This article discusses the identification of client needs, support provided by the intranet, number and types of workstations, file servers and other networking devices, IP addresses assigned to each network, interconnection between devices and each subnetwork, hierarchical model and justifications, software applications installed on each part and entire intranet, and security mechanisms implemented on the network.