time extends the battery life of connected mobile devices by scheduling when they communicate with the access point.
Wi-Fi 6E extends these capabilities into the 6 GHz frequency band, providing additional channels that are far less congested than the traditional 2.4 GHz and 5 GHz bands. For new deployments, Wi-Fi 6E access points are a sound investment where budget permits. However, many older client devices do not support 6 GHz, so you will still need coverage on the traditional bands. The 6 GHz band is best considered as additional capacity for newer devices rather than a replacement for existing frequencies.
When budgeting for wireless infrastructure, remember that access points are only part of the overall cost. You also need PoE switches with sufficient power budget to drive all your access points, Cat6A cabling to each access point location, and either a cloud management subscription or an on-premises wireless controller. Factor in annual licensing costs for cloud-managed platforms, which typically run between fifteen and thirty pounds per access point per month for enterprise platforms such as Cisco Meraki. These recurring costs should be part of your long-term IT budget planning.
VLANs: Segmenting Your Network
Network segmentation using Virtual Local Area Networks (VLANs) is one of the most important steps in designing a secure business network. VLANs allow you to divide a single physical network into multiple logical networks, each isolated from the others. This provides both security and performance benefits.
A typical VLAN structure for a UK SME might include a corporate data VLAN for staff workstations and laptops, a voice VLAN for VoIP phones, a server VLAN for on-premises servers or network-attached storage, a guest VLAN for visitor Wi-Fi, and an IoT VLAN for printers, cameras, and smart devices. By segregating these networks, you prevent a compromised guest device from accessing your corporate network, ensure that VoIP traffic gets priority bandwidth, and limit the blast radius of any security incident.
Implementing VLANs in Practice
Whilst the concept of VLANs is straightforward, implementing them correctly requires careful planning and coordination across your entire network infrastructure. Each VLAN needs its own subnet, its own DHCP scope (which can be served from your firewall or a dedicated DHCP server), and appropriate firewall rules governing what traffic can flow between VLANs. A common mistake is to create VLANs but then allow unrestricted inter-VLAN traffic, which negates most of the security benefits.
Start by documenting every device type on your network and assigning each to an appropriate VLAN. Then define the inter-VLAN routing rules on your firewall. Devices on your corporate VLAN should be able to access printers on the IoT VLAN, but devices on the guest VLAN should have no such access. VoIP phones on the voice VLAN need connectivity to your SIP provider but should not be reachable from the guest network. Getting these rules right requires understanding your business workflows and thorough testing before deploying to production.
For wireless networks, each VLAN is typically presented as a separate SSID. However, avoid creating too many SSIDs — each additional SSID generates management overhead on the access point and consumes airtime with beacon frames. Three to four SSIDs is generally the recommended maximum for most environments. If you need more granular segmentation, consider dynamic VLAN assignment based on 802.1X authentication, where the user's VLAN is determined by their identity rather than the SSID they connect to.
| VLAN | Purpose | Subnet Example | Internet Access |
|---|---|---|---|
| VLAN 10 | Corporate data | 192.168.10.0/24 | Full (via firewall) |
| VLAN 20 | Voice (VoIP) | 192.168.20.0/24 | SIP provider only |
| VLAN 30 | Servers / NAS | 192.168.30.0/24 | Limited (updates only) |
| VLAN 40 | Guest Wi-Fi | 192.168.40.0/24 | Internet only (isolated) |
| VLAN 50 | IoT / printers | 192.168.50.0/24 | Limited (updates only) |
Scaling for Growth
The most common mistake in network planning is designing for today's needs without considering tomorrow's growth. If your business is growing, your network needs to grow with it — and retrofitting a network is far more expensive and disruptive than building in capacity from the start.
When selecting switches, buy models with more ports than you currently need. A 48-port switch costs only marginally more than a 24-port switch but gives you room to double your connected devices. When planning cabling, install runs to areas you expect to use in the future, even if they are vacant today. When sizing your firewall, choose a model rated for the bandwidth and user count you expect in three to five years.
Consider your network monitoring and management strategy from the outset. Cloud-managed networking platforms such as Cisco Meraki provide a single dashboard for managing firewalls, switches, and access points across multiple sites. This makes it straightforward for your IT provider to monitor performance, identify issues, and make configuration changes without needing to visit each site. As your business opens additional offices or expands to new locations, the same platform scales seamlessly.
Documentation and Disaster Recovery Planning
Comprehensive network documentation is one of the most overlooked yet most valuable aspects of network planning. At minimum, maintain an up-to-date network diagram showing all devices and their connections, an IP address management record listing all static assignments, a full inventory of equipment with serial numbers, warranty dates, and support contract details, and documented configurations for every network device backed up to a secure location.
This documentation should be treated as a living resource, updated whenever any change is made to the network. If your IT provider maintains your network, they should be furnishing you with current documentation as part of their service agreement. Without it, troubleshooting becomes guesswork, onboarding a new IT provider becomes a painful audit exercise, and disaster recovery after a major failure takes far longer than it should.
Equally important is a disaster recovery plan for your network infrastructure. What happens if your firewall fails? Do you have a cold spare, or can your provider ship a replacement within hours? If your comms room floods or suffers a power surge, how quickly can you rebuild? These are not hypothetical scenarios; they are events that UK businesses experience regularly. Having a documented, tested plan for each scenario can reduce recovery time from days to hours. Cloud-managed platforms simplify recovery considerably — when you replace a failed device, the replacement downloads its configuration from the cloud and is operational within minutes rather than requiring manual reconfiguration from scratch.
Size your network for 150% of your current requirements. If you have 30 users today, plan for 45. If you need 20 Ethernet drops, install 30. If your current bandwidth usage is 50 Mbps, ensure your connection supports 100 Mbps. The marginal cost of over-provisioning at installation is a fraction of the cost of upgrading later. A well-planned network should serve your business for five to seven years before requiring a significant refresh.
Security from the Ground Up
Network security should be designed into your infrastructure from the beginning, not bolted on as an afterthought. At the network level, this means implementing the controls required for Cyber Essentials certification — which is increasingly becoming a requirement for UK businesses, particularly those working with government or larger enterprises.
The five technical controls of Cyber Essentials map directly to network infrastructure decisions. Firewalls must be properly configured with default-deny rules. Secure configuration means changing default passwords on all network equipment and disabling unnecessary services. Access control means using 802.1X authentication on switch ports and WPA2-Enterprise on Wi-Fi. Malware protection means deploying network-level filtering and endpoint security. Patch management means keeping firmware up to date on all network devices.
Beyond Cyber Essentials, consider implementing DNS-level filtering (such as Cisco Umbrella or Cloudflare Gateway) to block access to known malicious domains before traffic even reaches your network. Network access control (NAC) can prevent unauthorised devices from connecting to your network. And comprehensive logging — with logs forwarded to a central SIEM or your managed IT provider's monitoring platform — ensures that security incidents can be detected and investigated promptly.
Choosing the Right IT Partner for Network Infrastructure
Unless you have a dedicated in-house IT team with networking expertise, the quality of your network infrastructure will depend heavily on your choice of IT partner. When evaluating managed IT providers for network projects, look for demonstrable experience with business-grade networking equipment, relevant vendor certifications such as Cisco, Fortinet, or Aruba partner status, and a proven track record with businesses of a similar size and sector to yours.
A good IT partner takes the time to understand your business requirements before recommending specific products. They propose solutions that balance performance, reliability, and cost rather than simply defaulting to the most expensive option or the brand they happen to be most familiar with. They provide detailed documentation of the installed network, offer ongoing monitoring and management services, and have a transparent support process with defined response times for when issues arise. Ask for references from existing clients and enquire about their average response times and first-time fix rates — these metrics reveal a great deal about the quality of service you can expect.
The relationship between a growing business and its IT provider is a long-term partnership that has a direct bearing on your operational efficiency. Your network will need ongoing management, periodic upgrades, firmware updates, security reviews, and responsive support when problems occur. Investing time in selecting the right partner at the outset pays dividends for years to come, whilst choosing poorly leads to frustration, unexpected costs, and infrastructure that never quite performs as it should. A quarterly review meeting with your IT provider to discuss network performance, upcoming needs, and any planned changes is a simple practice that keeps both parties aligned and prevents small issues from becoming major problems.
Need Help Planning Your Network?
Cloudswitched designs and deploys business-grade network infrastructure for growing UK businesses. From site surveys and cabling to firewalls, switches, and Wi-Fi, we build networks that perform today and scale for tomorrow.
GET IN TOUCH