Skip to main content

Network Capacity Planning in Capacity Management

$249.00
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
Your guarantee:
30-day money-back guarantee — no questions asked
Who trusts this:
Trusted by professionals in 160+ countries
When you get access:
Course access is prepared after purchase and delivered via email
How you learn:
Self-paced • Lifetime updates
Adding to cart… The item has been added

This curriculum spans the design and execution of a multi-phase network capacity planning program, comparable in scope to an enterprise’s internal capability build for ongoing infrastructure forecasting, cross-team governance, and integration with service management frameworks.

Module 1: Establishing Capacity Management Objectives and Scope

  • Define which business-critical systems require formal capacity planning based on SLA requirements and outage history.
  • Select network segments for monitoring based on traffic concentration, growth trends, and dependency on core applications.
  • Determine ownership boundaries between network, application, and infrastructure teams for capacity-related decisions.
  • Align capacity thresholds with business peak periods, such as fiscal closing or seasonal demand spikes.
  • Decide whether to include cloud egress and hybrid connectivity in the scope of network capacity models.
  • Document escalation paths for capacity breaches that impact service delivery or violate operational thresholds.

Module 2: Data Collection and Performance Monitoring Strategy

  • Configure SNMP polling intervals to balance monitoring granularity with collector system load and storage costs.
  • Integrate flow data (NetFlow, sFlow, IPFIX) from core routers to identify top talkers and traffic patterns.
  • Select which interfaces to monitor at 5-minute versus 1-minute intervals based on criticality and volatility.
  • Normalize timestamp and timezone settings across monitoring tools to ensure accurate correlation.
  • Implement synthetic transaction testing on key WAN links to measure real application throughput under load.
  • Validate data accuracy by comparing vendor-reported interface utilization with third-party monitoring tools.

Module 3: Baseline Development and Trend Analysis

  • Calculate 95th percentile utilization for WAN circuits to determine billing and capacity triggers.
  • Distinguish between short-term spikes and sustained growth trends using moving averages over 30/60/90-day windows.
  • Adjust baselines seasonally for predictable events like remote work surges or backup windows.
  • Identify anomalous traffic by comparing current patterns against historical baselines using statistical deviation.
  • Map application dependencies to network paths to attribute bandwidth consumption accurately.
  • Document baseline exceptions, such as temporary project-related traffic, to prevent skewed forecasts.

Module 4: Forecasting Techniques and Model Validation

  • Apply linear versus exponential forecasting models based on historical growth patterns of specific network segments.
  • Incorporate planned business changes—such as office expansions or cloud migrations—into capacity projections.
  • Validate forecast accuracy quarterly by comparing predicted versus actual utilization on key links.
  • Adjust forecast parameters when new applications or protocols (e.g., video conferencing) significantly alter traffic profiles.
  • Use Monte Carlo simulations to model uncertainty in growth rates for high-risk, low-visibility links.
  • Define confidence intervals around forecasts to inform risk-based procurement decisions.

Module 5: Capacity Thresholds and Alerting Design

  • Set utilization thresholds (e.g., 70% sustained, 85% peak) that trigger proactive review without generating noise.
  • Configure alert suppression during scheduled maintenance or known high-load events to reduce false positives.
  • Define different thresholds for access, distribution, and core layers based on redundancy and traffic aggregation.
  • Integrate threshold breaches with incident management systems to initiate formal review workflows.
  • Implement hysteresis in alerts to prevent flapping when utilization oscillates near threshold levels.
  • Document threshold rationale and review frequency to support audit and compliance requirements.

Module 6: Resource Provisioning and Procurement Coordination

  • Determine lead times for circuit upgrades with service providers and align procurement with forecasted needs.
  • Evaluate whether to overprovision bandwidth or implement QoS to prioritize critical traffic on constrained links.
  • Negotiate contract terms for burstable bandwidth or auto-scaling in cloud interconnect agreements.
  • Coordinate hardware refresh cycles with capacity upgrades to avoid bottlenecks at device interfaces.
  • Assess the cost-benefit of dark fiber activation versus leased line expansion for long-haul links.
  • Validate post-upgrade performance to confirm that new capacity meets projected demand and SLAs.

Module 7: Governance, Reporting, and Continuous Improvement

  • Produce monthly capacity reports showing utilization trends, forecast variances, and upcoming risks for IT leadership.
  • Conduct quarterly cross-functional reviews with network, security, and application teams to validate assumptions.
  • Update capacity models when network topology changes, such as new data centers or site consolidations.
  • Archive decommissioned device data while retaining historical records for trend analysis.
  • Standardize naming and tagging conventions across monitoring systems to ensure report consistency.
  • Incorporate post-incident reviews into capacity planning to address undetected bottlenecks or modeling gaps.

Module 8: Integration with ITIL and Enterprise Service Management

  • Link capacity review records to Configuration Management Database (CMDB) entries for network devices and circuits.
  • Trigger capacity planning activities during the Change Enablement process for major infrastructure modifications.
  • Feed capacity risk assessments into Service Level Management for realistic SLA negotiation.
  • Align capacity models with Availability Management’s resilience requirements for critical services.
  • Document capacity constraints in Known Error Databases to support root cause analysis during outages.
  • Integrate capacity data into demand management processes to influence application deployment timing.