Assessment Specification Course/Programme:
BSc(Hons) Computing
Module Name:
Computing Infrastructure
Module Code:
SWE4303
Assignment Number & Title:
001 Assignment 1 – Infrastructure Strategy Report
Weighting:
40%
Issue Date:
Oct 20, 2025
Submission Deadline:
Nov 10, 2025
Learning Outcomes:
LO1: Justify an infrastructural strategy to support service requirements based on a given brief.
LO2: Apply networking principles and protocols to solve a given problem.
Specific Assessment Criteria:
● Propose and justify a comprehensive computing infrastructure strategy for a given business scenario.
●Design a network topology and explain the application of relevant protocols.
Introduction In this assessment, you will act as a systems architect to design and justify a computing infrastructure for a given real-world scenario. You will need to submit a detailed report outlining your proposed infrastructure strategy and relevant configurations using Cisco Packet Tracer
This assessment requires individual work. Effective time management is crucial. Please read this document carefully to ensure you understand all requirements before you begin. The aim is to provide you with an opportunity to apply the theoretical knowledge you have acquired in networking and infrastructure design.
Targeted Learning Outcomes 1
Justify an infrastructural strategy to support service requirements based on a given brief.
2
Apply networking principles and protocols to solve a given problem.
Grading A percentage mark will be provided based on the provided Marking Scheme. This assignment is worth 40% of the overall grade for this module.
Academic Misconduct (i.e. plagiarism/commissioning/collusion etc.) All work submitted for grading must be your own work and correct citations for references must be used where appropriate (i.e. Harvard referencing). You may not – for example – work together with a classmate or friend from other university to complete this assignment, you must not copy the work of anyone else, you must not share your work on this assignment with others in your class or on “assignment helper” sites, forums, discussion groups, social media etc. at any time during the academic year, even after submission. You must not have the work on the assignment done for you by a third-party, whether you pay for that work or not (known as commissioning). The university does not tolerate such behaviour and it is regarded as academic misconduct, which is taken very seriously and acted upon accordingly. You can read the university’s policy on academic misconduct.
Use of Generative Artificial Intelligence (GAI) Applications in Assessments. These are the categories that are indicated in assessments:
AI Status
Application
Notes
Category A
No GAI tool is permitted
While grammar and/or spell checkers may be used to correct individual words and sentences, the use of GAI is not allowed. This is because the learning outcomes require you to produce original assessment work without any GAI assistance.
Any GAI generated content which is presented as your own original work and is not acknowledged will be assessed for academic misconduct.
Category B
GAI can be used to assist you with the assessment
Grammar and/or spell checkers may be used to correct individual words and sentences. GAI can also be used for specific tasks, e.g.
(1)To generate initial ideas which must then be subject to fact checking by authoritative sources
(2)To structure assessments
(3)To generate summary information which should then be put into your own words and referenced
Any GAI generated content which is presented as your own original work and is not acknowledged will be assessed for academic misconduct.
Category C
GAI is an integral part of the assessment and should be used
Grammar and/or spell checkers may be used to correct individual words and sentences.
Your skills in using and evaluating GAI generated content is part of the assessment task in question. GAI generated content should be clearly identified and acknowledged.
Any GAI generated content which is presented as your own original work and is not acknowledged will be assessed for academic misconduct.
Late Submissions For Guidance on late submissions and the procedure for extenuating circumstances, refer to the module guide.
Minimum Secondary Research Source Requirements Level HE4 – It is expected that the Reference List will contain between five and ten sources. As a MINIMUM the Reference List should include two refereed academic journals and four academic books.
Task 1 – Strategy Report (100%) LO1, GAI = Category B A new startup is moving offices to a new site. They have a team of 20 employees (developers, sales, and support staff) based in a small office. The staff use a range of fixed PCs and laptop devices. They anticipate rapid growth, expecting to double their staff and user base within the first year.
They require an IT infrastructure that is secure, scalable, and cost-effective. The infrastructure must support day-to-day office operations (email, printing) and host their web portal internally. You are supplied with the starting network address of 192.168.100.0
The Task: Infrastructure Strategy Report Based on the scenario, you are required to produce a technical report that details a proposed infrastructure strategy for the company. The report should include:
● Infrastructure Model Justification: 10%
○ Discuss and compare different architecture models (client server, peer to peer)
○ Recommend and justify the most suitable model for the startup, considering their requirements for scalability, security, and cost-effectiveness
● Network Design: 25%
○ Propose a physical and logical network topology for their office.
○ Create a network diagram illustrating the topology, including key hardware (routers, switches, servers and access points). Explain each device’s function within the network and justify their necessity.
○ Explain the choice of networking protocols (e.g. DNS, DHCP) and how they will function within the network.
● Server and Service Strategy: 10%
○ Detail the server infrastructure required to meet the business requirements.
○ Explain the security measures you would implement within the network.
● Configurations 30%
○ Evidence all configurations used within the topology and describe each of their functions within each network component
● Testing 15%
○ Evidence of all tests such as connectivity, protocol verification and security concepts. Describe their significance within the topology
● Evaluation 10%
○ Evaluate your network design and implementation strategy against the goals of network architecture
Deliverables ● Report (Word or PDF document): A professionally structured report covering all sections outlined in The Task.
● A link to a saved copy of your packet tracer file.
● Upload your report to the submission area on the VLE.
Format:
● A formal business report.
● Word count: 2,000 words (+/- 10%).
● You must use academic and industry sources to support your analysis and include a full reference list and in-text citations.
Upload your word-processed report to the Turnitin system which will check for plagiarism.
NB. It is your responsibility to ensure that you have understood these requirements correctly and completely before attempting the assignment. It is also your responsibility to ensure that you seek guidance from your module tutor over any aspect of this assignment over which you may be unsure if necessary. Remember, your module tutor is not responsible for your progress on this assignment: you are!
Referencing: Where appropriate in your work to illustrate points through your research, it should be properly referenced using the standard University of Bolton referencing style – see: https://www.bolton.ac.uk/leaponline/My-Academic-Development/My-WritingTechniques/Referencing/Level-2/Harvard-Referencing.aspx
Assessment Criteria Learning Outcomes for Assessment 001
Fail (0-39)
D
Pass
(40-49)
C
Good
(50-59)
B
Very Good
(60-69)
A
Excellent
(70+)
LO1: Justify an infrastructural strategy to support service requirements based on a given brief.
Little or no justification provided. The proposed strategy is unsuitable for the scenario.
A suitable model is chosen, but justification is weak or limited. Discussion of alternatives is minimal.
A suitable model is chosen with reasonable justification. Some comparison of alternatives is present. Key requirements are mentioned but not fully explored.
A well-justified model is proposed, with a good comparison of alternatives. Key requirements like scalability and security are addressed.
An outstanding, detailed justification is provided. The chosen strategy is expertly tailored to the scenario, demonstrating a deep understanding of service and deployment models.
LO2: Apply networking principles and protocols to solve a given problem.
Rudimentary or incorrect network design. Major protocols are missing or misunderstood.
A basic design is provided, but it may contain inaccuracies. The diagram is present but may be unclear. Major protocols are mentioned but not well explained.
A correct network design is provided that meets requirements. The diagram is clear. The function of major protocols is explained adequately.
A logical and well-documented network design is presented. The diagram is clear and accurate. The role of protocols is well-explained in the context of the scenario.
A comprehensive and highly effective network design. The diagram is professional. A sophisticated understanding of protocols and security considerations is demonstrated