Professional Documents
Culture Documents
By
Project Supervisor
Prof. Dr. Hasan Sarwar
Course Instructor
Prof. Dr. Swakkhar Shatabda
July 4, 2022
i
Acknowledgements
Many people’s contributions and support throughout the last two trimesters have made this
work feasible. We would like to express our appreciation to everyone who helped in some way.
First and foremost, we would like to express our gratitude to my academic advisors Prof.Dr.Hasan
Sarwar and Dr.Swakkhar Shatabda sir for their guideline and guidance. Without their assistance,
we would not have been able to complete our work.
Last but not least, we owe our gratitude to our family, particularly our parents, for their
unconditional love and immense emotional support .
ii
Table of Contents
Table of Contents iv
List of Figures v
1 Introduction 1
1.1 Project Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.3 Goal & Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.5 Project Outcome . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.6 Organization of the Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2 Background 3
2.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.2 Literature Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.2.1 Similar Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.2.2 Related Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.3 Gap Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3 Project Design 8
3.1 Requirement Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.1.1 Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.1.2 Non-Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.1.3 Context Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.1.4 Use Case Diagram: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.1.5 Data Flow Diagram Level 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.1.6 UI Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.2 Detailed Methodology and Design . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.3 Project Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.4 Task Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
iii
Table of Contents Table of Contents
6 Conclusion 51
6.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
6.2 Limitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
6.3 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
References 54
iv
List of Figures
v
List of Figures List of Figures
vi
List of Tables
vii
Chapter 1
Introduction
The discussion about what we are going to do in our project, is briefly described on this chapter
1. We’ve discussed about the short description of our project in section 1.1. On section 1.2 we’ve
showed our motivation why we’re solving it. We also discussed the goal and objectives on section
1.3. All over the section we’ve contend our project’s descriptions.
1.2 Motivation
According to BTRC [1] there are over 9.522 million ISP users only in Dhaka. So for the betterment
of both user and the ISP we’ve found motivation for our project which is described below:
• Nowadays most of the ISP users are not satisfied with their internet services and unfortunately
they don’t have the luxury to find and know about all the ISPs in their area that are providing
good internet services so that they can switch immediately.
• Using Our platform internet users will be able to find all the ISP in a single platform where
they can choose their desire ISP here and switch to another whenever needed.
So, based on our motivation, we’d like to create an application that can result in a positive
improvement for both sides.
1
1.3. Goal & Objectives Chapter 1. Introduction
1.4 Methodology
We’ll create a web-based solution that will benefit both users and ISP owners. Our system allows
users to communicate with ISPs. Users will have access to a panel that will allow them to manage
their packages and payments. Users can access all of the options we offer through their control
panel. Through the ISP admin interface that we provide, the ISP can control and manage their
activities.
• Chapter 2: This chapter is about the background of our project which includes preliminaries,
literature-review, similar-applications and gap-analysis.
• Chapter 3: This chapter is about the design of our project which includes Requirement
Analysis, Functional Requirements, non-functional requirements, context diagram, data-flow
diagram level-1, UI design, detailed methodology and design, project planning and task
allocation.
• Chapter 4: This chapter is about the design of our project which includes compliance with
the standards, software development life cycle, design constraints(Impact), budget & cost
analysis and complex engineering problem.
• References: All the references that are used to write the paper is included on that section.
2
Chapter 2
Background
In this chapter we’ll discuss about Literature Review on section 2.2 , similar applications that
somehow matches a little bit or more. Also the related research that are done previously and are
akin with our project. Then we’ll identify the gap with those projects on section 2.3 gap analysis.
Finally we’ll put an end to the section with summary.
2.1 Preliminaries
We’ve to know some terms to understand the entire chapter. Such type of words are:
ISP means Internet Service Providers. CP means Content Providers. SME means Small and Mid-
size Enterprise, CRM means Customer relationship management (CRM). Also churn prediction
is the process of identifying consumers who are most likely to stop using a service or end their
subscription.
3
2.2. Literature Review Chapter 2. Background
Another research specifies ISPs offers the best degree of network service quality to the CP with
the most advertising income The ISP provides the other CPs with the bare minimum of network
services[7]. Another investigation shows the interplay between two ISP layers To optimize their
value, the lower tier ISP can choose the suitable traffic transmission and routing[8].
While collecting data from literature we’ve formed a table where the researches were conducted
geologically which is given in the table (2.1) below:
Economic
Paper No Paper Name Geological
Status
Customer Referral Behaviour:
01 Australia Developed
Do Switchers and Stayers Differ? [2].
On the incentives of an integrated Not Not
02
ISP to favour its own content [7]. Specified specified
Promotional Activities in Order
03 Bangladesh Developing
to Win More Customers [9].
China Developed
Achieving customer loyalty
Hong-Kong Developed
04 through service excellence in
Thailand Developed
internet industry [10].
Australia Developed
On the Interaction and Competition Not Not
05
among Internet Service Providers [8]. Specified specified
Consumer Satisfaction for Internet United
06 Service Providers: An Analysis of States of Developed
Underlying Process [4]. America
Business Intelligence approach to
07 supporting strategy-making of ISP Taiwan Developing
Service management [11].
Applying Data Mining to Customer
08 Churn Prediction in an Internet Iran Developing
Service Provider [5].
Improving Services Offered by United
09 Internet Providers by analysing States of Developed
online reviews using Text analytics [6]. America
Influence of customer relationship
10 management practices on customer Kenya Poor
satisfaction among ISP [3].
So, we compared all of them geologically and came up with the findings that was previously
described.
4
2.2. Literature Review Chapter 2. Background
A modest user panel with Review and Rating system for ISPs were not found in these 5 well
known ISPs websites shown below:
2. Amber IT[13]:
Amber IT delivers a broad selection of high quality data & internet connectivity services
around the country. They offer safe internet access services with multiple service level de-
scriptions for corporate organizations and SMEs. They also provide high-availability and
consistent hosting and web development services for any business.
3. Dot Internet[14]:
Dot Internet strives to make high-quality Internet and solutions accessible to people of all
income levels.
4. Link3 [15]:
It is the country’s largest ISP in terms of active subscribers and provides broadband services.
Link3 is also a pioneer in providing integrated solutions to Bangladesh’s corporate sector,
and it is the country’s only ISP with connections to all of the country’s banks.
None of them has the review and rating system on their websites. These sites do not provide
a competent User Panel for the users where users can manage and use all their services and also
communicate with ISP whenever needed.Some of them only provides bill paying option which
remains not utilized because of poor user management.
Our ISP admin panel’s concept is compared with 4 other application providers. They are
providing similar features compared to ours. Though it may not be the same as ours but it will
be something as similar as ours. The list of those application providers are:
1. IT WAY BD[16]:
IT WAY BD offers superior solutions to help generate The Digital Delta, which itself is pow-
ered by innovation and guided by integrity. It has also astounded its visitors and associates
by establishing world-class capability to supply global solutions.
2. ISP Digital[17]:
IspDigital is a collection of technology marketing services firms that provide brands with
cutting-edge solutions.
3. AmarSheba[18]:
AmarSheba is a business platform in Dhaka, Bangladesh, where somebody may locate a
better and more dependable service provider. AmarSheba could support with a wide range
of business services, along with the creation of a strategic plan, building services and software
solutions.
4. BSD[19]:
In little customized software, BSD is really very popular. For reliable operation and analysis,
every company needs software.
5
2.2. Literature Review Chapter 2. Background
6
2.3. Gap Analysis Chapter 2. Background
After comparing each of the papers with each other we’ve come to an analysis & also compared
them with ours which is given on the table (2.3) below:
7
Chapter 3
Project Design
In this chapter we would describe about the Requirement Analysis on 3.1 then we will describe
about the detailed Methodology and Design on 3.2 and then we will show our project plan and so
on.
We will divide each of them to their functionalities and then describe all of them.
8
3.1. Requirement Analysis Chapter 3. Project Design
• ISP Searching: Users can search ISP in their local area as well as for any other loca-
tions.They also can search ISP using filter searching according to their required interest.
• Package Subscription: Users can roam through each and every ISP’s panel in their location
and check out the internet packages and available offers to subscribe their desire one’s.They
also can find the packages using filter searching where they can choose their conditions
according to their plan.
• Own User Panel : A user can easily manage his or her profile or other personal informa-
tion related to application through their own user panel. They can easily unsubscribe, pay
monthly payment, can give review, rating and complains to their subscribed ISP.
• Manage Packages: An ISP admin can manage their packages which are visible to cus-
tomers. They can add or update or delete their package. They can also provide offers for
customers to attract more of them.
• Manage Customers: ISP admin can easily control their customer and their related ser-
vices.They can add and remove customers to their system if required. They can also review
the users complains that the users are providing and take necessary steps to solve their
problems in order to betterment their services.
• Billing Management : ISP admin can do the billing management easily. They can easily
generate their monthly balance sheet, bill collection and many more through their panel.
• Inspect and control: A moderator can inspect the site issues and can control the ISP
admins and the users when necessary. Moderator will solve the user or ISP admin’s problem
if arises.
• Verify user and ISP: Moderator will verify an ISP and users if they are new and willing
to join in the system. He will also keep an eye of any unusual activity done from any user or
ISP admin.
• Maintainability: Our application is easy to maintain and bugs free for the both users ad
ISP admins.
9
3.1. Requirement Analysis Chapter 3. Project Design
• Scalability: We will have enough memory, multiple servers, disc space for the better load
management and reliable domain and hosting providers to ensure the continuous and stable
service.
• Reusability: We have made sure that the ISP Admin can quickly perform tasks in the
panel.
• Usability: We have to assure easy system and interface so that users can performs their
tasks quickly in the easiest way and complete their actions accurately.
It enables a variety of user operations and only displays an error when anything is truly
wrong. This is accomplished by determining the amount, kind, and severity of common user
errors, as well as the ease with which users may recover from those errors.
New users will have no trouble achieving their objectives, and will have much more success
on subsequent visits.
• Security: We have to provide data privacy policy and customer data protection so that no
one can misuse the users and ISPs personal and confidential information’s.
10
3.1. Requirement Analysis Chapter 3. Project Design
11
3.1. Requirement Analysis Chapter 3. Project Design
12
3.1. Requirement Analysis Chapter 3. Project Design
13
3.1. Requirement Analysis Chapter 3. Project Design
3.1.6 UI Design
In this section we will show some of the UI that we have designed for our project. Those UIs are
designs for our important features of our project. The picture below (3.4) is for the homepage for
our project. User can search their desired ISP from the search bar by submitting their location.
Also they can go to other pages like user sign-up, user login, ISP sign-up & the ISP login page.
The picture below (3.5) is for the custom or filter searching feature where users can select the
attributes of their interest to search ISP. From that page user can select multiple fields regarding
their choice as they need. Such as they can select bandwidth speed, the price range of package,
their area & by the rating of each ISPs. After the click of search button the user will be redirected
to the result page & could be able to see the result as they wanted.
14
3.1. Requirement Analysis Chapter 3. Project Design
The picture below is for the custom or filter searching feature. The results are shown in that page.
From that page user can select multiple fields regarding their choice as they need. The following
page (3.6) is showing how the searching result will be shown to customer.
From that particular page an user can easily register to our application. From his given username
and password he can easily log in from the user login page. The picture below (3.7) is for the
customer Registration.
15
3.1. Requirement Analysis Chapter 3. Project Design
When the customer clicks on a link of an ISP the user will be automatically redirected to a ISP’s
page that he has clicked. From that page an user can easily subscribe to a package that he wants
to & the ISP will get notified that a customer has subscribed. This following ui (3.8) represents
how the users will see the packages and subscription option from ISP pages.
From that panel an user can easily manage their subscription, monthly billing, cancellation of a
subscription, report an issue to the ISP & many more from his panel. The picture below (3.9) is
design for the user profile and control panel.
16
3.1. Requirement Analysis Chapter 3. Project Design
Subscription UI:
From the subscription panel an user can manage their subscription if multiple ISPs are subscribed
from his ID. Also he can unsubscribe or visit to the ISP page for more information. The following
figure (3.10) from user panel showing all the subscribed packages and According ISPs.
ISP-Registration UI:
From that particular page an ISP can easily register to our application. From his given username
and password he can easily log in from the ISP login page. The picture below (3.11) is for the ISP
Registration.
17
3.1. Requirement Analysis Chapter 3. Project Design
ISP-Login UI:
From that particular page an ISP can easily login to their ISP panel from his given username and
password. The picture below (3.12) is for the ISP Registration.
From the ISP admin page an ISP admin can easily manage his homepage with his packages. He
can add new packages or update the existing package from the ISP panel of his own. The picture
below (3.13) to design of ISP home page where they will show their packages and offers.
18
3.1. Requirement Analysis Chapter 3. Project Design
From that particular page an ISP can easily manage their any subscriber’s issue when a subscriber
submits a report from the user panel. The ISP can solve the problem from his own end & can
leave a reply message from that panel. The following figures (3.14) is the list of their subscribers
and their report details.
From that particular page an ISP can easily add a new package from their panel. He can add
package name, speed, price & also the offer price. The following image (3.15) is the list of their
subscribers and their report details.
19
3.1. Requirement Analysis Chapter 3. Project Design
The image below (3.16) shows, a user paying to the ISP where he wants to subscribe into a new
package. After confirming the payment the user will be automatically subscribed to the new
package he wants to from any ISPs.
The image below (3.17) shows, a user paying to the ISP for his monthly payment. He can select
each month of paying from the admin panel & whatever months he wants. After successful payment
his panel will show his payment & his connection will not be interrupted.
20
3.1. Requirement Analysis Chapter 3. Project Design
The super admin who controls the all ISP & their sign-up request has a admin panel which has to
be accessed by the login page. From the valid login the super admin can access the request that
the ISPs have made. The following image (3.18) is the login page for super admin.
The super admin can see the sign-up request that the ISPs has requested to join the community.
The super admin can select & approve if the ISP is valid or not. The following image (3.19) is the
login page for super admin.
21
3.1. Requirement Analysis Chapter 3. Project Design
The super admin can see the sign-up request that the ISPs has requested to join the community.
After clicking of view details the super admin will go the acceptation page & can easily accept or
reject any ISP if he wants. The following image (3.20) is the login page for super admin.
22
3.2. Detailed Methodology and Design Chapter 3. Project Design
• Software
• Programming Languages
• Hardware
We have gone over each one separately here. For the Software part we will use the following
software that are run on a Windows based personal computers. They are:
• PyCharm 2021.3.1
• XAMPP 7.4.27
• Adobe XD
For the Programming Languages part we will use the following languages as wee need to
implement our project. They are:
• HTML5, CSS3
• JavaScript ES6
• Python 3.10.1
• MySQL (8.0.27)
• PHP (Optional)
For the Hardware part we will use our personal computer and we will also use a hosting server to
get our application live on the server. There is a requirement that we will need from the Server
we choose. For the server the requirement is given below:
• Python Server
• SSD Storage
• 99.99% Uptime
• DDOS Protection
• Dual Firewall
• SSL Certificate
• Unlimited- Database
23
3.3. Project Plan Chapter 3. Project Design
Our server specifications may vary overtime as our application upgrades. As well as we will need
enough resource to implement our project. As for we will need personal computer to implement
our project.
24
3.4. Task Allocation Chapter 3. Project Design
We have also compared our time estimations with some similar applications by Delphi Esti-
mation method and finalized the time that we are going to need for our project in the table (3.2)
below:
On the table (3.2) above we are estimating our time that we are going to need for the project.
From that time that we estimated we have formed a Gantt Chart (3.22) that we will follow to the
end which is given below:
25
3.5. Summary Chapter 3. Project Design
The Gantt chart above (3.22) describes the time that we have have worked on the project.
3.5 Summary
On the basis of our project we have done the requirement analysis which consisted the functional
and non-functional requirements. Then there is context diagram which shows the context of design.
Then also the data-flow diagram to show how the features works throughout the system. Then
the mock UI designing which slightly gives an idea how the system will look. Also the detailed
methodology and design describes the methods of our application. On the project planning section
we described the planning to imply our project on time and finally we calculated the allocation of
tasks.
26
Chapter 4
This chapter will cover implementation and the results that we will obtain following testing. In
addition, we’ll debate the evaluation and its findings before moving on to other topics.
27
4.2. Testing and Evaluation Chapter 4. Implementation and Results
This data table contains the information for each of the ISPs that are connected to our application.
They have been provided an ISP id & password from the super admin panel. Also it has their
rating which will be analyzed from the user rating section and connected to here. The following
image (4.2) shows the data of ISP admins of all areas & also their area coverage rating and related
information.
This data table on the following image (4.3) shows the information of all the ISPs and their offered
packages. This also shows their package cost, their offers & related information.
28
4.2. Testing and Evaluation Chapter 4. Implementation and Results
This data table on the following image (4.4) shows the information of all the Subscribers and their
ISP id on which they are connected or subscribed to. It also shows their package info, package
speed, their complain & also reply form their subscribed ISP.
Database of User:
This data table on the following image (4.5) shows the information of all the Users and their
personal information. Such as their email, address, mobile number, user id & many more related
information.
29
4.2. Testing and Evaluation Chapter 4. Implementation and Results
This data table on the following image (4.6) shows the information of all the Users and their
personal information. Such as their user id, subscribed ISP id, package name, subscription fee &
many more related information.
This data table on the following image (4.7) shows the information of all the Users & their billing
information month wise. Again on the next database (4.8) we can see that the transaction id is
also there. The ISP admin can verify with the transaction id, if the user has really paid or not for
better security.
30
4.2. Testing and Evaluation Chapter 4. Implementation and Results
This data table on the following image (4.9) shows the information of all the ISPs and their ratings.
The summed up rating is coming from the user info data table (4.5) where the users can talk about
their service & provide ratings upon their experience. From all that info the summed up rating
will come & user will be able to see on the ISP page while searching. They can watch the ratings
and select their desired ISP from there.
31
4.2. Testing and Evaluation Chapter 4. Implementation and Results
On that particular page a user or isp could able to search their desired ISP & from that page user
could go to registration or to the login page & same goes for the ISPs. The codes shown below
(4.10) confirms those features.
32
4.2. Testing and Evaluation Chapter 4. Implementation and Results
On that particular page a user can find the results that he is expecting from the homepage. From
that result user can visit his desired ISP. The codes shown below (4.11) confirms those features.
33
4.2. Testing and Evaluation Chapter 4. Implementation and Results
On that particular page a user can find the results that he is expecting from the Custom Search
page. He could search as he wants his package, isp, location etc. From that result user can visit
his desired ISP. The codes shown below (4.12) confirms those features.
34
4.2. Testing and Evaluation Chapter 4. Implementation and Results
On that particular page an ISP admin can modify their information such as their packages. Also
they can add a new package as they need or prefer. The page also contains the redirection to
another pages such as to the report management page. The codes shown below (4.13) confirms
those features.
35
4.2. Testing and Evaluation Chapter 4. Implementation and Results
36
4.2. Testing and Evaluation Chapter 4. Implementation and Results
On that particular page an ISP admin can can solve any customer’s report that the subscribers
have given about their service. Also they can solve the issue from that panel and give report to
the user as the problem has been solved. The codes shown below (4.15) confirms those features.
37
4.2. Testing and Evaluation Chapter 4. Implementation and Results
38
4.2. Testing and Evaluation Chapter 4. Implementation and Results
The following images (4.17) shows that the users can select a new subscription from the ISP page
& from there they can pay their payment. Also there is a monthly payment method from the user
panel.
39
4.3. Results and Discussion Chapter 4. Implementation and Results
4.4 Summary
Throughout this chapter, we’ve talked about testing, implementation, and the outcomes that
followed. During the environmental setup process and project completion, we used HTML5 and
CSS3, Bootstrap, and JavaScript for front-end development. For the back end, we used databases
connected via MySql. We utilized XAMPP for the localhost. The project evaluation for our
project has been summed up. We also talked about the testing we did on our features. Finally,
upon examination, the deliverable has been identified.
40
Chapter 5
In this section we are going to describe about the methods and design along with the Standards
and Constraints in section 4.2 also about the budget and cost analysis on section 4.3
• Coding
• Version Controlling
• Ethics(Principals)
We will describe them all one by one and talk about why we decided them to be our application’s
standards.
41
5.1. Compliance with the Standards Chapter 5. Standards and Design Constraints
5.1.2 Coding
As our application is python based, we have used the standards of PEP-8:Style Guide for Python
Code. As we have used JavaScript we also followed its coding guidelines as needed.
5.1.5 Ethics(Principals)
We’ve broken down our ethical principles into eight categories. They’re all detailed below, indi-
vidually.
1. Product: Software engineers must guarantee that the software on which they work is helpful
and of adequate standard to the community, the employer, the client, and the user; that it
is produced on time and at a lower cost; and that it is error-free, to the greatest extent.
Software engineers, in particular, must, when needed.
• Verify that the software requirements on which they operate are adequately documented,
satisfy the user’s needs, and have the client’s consent.
• Ensure that each project on which they work or propose has acceptable and attainable
goals and expectations.
• Ensure that the software and related papers on which they work are thoroughly tested,
debugged, and reviewed.
2. Public: Software engineers must operate in ways which are consistent with the safety of the
community, security, and welfare in their professional roles for the public.
• Any current or perceived threat to the user, a third party, or perhaps the environ-
ment that they presume is associated with the software or relevant materials for which
they are accountable, or merely know about, should be disclosed to relevant persons or
authorities.
• Not putting one’s own personality, an employer’s benefit, a client’s involvement, or a
user’s interest before the interest of the public.
• Make an effort to create software that is inclusive. Language, unique abilities, access
controls, psychological connect, economic benefit, and resource allocation should all be
taken into account.
• When the opportunity arises, contribute expert skills to the test causes and participate
in public awareness in the discipline.
42
5.1. Compliance with the Standards Chapter 5. Standards and Design Constraints
3. Judgement: Software engineers must defend both the impartiality of their clinical judge-
ment and their credibility for such expertise, to the greatest extent and consistent with
Principle and follow such judgments.
• Maintain a strong impartiality when evaluating any software or associated papers they
are given.
• Sign only documents that are prepared beneath their oversight and then within their
areas of expertise.
• Receive payment only from one client for whichever given project or service, unless the
circumstances have been fully revealed to the parties involved and they have provided
their assent.
4. Client & Employer: In professional matters, software engineers must always operate as
loyal representatives and fiduciaries of their client or employer, consistent with public health,
safety, and welfare and follow given rules.
• Use a client’s or employer’s property only within ways that have been officially permit-
ted, and only with the client’s or employer’s knowledge and approval.
• Detect, record, and disclose any faults or issues of social significance in the software or
associated documents about which they operate or part to their employer or client.
5. Management: A software engineer in a common managerial position must act properly and
enable and support those they supervise to fulfill their individual and collective responsibili-
ties, including those outlined in this code. Those software developers in leadership positions,
in particular must follow the rules below.
• Assign tasks only after considering the acceptable benefits of training and experience,
as well as a willingness to expand on those contributions.
• Allowing a superior to take a better position for which he or she is competent is not
unjustifiable.
• Asking an employee to do something that violates this guideline is not a good idea.
6. Profession: In all professional affairs, software engineers must promote the integrity of
their profession in a manner that is compatible with healthcare system, security, and welfare.
Software engineers, in particular must follow the rules of profession described below.
7. Colleagues: Software developers must treat all of their coworkers fairly and take proactive
measures to promote collegiality. Software engineers, in particular must follow the rules
below for colleagues.
43
5.2. Design Constraints(Impact) Chapter 5. Standards and Design Constraints
8. Self: Throughout their careers, software engineers should try to improve their abilities to
advance their career as it should have been practiced. Software engineers, in particular, must
always strive to the following rules.
• Enhance their knowledge of the technology and papers they deal with, as well as the
context in which they’re utilized.
• Improve their understanding of the code, how to read it, and how to apply it to their
task.
• Avoid from pressuring or persuading everyone else to take necessary steps that would
violate the code.
Those were the ethics that we have chosen to deal our project with as to be followed carefully in
a well behavioural manner.
• Ethical Constraint(Impact)
• Economic Constraint(Impact)
• Social Constraint(Impact)
• Manufacturability(Impact)
We will describe them all one by one and talk about why we decided them to be our application’s
design constraints.
• Data Privacy: If system control falls into the wrong hands, confidential material could be
used for unethical purposes.
• Return Value: If the project fails to convince ISPs and users to participate, this may be a
waste of money and resources.
• Long Term Impact: We can expand this project to the entire country later if it proves to
be a success, as the ISP is expected to grow over time.
• Cheaper or easier to Achieve: Customers are allowed to access services rapidly and
effortlessly, while ISPs will indeed be able to obtain valuable customers in the most efficient
manner possible.
44
5.2. Design Constraints(Impact) Chapter 5. Standards and Design Constraints
• Competition: The presence of all ISPs and users on a single platform might very well
increase competition among ISP companies, resulting in higher service quality.
5.2.4 Manufacturability(Impact)
In terms of manufacturability, we have found the profit part to be the most relevant to our research.
• Profit: Making a profit in the early stages may be difficult without investment.
These were our project’s Design Constraints (Impact). It could change depending on whether our
application improves or degrades over time. The less negative impact that could occur, the more
reliant our application will be in the future.
45
5.3. Budget & Cost Analysis Chapter 5. Standards and Design Constraints
As we have estimated a budget, we have also estimated an income source from it. As we can
see on the cost analysis table (5.2) we have the income source only from the ISPs. As we have
mentioned earlier that 6000 subscribers are using our application in a year and they are subscribed
to different ISPs. So if they are paying per month to the ISP, we will charge a 5% of their monthly
payment from the ISP. So if the average payment from user is 800 taka in a month, we will charge
an extra 5% charge on that 800 taka from the ISP. That becomes 40 taka from a user. As converted
to 1 year of payment it becomes 240,000 taka income in a year for us.
The budget and cost analysis that we have considered above, we can see that in the first year
there will be not as such as income rather than we have invested. But we have an estimate if we
lower our budget every year our income rate will automatically increase.
46
5.3. Budget & Cost Analysis Chapter 5. Standards and Design Constraints
If we see the chart (5.1) above we can see that, on the first year our budget was 350,000 taka,
year by year our budget is decreasing. As our budget is decreasing our income is also increasing.
Not that our users will not increase. As our users increase our income will be more year by year.
47
5.4. Complex Engineering Problem Chapter 5. Standards and Design Constraints
48
5.4. Complex Engineering Problem Chapter 5. Standards and Design Constraints
and total understanding of database knowledge. Domain and hosting is also an important
part to add. We would need some analytical, testing and debugging skills to make sure the
project works to the expectation. There is possibility that we would use GPS for location
tracking and so a good knowledge of API’s maybe useful at some point.
• Range Of Conflicting Requirement: There are some conflicting areas in terms of ISP’s
integration as well as from development perspective. AS we going to assemble all the ISP’s
in a single platform, so there is possibility that different ISP’s may have different demand,
opinion and conditions to join this platform. So, we have to work through all of that to
make this project possible. There is also some development conflicts like choosing the right
framework and design from the numerous options and whether choosing as a web based
application is a right decision or not.
• Depth Of Analysis: There is no websites or such platform that is working on same kind
of problem. So, there is no Obvious solutions on this issue. So we need to think and analyse
from the very basic considering all the possibilities to implement this system.
• Interdependence: First of all, we need to collect all the data that needed to run our website
and we need process the data and through several training we have to ensure that our website
is working according to our interest and final testing to measure our website accuracy.
49
5.5. Summary Chapter 5. Standards and Design Constraints
5.5 Summary
Based on the foregoing discussion and our research’s complicity with all of the other standards
and constraints, as well as Complex Engineering problems and Complex Engineering activities, it
is reasonable to conclude that our research is a complex engineering problem, and the solution or
conclusion of our studies is a Complex Engineering Problem solution.
50
Chapter 6
Conclusion
In this chapter, we will discuss the summary of our project, its limits, and the work that we will
perform in the future for our project.
6.1 Summary
All of the above-mentioned chapters contain information regarding our entire project. In Chapter
1, for example, we described our project overview, motivation, aims and objectives, methodology,
the project’s outcome, and explanations of each of them. Er explored the background of our
research in Chapter 2. We shared our literature reviews, analogous applications to our study,
relevant research that is tied to our research in some way or another, gap analysis, and summaries
of all of them. The project design was described in Chapter 3. We glanced at the requirements,
as well as diagrams like the context diagram and Dataflow diagram. Then, in the same chapter,
we reviewed our project’s methodology and design, as well as the project’s plan and job allocation
for each of the works we’ll be implementing. The standards and design restrictions for our project
were then discussed in the next chapter, Chapter 4. In that chapter, we also discussed our project’s
budget and cost analysis.
6.2 Limitation
Our project has some limitations. As far we are concerned about our project the limitations are
the lack of manpower in our team. Our project needs lot of manpower in the field. Though at a
time, we are confident that, our work will be a talk of the town. To get to that point, we’ll need
a lot of manpower to offer our program to users and ISPs. After that we could easily upgrade our
system time to time. As far as we are concerned software implementation, application management
isn’t a bigger deal for us. So all we could say time by time there could be limitations arising. With
a better manpower we could attain our goal easily.
51
6.3. Future Work Chapter 6. Conclusion
52
References
[2] Alisha Stein and Balasubramani Ramaseshan. Customer referral behavior: do switchers and
stayers differ? Journal of Service Research, 18(2):229–239, 2015.
[4] Sunil Erevelles, Shuba Srinivasan, and Steven Rangel. Consumer satisfaction for internet ser-
vice providers: an analysis of underlying processes. Information Technology and Management,
4(1):69–89, 2003.
[5] Afaq Alam Khan, Sanjay Jamwal, and Mohammad Mehdi Sepehri. Applying data mining to
customer churn prediction in an internet service provider. International Journal of Computer
Applications, 9(7):8–14, 2010.
[6] Suchithra Rajendran and John Fennewald. Improving services offered by internet providers
by analyzing online reviews using text analytics. arXiv preprint arXiv:2008.06957, 2020.
[7] Duarte Brito, Pedro Pereiraz, and João Vareda. On the incentives of an integrated isp to favor
its own content. 2014.
[8] Sam CM Lee and John CS Lui. On the interaction and competition among internet service
providers. IEEE Journal on Selected Areas in Communications, 26(7):1277–1283, 2008.
[9] Md Karim, Xu Zhao, et al. Promotional activities in order to win more customers: A case-
study of an isp in bangladesh, 2011.
[10] Paramaporn Thaichon, Antonio Lobo, and Ann Mitsis. Achieving customer loyalty through
service excellence in internet industry. International Journal of Quality and Service Sciences,
2014.
[11] Sheng-Tun Li, Li-Yen Shue, and Shu-Fen Lee. Business intelligence approach to supporting
strategy-making of isp service management. Expert Systems with Applications, 35(3):739–754,
2008.
[12] Triangle it,largest data and internet service provider (isp), http://www.triangle.com.bd, 2022,
Jan 2022.
53
References References
[15] Link 3, largest internet service provider(isp), https://www.link3.net, 2022, Jan 2022.
[19] Bangladesh software development, software solutions, http://bsdbd.com/, 2022, Jan 2022.
54