I've covered networking in sufficient detail earlier in the book that I don't need to belabor it here. However, I will repeat a few important points.
Given that you control the host, the only two networking mechanisms you should consider for allowing access to the host network are TUN/TAP and uml_switch.
Both bridging TUN/TAP devices with the host Ethernet and routing to unbridged TUN/TAP devices are appropriate models. They have differing setup and security requirements, which should drive the decision between the two.
Make use of the ability to give descriptive names to your TUN/ TAP devices to document your UML configuration.