Software Project Management
Software Project Management
COMMUNICATION TECHNOLOGY
MAJOR ASSIGNMENT
SOFTWARE PROJECT MANAGEMENT
TOPICS: SOFTWARE PROJECT
MANAGEMENT FOR THE INFORMATICS
OLYMPIAD
MAJOR ASSIGNMENT
SOFTWARE PROJECT MANAGEMENT
TOPICS: SOFTWARE PROJECT
MANAGEMENT FOR THE INFORMATICS
OLYMPIAD
This project would not have been possible without the guidance,
cooperation, and support of all these individuals. I am truly grateful for their
contribution to its success.
Student
Tu Anh Dai - Tran Minh Quang - Le Van Thao
COMMENT
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
CHAPTER 1: INTRODUCTION................................................................................1
1.1 Project Overview.........................................................................................1
1.2 Project Objectives.......................................................................................1
1.3 Functional Requirement Specification......................................................3
1.4 Non-Functional Requirement Specification.............................................4
1.5 Project Coverage.........................................................................................6
1.6 Software Development Model....................................................................8
1.7 Project personnel........................................................................................9
CHAPTER 2: LIST OF WORKS AND IMPLEMENTATION TIME
ESTIMATION.............................................................................................................10
2.1 Overview of Work Breakdown Structure (WBS)..................................10
2.2 Work breakdown structure.....................................................................13
2.3 Work evaluation and time estimate table...............................................15
CHAPTER 3: PERT DIAGRAM..............................................................................20
3.1 The PERT Diagram..........................................................................................20
3.2 Critical Path Analysis.......................................................................................20
3.3 Total Duration Calculation..............................................................................21
3.4 Total effort Calculation....................................................................................23
CHAPTER 4: RISK MANAGEMENT PLAN.........................................................25
4.1 List of methods using for risk identification method.....................................25
4.2 List of Identified Risks......................................................................................26
4.3 Risk analysis and prioritization table..............................................................27
4.4 Risk management table.....................................................................................30
CHAPTER 5: PROJECT PROGRESS AND COST ASSESSMENT....................33
5.1 Planned vs. Actual Project Execution.....................................................33
5.2 Cost and Schedule Performance Indicators...........................................35
SUMMARY..................................................................................................................39
REFERENCES............................................................................................................41
LIST OF FIGURES
Hình 1 Cloud Computing Platform.......................................................................6
Hình 2. Public Cloud.............................................................................................9
Hình 3. Private cloud...........................................................................................10
Hình 4. Hybrid Cloud..........................................................................................11
Hình 5. Community Cloud..................................................................................12
Hình 6. Create a Virtual Machine.......................................................................23
Hình 7. OS Disk Configuration..........................................................................24
Hình 8. Virtual Machine Details.........................................................................25
Hình 9. Establishing SSH Connection................................................................26
Hình 10. Running the Docker Containers...........................................................31
Hình 11. Accessing the Web Application...........................................................32
CHAPTER 1: INTRODUCTION
8
Apply standardized project management practices to ensure consistency
and reliability throughout the project lifecycle.
Enhance coordination between project teams, stakeholders, and project
managers.
Identify potential risks during the planning phase, such as delays, resource
shortages, or technical challenges.
Implement risk assessment strategies to prioritize and mitigate risks
effectively.
Develop contingency plans to minimize disruptions and maintain project
continuity.
Resource Management:
Notification System
Performance Requirements
The system must handle high-volume data processing and real-time execution to
support a large number of participants effectively:
11
Low-Latency Processing: The platform should evaluate submissions
within milliseconds to provide instant feedback.
Concurrent User Handling: The system must support thousands of
simultaneous participants submitting and interacting with competition
data.
System Response Time: Page loads, ranking updates, and notifications
should occur instantaneously, with a maximum delay of less than 2
seconds.
Data Retrieval Speed: Contestant profiles and results should be accessible
within one second of request execution.
To maintain fair competition and protect user data, the system must
implement robust security measures:
12
End-to-End Encryption: All user data (contestant profiles, submission
history, competition results) should be encrypted to prevent unauthorized
access.
Multi-Factor Authentication (MFA): Ensuring secure participant and
administrator logins.
Role-Based Access Control: Restricting permissions based on user roles
(contestants, judges, organizers).
Backup & Disaster Recovery: Periodic backups should be performed to
prevent data loss due to unexpected system failures.
13
The system adopts a Waterfall-based Work Breakdown Structure (WBS) to
systematically divide the project into manageable tasks and dependencies. This
structured planning ensures that each phase is completed before moving to the
next, reducing risks associated with overlapping processes.
14
Real-Time Progress Monitoring: Allowing stakeholders to track ongoing
activities and completion rates.
Risk Identification Through Timeline Analysis: Detecting potential delays
early and adjusting timelines accordingly.
Stakeholder Visibility: Providing clear communication channels through
graphical project representation.
The Waterfall model is chosen because it aligns with the structured nature
of competition management, where tasks must be well-defined, milestone-
driven, and completed in sequential order. This model provides:
15
Predictability & Risk Control: Reduces uncertainty by maintaining a
fixed workflow, making it suitable for a highly regulated environment.
Years of
No Symbol Full-name experien Field of expertise
ce
1 BA1 Tran Dieu An 2 Business analysis, Testter
16
CHAPTER 2: LIST OF WORKS AND IMPLEMENTATION
TIME ESTIMATION
17
The WBS for this project is designed to align with Waterfall Model, ensuring a
logical flow of execution. Each level in the hierarchy defines progressively smaller
components:
The project is divided into six core phrases that reflect the software life cycle
align with Waterfall Model:
Each major phase is further divided into specific task groups, ensuring clarity
in execution. Example subdivisions include:
Requirement Analysis:
o Defining software functionality based on Olympic Informatics
guidelines.
18
o Identifying technical constraints and compliance requirements.
System Design:
o Creating UI/UX wireframes.
o Establishing database structures and API integrations.
Implementation:
o Developing core algorithms for problem-solving capabilities.
o Writing clean, optimized code adhering to programming best
practices.
At the lowest level, WBS assigns specific tasks to individual developers and
teams, ensuring a clear chain of responsibility. Each work package consists of
measurable deliverables with assigned deadlines and dependencies.
The WBS follows the Waterfall model, dividing the project into six
hierarchical phases:
20
System Design – Structuring system architecture and defining interaction
models.
Implementation – Coding core functionalities, managing event processing,
and optimizing algorithms.
Testing & Debugging – Ensuring system performance, reliability, and
security compliance.
Deployment & Integration – Preparing the system for competition use.
Maintenance & Continuous Improvement – Monitoring, updating, and
refining functionalities post-deployment.
The visual WBS chart organizes these phases into work packages, each
defining detailed tasks to ensure efficient execution and tracking.
21
Algorithm Optimization: Writing efficient program logic suitable for
competition demands.
Feature Integration: Connecting different software modules to ensure
seamless operation.
Phase 4: Testing & Debugging
Unit Testing: Verifying individual components for accuracy.
Integration Testing: Ensuring system-wide compatibility between
modules.
Security & Performance Testing: Validating system efficiency and
data protection measures.
Phase 5: Deployment & Integration
Server Configuration: Setting up hosting environments for software
deployment.
Application Packaging & Distribution: Preparing the system for real-
time use.
Final System Testing: Conducting pre-launch validation checks.
Phase 6: Maintenance & Continuous Improvement
System Monitoring: Tracking application performance metrics.
Bug Fixing & Feature Enhancements: Updating functionalities based
on user feedback.
Scalability Optimization: Preparing for future usage expansions.
23
Implementer
Job Prerequisi Estimat
Job name Complexi
ID Name Knowledge Experience tes ed time
ty
Nghiên cứu hệ
2 thống tương 1 Nga 1 2 3
tự
II Phân tích yêu cầu
Phân tích và
STT 1,
3 xác định yêu 2 An 1 1 4
STT 2
cầu
Mô hình hóa
6 2 Dai 1 2 STT 5 6
hệ thống
Xác định mô
7 2 Quang 1 2 STT 4 5
hình kiến trúc
Mô hình hóa
8 2 Quang 2 1 STT 7, 6 6
kiến trúc
Quản lý
9 Trường tham 2 Thao 2 2 STT 8 8
dự
Quản lý học
10 2 Thao 3 2 STT 9 10
sinh
24
Quản lý thông
11 2 Dai 2 2 STT 8 8
báo
Quản lý thông
12 2 Quang 2 2 STT 8 8
tin cuộc thi
Quản lý Giải
13 2 Nam 2 2 STT 8 8
thưởng
Quản lý Nhà
14 2 Luc 2 2 STT 8 8
tài trợ
Kiểm thử
Quản lý
15 1 An 1 1 STT 9 3
Trường tham
dự
Kiểm thử
16 Quản lý học 1 Thao 1 1 STT 10 3
sinh tham dự
Kiểm thử
17 Quản lý Thông 1 Dai 1 1 STT 11 3
báo
Kiểm thử
18 Quản lý Thông 1 Quang 1 1 STT 12 3
tin cuộc thi
Kiểm thử
19 Quản lý Nhà 1 Nam 1 1 STT 13 3
tài trợ
Kiểm thử
20 Quản lý Giải 1 Luc 1 1 STT 14 3
thưởng
XII
Kiểm thử tích hợp
I
25
Chuẩn bị
X
môi trường
XI Triển khai
Build và đóng
25 2 Dai 2 2 STT 24 8
gói ứng dụng
Theo dõi,
phân tích các
27 hiệu suất, 3 Thao 2 2 stt26 12
chức năng của
hệ thống
XII
Tiếp nhận phản hồi của người dùng
I
Xử lý các lỗi
từ phản hồi
28 2 Thao 2 2 stt 27 8
của người
dùng
XI
Cải tiến tính năng
V
26
CHAPTER 3: PERT DIAGRAM
The PERT diagram maps out the project into interconnected nodes
representing tasks, with directed edges illustrating dependencies. By assigning
estimated time durations—optimistic, pessimistic, and most likely values—the
project team gains insights into possible delays and bottlenecks. This structured
visualization helps assess the critical path, ensuring timely project completion.
Using PERT analysis, the team can proactively mitigate risks, allocate
resources efficiently, and track project progress dynamically. The diagram
enhances decision-making, facilitating adjustments based on real-time
challenges encountered during project execution.
In this project, the PERT diagram was utilized to map out the essential
tasks and dependencies. Through this analysis, the critical path has been
identified, showing the sequence of activities that must be completed on time to
prevent project delays. By determining the earliest start time, latest allowable
completion time, and slack time for each task, we can optimize resource
allocation and streamline execution.
Additionally, the CPA provides insight into project risks associated with
delays in critical tasks. If any task within the critical path is postponed, the entire
project timeline will be affected. Therefore, continuous monitoring and
proactive risk management are required to ensure that these key activities are
completed as scheduled.
Task Sequence: 0 1 3 4 7 8 9 10 16 21 22 23
24 25 26 27 28 29
29
3.4 Total effort Calculation
Effort represents the total amount of work required to complete a project,
usually measured in person-days or person-hours. Unlike Duration, which
defines the overall time required based on task dependencies, Effort accounts for
the actual workload involved across all tasks.
31
CHAPTER 4: RISK MANAGEMENT PLAN
Document Review
Involves analyzing existing project documentation, such as plans,
reports, and contracts.
Helps identify gaps, inconsistencies, or areas prone to risks based on
historical data.
Brainstorming
A collaborative approach where team members openly discuss
possible risks.
Encourages diverse perspectives and creativity in identifying potential
threats.
Delphi Technique
Utilizes anonymous surveys from expert participants to gather
unbiased risk insights.
Helps refine risk identification by aggregating expert opinions through
multiple rounds.
Expert Opinions
Engages industry specialists with extensive experience in similar
projects.
Provides insights into risks that may not be immediately visible to the
project team.
32
Cause-and-Effect (Fishbone) Diagram
A visual tool mapping various risk causes to their potential effects on
the project.
Helps trace root causes and develop targeted risk mitigation strategies.
SWOT Analysis (Strengths, Weaknesses, Opportunities, and Threats)
1. Đánh giá các yếu tố bên trong và bên ngoài có thể gây ra rủi ro hoặc lợi
ích cho dự án.
2. Giúp phân loại rủi ro thành các lĩnh vực có thể quản lý được và ưu tiên
ứng phó rủi ro.
Checklist-Based Analysis
Uses predefined checklists of common risks encountered in similar
projects.
Ensures systematic coverage of potential threats without missing
critical factors.
Stakeholder Analysis
Assesses risks based on stakeholder influence, expectations, and
potential conflicts.
Helps mitigate issues related to engagement and project alignment.
Financial Risks
Mid-project budget shortages due to funding cuts → Unexpected
reductions in sponsorship or budget allocations could disrupt planned
activities.
Unforeseen cost overruns exceeding budget estimates → Additional
expenses from scope changes, material costs, or external factors might
strain financial resources.
33
Scheduling & Time Management Risks
Delays due to higher-than-expected workload → Initial estimations
may be inaccurate, leading to resource constraints and extended
timelines.
Delays caused by team members failing to meet deadlines →
Individual productivity issues may slow down overall project progress.
Implementation Risk
Unclear or poorly defined project documentation → Ambiguous
requirements may lead to misinterpretations, rework, or
implementation errors
34
4.3 Risk analysis and prioritization table.
Risk Analysis
Financial Risks
Mid-project
1 budget shortages 2 3 3 18 High
due to funding
cuts
Unforeseen cost
2 overruns 3 3 3 27 High
exceeding budget
estimates
Delays due to
3 higher-than- 4 3 3 36 Very High
expected
workload
Delays caused by
4 team members 3 3 2 18 High
failing to meet
deadlines
35
Key personnel
5 leaving mid- 3 3 2 18 High
project
Lack of qualified
2 3 2 12 Medium
6 professionals
Internal conflicts
3 2 2 12 Medium
7 affecting team
efficiency
Implementation Risk
Unclear or poorly
2 4 3 24 High
8 defined project
documentation
Cyberattacks
9 targeting the 3 4 3 36 Very High
system
10 System downtime
3 4 2 24 High
or failure
36
4.4 Risk management table
Prior Risk Management Solutions Respons
N Risk’s
ity Avoiding Transferri Mitigati Accepti ible
o name
level ng ng ng Person
1 Mid- High Report to Finance
project senior Manage
budget leadership r
shortages to request
due to budget
funding reallocatio
cuts n
38
tation requirement feedback
s and to
ensure maintain
mutual accuracy
understandi and
ng. relevance
.
9 Cyberatta Very Implement Conduct IT
cks High advanced regular Security
targeting security cybersec Team
the protocols, urity
system including audits
firewalls, and
multi-factor establish
authenticati an
on, and incident
encryption, response
to prevent plan to
unauthorize minimize
d access. damage
in case of
an attack.
1 System High Maintain Prepare IT Team
0 downtim real-time continge
e or backups ncy
failure to ensure plans to
quick resume
restoratio critical
n in case operatio
of failure ns with
minimal
disruptio
n if
failures
happen
39
CHAPTER 5: PROJECT PROGRESS AND COST ASSESSMENT
THE PLAN
COST- COST- COST- COST- COST- COST- COST-
COST- COST-
PLAN PLAN PLAN PLAN PLAN PLAN PLAN
PLAN PLAN
FOR FOR FOR FOR FOR FOR FOR
TASK Days COST FOR FOR
WEEK WEEK WEEK WEEK WEEK WEEK WEEK
WEEK WEEK
4 (15- 6 (29- 8 (43 - 10 (57 - 12 (71 - 14 (85 - 16 (99-
2 (1-14) 18
28) 42) 56) 70) 84) 98) 112)
1 4 4000 4000
2 3 3000 3000
3 4 4000 4000
4 4 4000 4000
6 6 6000 6000
8 6 6000 6000
15 3 3000 3000
40
17 3 3000 3000
18 3 3000 3000
19 3 3000 3000
20 3 3000 3000
21 7 7000 7000
23 8 8000 8000
25 8 8000 8000
29 10 10000 10000
TOT 183 18300 2000 4000 4100 1400 1600
AL days 0 0 0 0 0 0 15000 12000 10000 15000
%
TASKS COST ($) BCWS ($) BCWP ($) ACWP ($)
COMPLED
%
TASKS COST ($) BCWS ($) BCWP ($) ACWP ($)
COMPLED
1 4000 100%
2 3000 100%
3 4000 100%
4 4000 100%
5 3000 100% 1000 1000 1500
6 6000 80% 6000 6300 5500
7 5000 100% 2000 2000 2200
8 6000 100% 6000 6500 6000
9 8000 70% 5000 4000 5200
10 10000 0%
11 8000 90% 5000 4800 5400
12 8000 100% 5000 5000 5500
13 8000 90% 5000 5400 4800
14 8000 100% 5000 5200 6000
15 3000 0%
16 3000 0%
17 3000 0%
42
18 3000 0%
19 3000 0%
20 3000 0%
21 7000 0%
22 8000 0%
23 8000 0%
24 10000 0%
25 8000 0%
26 9000 0%
27 12000 0%
28 8000 0%
29 10000 0%
TOTAL 183000 40000 40200 42100
%
TASKS COST ($) BCWS ($) BCWP ($) ACWP ($)
COMPLED
1 4000 100%
2 3000 100%
3 4000 100%
4 4000 100%
5 3000 100%
6 6000 100%
7 5000 100%
8 6000 100%
9 8000 70% 3000 3300 4000
10 10000 100% 10000 10600 12000
11 8000 60% 3000 3200 3500
12 8000 60% 3000 3400 3600
13 8000 90% 3000 3500 3700
14 8000 50% 3000 3300 4000
15 3000 100% 3000 3200 3900
16 3000 80% 1000 1200 1300
17 3000 100% 3000 3200 3500
18 3000 100% 3000 3300 3900
19 3000 100% 3000 3200 3700
20 3000 100% 3000 3300 4000
21 7000 0%
22 8000 0%
23 8000 0%
24 10000 0%
25 8000 0%
26 9000 0%
27 12000 0%
43
28 8000 0%
29 10000 0%
TOTAL 183000 41000 44700 51100
%
TASKS COST ($) BCWS ($) BCWP ($) ACWP ($)
COMPLED
1 4000 100%
2 3000 100%
3 4000 100%
4 4000 100%
5 3000 100%
6 6000 80%
7 5000 100%
8 6000 100%
9 8000 70%
10 10000 0%
11 8000 90%
12 8000 100%
13 8000 90%
14 8000 100%
15 3000 0%
16 3000 0% 2000 2600 1900
17 3000 0%
18 3000 0%
19 3000 0%
20 3000 0%
21 7000 0% 7000 8000 6900
22 8000 0% 5000 6000 4800
23 8000 0%
24 10000 0%
25 8000 0%
26 9000 0%
27 12000 0%
28 8000 0%
29 10000 0%
TOTAL 183000 14000 16600 13600
44
AT THE END OF WEEK 10
%
TASKS COST ($) BCWS ($) BCWP ($) ACWP ($)
COMPLED
1 4000 100%
2 3000 100%
3 4000 100%
4 4000 100%
5 3000 100%
6 6000 100%
7 5000 100%
8 6000 100%
9 8000 100%
10 10000 100%
11 8000 100%
12 8000 100%
13 8000 100%
14 8000 100%
15 3000 100%
16 3000 100%
17 3000 100%
18 3000 100%
19 3000 100%
20 3000 100%
21 7000 100%
22 8000 30% 3000 3300 3200
23 8000 100% 8000 8500 8400
24 10000 50% 5000 5500 5400
25 8000 0%
26 9000 0%
27 12000 0%
28 8000 0%
29 10000 0%
TOTAL 183000 16000 17300 17000
45
AT THE END OF WEEK 12
%
TASKS COST ($) BCWS ($) BCWP ($) ACWP ($)
COMPLED
1 4000 100%
2 3000 100%
3 4000 100%
4 4000 100%
5 3000 100%
6 6000 100%
7 5000 100%
8 6000 100%
9 8000 100%
10 10000 100%
11 8000 100%
12 8000 100%
13 8000 100%
14 8000 100%
15 3000 100%
16 3000 100%
17 3000 100%
18 3000 100%
19 3000 100%
20 3000 100%
21 7000 100%
22 8000 100%
23 8000 100%
24 10000 60% 5000 6000 3500
25 8000 100% 8000 9000 9500
26 9000 30% 2000 2200 2700
27 12000 0%
28 8000 0%
29 10000 0%
TOTAL 183000 15000 17200 15700
%
TASKS COST ($) BCWS ($) BCWP ($) ACWP ($)
COMPLED
1 4000 100%
2 3000 100%
3 4000 100%
4 4000 100%
5 3000 100%
46
6 6000 100%
7 5000 100%
8 6000 100%
9 8000 100%
10 10000 100%
11 8000 100%
12 8000 100%
13 8000 100%
14 8000 100%
15 3000 100%
16 3000 100%
17 3000 100%
18 3000 100%
19 3000 100%
20 3000 100%
21 7000 100%
22 8000 100%
23 8000 100%
24 10000 100%
25 8000 100%
26 9000 80% 7000 6500 6000
27 12000 60% 5000 6000 7500
28 8000 0%
29 10000 0%
TOTAL 183000 12000 12500 13500
%
TASKS COST ($) BCWS ($) BCWP ($) ACWP ($)
COMPLED
1 4000 100%
2 3000 100%
3 4000 100%
4 4000 100%
5 3000 100%
6 6000 100%
7 5000 100%
8 6000 100%
9 8000 100%
10 10000 100%
11 8000 100%
12 8000 100%
13 8000 100%
14 8000 100%
15 3000 100%
47
16 3000 100%
17 3000 100%
18 3000 100%
19 3000 100%
20 3000 100%
21 7000 100%
22 8000 100%
23 8000 100%
24 10000 100%
25 8000 100%
26 9000 100%
27 12000 100% 7000 7500 5000
28 8000 60% 3000 3300 2100
29 10000 0%
TOTAL 183000 10000 10800 7100
%
TASKS COST ($) BCWS ($) BCWP ($) ACWP ($)
COMPLED
1 4000 100%
2 3000 100%
3 4000 100%
4 4000 100%
5 3000 100%
6 6000 100%
7 5000 100%
8 6000 100%
9 8000 100%
10 10000 100%
11 8000 100%
12 8000 100%
13 8000 100%
14 8000 100%
15 3000 100%
16 3000 100%
17 3000 100%
18 3000 100%
19 3000 100%
20 3000 100%
21 7000 100%
22 8000 100%
23 8000 100%
24 10000 100%
25 8000 100%
48
26 9000 100%
27 12000 100%
28 8000 60% 5000 6000 5500
29 10000 100% 10000 11000 9000
TOTAL 183000 15000 17000 14500
49
CPI < 1 → Project is cost-inefficient (exceeding budget).
Schedule Performance Index (SPI)
o Formula: SPI = BCWP / BCWS
o Meaning: Measures schedule efficiency, showing whether the
project is progressing as planned.
o Interpretation:
SPI > 1 → Ahead of schedule.
SPI < 1 → Behind schedule.
Budget at Completion (BAC): Total planned budget for the entire project.
BAC = 183000
Since IEAC (174,261) is lower than the planned BAC (183,000), the project
is projected to be completed under budget, resulting in cost savings.
Since ISAC (139 days) is greater than the planned duration (124 days), the
project is expected to take longer than scheduled
The project is behind schedule (SPI < 1), meaning work completion is
slower than planned.
However, cost performance is positive (CPI > 1), meaning spending is
controlled effectively.
51
The graph confirms that while budget utilization is efficient, schedule
delays require attention to ensure timely completion.
52
SUMMARY
Results & Achievements
This project successfully implements fundamental project management
principles, focusing on:
53
These factors highlight the importance of continuous monitoring and
adaptability in project management.
54
REFERENCES
[2] Meredith, J. R., Mantel Jr., S. J., & Shafer, S. M. (2017). Project
Management: A Managerial Approach. Wiley.
[4] Hillson, D., & Simon, P. (2012). Practical Project Risk Management:
The ATOM Methodology. Berrett-Koehler.
[5] The Successful Software Manager: The definitive guide to growing from
developer to manager by Herman Fung
55