SlideShare uma empresa Scribd logo
1 de 39
Scheduling Diagrams
Syed Saqib Raza Rizvi
Lecture Final 1 and 2
Project Network Diagram:
• Pictorial representation of project schedule
• A network diagram in project management is useful for planning and tracking
the project from beginning to finish.
• A project network is a graph (flow chart) depicting the sequence in which a
project's terminal elements are to be completed by showing terminals
elements and their dependencies.
• It is always drawn from left to right to reflect project chronology.
Project Network Diagram:
• The work breakdown structure or the product breakdown
structure show the "part-whole" relations.
• In contrast, the project network shows the "before-after" relations.
• The most popular form of project network diagram is Activity on
Node (“AON” as shown in previous slide).
• The other one is Activity on Arrow (“AOA”)
• Project dependencies can also be depicted by a predecessor table.
• Although such a form is very inconvenient for human analysis
Activity on Node Example:
• Activity-on-node is a project management term that refers to
a precedence diagramming method which uses boxes to denote
schedule activities.
• These various boxes or “nodes” are connected from beginning to end
with arrows to depict a logical progression of the dependencies
between the schedule activities.
• Typically, an activity-on-node diagram will be designed to show which
activities must be completed in order for other activities to
commence.
• This is referred to as “finish-to-start” precedence – meaning one
activity must be finished before the next one can start.
Predecessor Relationships for Software Development
Activity Identifier Code Activity Description Immediate Predecessors
1 Requirement Engineering None
2 Feasibility Report None
3 Planning None
4 Architecture Design 1
5
6
ROI
Team Management
2 , 3
3
7 Low level Design 4
8
9
10
11
12
UI Design
Payment Plan
Code and Development
White Box Testing
Acceptance Testing
4
5
7 , 8
10
11
Activity on Node Example:
• Predecessor activity and Successor activity
• An activity-on-node diagram can be used to provide a visual
representation of the network logic of an entire project schedule.
Start
Requirement
Engineering
Feasibility
Report
Architecture
Design
ROI
Team
Management
Low-level
Design
User Interface
Design
Code &
Development
Payment Plan
White Box
Testing
END
Planning
Acceptance
TestingLeaf
Activity on Node Example:
The condition for a valid project network is that it
doesn't contain any circular references.
Activity
1
Activity
2
Activity
3
Activity
4
Activity on Arrow Example:
• ADM is used for scheduling activities in a project plan.
Project Network Diagram:
• It represents a project’s critical path as well as the scope for the
project.
• Using the arrow and node method, you can depict project
dependencies.
Critical Path Method:
• Critical path method is one of the frequently used techniques in project
planning.
• A typical project has many tasks involving lots of different people so project
managers have a hard time keeping track of things.
• It is far too easy for certain activities to fall behind.
• These forgotten tasks and errors in planning can severely affect the time
scale of the whole project.
• A late project will cost money and lead to non-satisfied customers.
• Critical path method helps managers figure out two very important things:
1. How long it will take to complete the project
2. what are the critical tasks that must be completed before starting other
dependent tasks.
Critical Path Method:
• The best way for project managers to avoid poor planning is to
incorporate the critical path method in their diagrams.
• Having this as a diagram makes it easy to visualize the important
tasks of a project.
• The main aim is to produce a visual of the entire project broken down
into smaller activities which are vital to the completion of the entire
project.
• All of the activities which are added onto the network diagram are
ones which have to be completed on time.
• By adding them on to a diagram it is possible to see how long each
section will take.
Critical Path Method:
The benefits of applying each of the set time critical and essential
activities to a diagram include:
• Predicating the time each activity will take and offering a timescale to
the client
• Seeing how each section is important to the progress of the rest of
the plan
• Assigning the right team and department to their corresponding tasks
Critical Path Method: MOST LIKELY TIME
Critical Path Method: MOST LIKELY TIME
Critical Path Method: MOST LIKELY TIME
• The team’s job is to take note of which of the nodes D, E, and F, will
be taking the most amount of time, and which of those nodes is
expected to take the least amount of time.
• This is essential when creating the Critical Path.
• Nodes A, B, and C run in series, so the critical path is straightforward.
Critical Path Method: MOST LIKELY TIME
• Notice that between the three nodes that run in parallel, (nodes D, E,
and F) node D is expected to take the longest to complete as
compared to the other two nodes.
• The line above shows the critical path. By looking at the Activity
Network Diagram the team can easily see that the expected
completion time as defined by the critical path is 50 days.
(5+2+12+9+10+7+5 = 50 days) That’s the MOST LIKELY time.
Critical Path Method: Optimistic Time
• The team might want to know what the best case (Optimistic Time),
in terms of time, would be. To come up with that number, the team
would decide upon the shortest possible time for each of the nodes,
and then add those up. The numbers in parenthesis are the most
optimistic times. (4+2+10+8+8+7+4 = 43)
Critical Path Method: Pessimistic Time
• The team also might want to know what the worst case (Pessimistic
Time), in terms of time, would be. To come up with that number, the
team would decide upon the longest possible time for each of the
nodes, and then add those up. Note: To determine the best case or
the worst case, the critical path line must be followed. The numbers
in parentheses are the most pessimistic times.(7+3+14+10+11+8+6 =
59) .
Critical Path Method: Expected Time
• Expected Time:
Critical Path Method: Control Bands
• Control Bands:
50.3 + 2.7 = 53 on the high side
50.3 – 2.7 = 47.6 on the low side.
For the critical path, we can expect the project to take from 47.6 days to 53.0 days.
PERT Chart:
• PERT stands for Program Evaluation Review Technique, a
methodology developed by the U.S. Navy in the 1950s to manage the
Polaris submarine missile program
• A PERT chart is a project management tool used to schedule,
organize, and coordinate tasks within a project.
• Most popular in the fields of business management and quality
control
Gantt-Chart:
• A Gantt chart is a type of bar chart, devised by Henry Gantt in the
1910s, that illustrates a project schedule.
• Gantt charts illustrate the start and finish dates of the terminal
elements and summary elements of a project. Terminal elements and
summary elements comprise the work breakdown structure of the
project.
• Modern Gantt charts also show the dependency (i.e., precedence
network) relationships between activities.
Gantt-Chart:
Gantt-Chart:
Critical Chain Method:
• CCM was used to develop the project schedule.
• However, in today’s fast moving era, a project manager has to build
an aggressive and realistic schedule because time is important,
resources are costly, and the organization may be managing many
projects at the same time, requiring cross utilizing of resources.
• In such scenarios in the past, project managers were having
difficulties with managing schedules because of some inherent
drawbacks of the critical path method.
• These projects were having poor responses, such as not being able to
complete on time, over budgeted, and in some cases terminated.
Issues with the Critical Path Method:
• The following are a few issues faced by project managers while
dealing with the schedule based on the critical path method.
• Unlimited Resources
The first issue with the critical path model is that it is an optimistic
model which assumes that all resources will be available at all times
and can be utilized whenever they are needed. However, practically this
was not always possible. Many times this assumption led to delay in
projects and more spending.
Issues with the Critical Path Method:
• Misuse of Float or Slack
Another issue with critical path method is misuse of float or slack.
According to Parkinson’s Law which states that “work expands so as to
fill the time available for its completion,” team members misuse the
slack, causing the project to be delayed.
• Activity Completion Gain/Loss
In the critical path method, even if an activity is completed before its
planned completion date, the time gain cannot be utilized by the next
activity, because the next activity has to wait until its early start date.
Usually this happens because the resource allocated to the next
activity may not be available at the moment.
Critical Chain Method:
• Student Syndrome
The critical path method is also infected with Student Syndrome, where
team members do not start the task until the last moment.
(Path “Start->C->D->E->F->End” is the critical chain)
Critical Chain Method:
• In other words, you can say that the critical chain method is a modified
form of the critical path method. Here, availability of resources is
considered while creating the project schedule.
• In critical chain project management, instead of float, buffers are used.
These buffers are designed in such a way that they completely eliminate
the concept of float or slack.
• Project Buffer: This buffer is placed between the last task and the project
completion date as a non-activity buffer, and this buffer acts as a
contingency for the critical chain activities.
• Feeding Buffers: These buffers are added to the non-critical chain so that
any delay on the non-critical chain does not affect the critical chain.
• Resource Buffer: These buffers are kept alongside the critical chain to
make sure that they are available when they are required.
How to Create the Critical Chain Network Diagram:
Three steps are required to create a critical chain from the critical path. These
steps are as follows:
• Remove all contingencies from activities, regardless of whether you have
added the calculated contingencies or any percentage of it. If you’ve used
the PERT (Program Evaluation and Review Technique) estimate to build the
schedule, replace your estimate with optimistic estimate.
• Align the activities with late finish dates and remove resource constraints.
Give priority to critical chain activities while assigning resources.
• Add feeding buffers to non-critical chains so that their durations become
equal to the critical chain. Add project buffer to end of the critical chain, but
before the project end date. The project buffer should be approximately half
the contingency you removed from the activities. This helps improve the
efficiency, and reduces the schedule duration.
Now, let’s see a real world example:
• Suppose you get a project to construct a building. You build the schedule
based on the critical path method, and start working on it.
• However, during the execution of this project, you happen to know that:
There is a shortage of cement, or Some of the equipment needed by you is
assigned to some other projects, or
One of your key team members is pulled out for some other important tasks by
management.
What will happen now?
Of course this will cause a delay in your project.
Did the critical path not identify the resources required by your project?
Now, let’s see a Real World Example:
The problem was with the resource allocation. Although the critical path had
identified the resources, it did not account for the limited availability of
resources into the schedule. The project schedule was developed optimistically,
assuming that all resources would be available whenever they were needed.
Unfortunately this could not happen in this case, putting the project in trouble.
Therefore, to solve these issues, you made some modifications to the critical
path, considering limited resource availability. Now this critical path has been
converted to the critical chain, and it is more realistic.
Key Features of Critical Chain Management:
• It is a deterministic model
• It avoids mismanagement of slack or float
• It optimizes the utilization of resources
• The project based on the critical chain method completes 10% to 30%
faster than that based on the critical path method
• It is a more practical approach
• It encourages team members to perform efficiently, and
• It improves the productivity
Summary
• Critical chain method is an upgraded version of the critical path method,
which is a more practical approach to developing the project schedule.
• In critical chain method, the availability of resources is taken into
consideration while drawing the network diagram.
• In this method, you use buffers instead of float, which reduce the
mismanagement of float, which is seen in the critical path method.
There is no doubt that the critical chain method is one of the most important
developments in project management recently. This method answers many
shortcomings of the critical path method, provides a realistic schedule,
encourages team members to perform efficiently, and improves productivity.
The End

Mais conteĂşdo relacionado

Mais procurados

Primavera P6 Tips and Tricks
Primavera P6 Tips and TricksPrimavera P6 Tips and Tricks
Primavera P6 Tips and Tricksp6academy
 
Software project-scheduling
Software project-schedulingSoftware project-scheduling
Software project-schedulingsaurabhshertukde
 
Software Project Planning 1
Software Project Planning 1Software Project Planning 1
Software Project Planning 1Gagan Deep
 
S07 Scheduling and Budgeting
S07 Scheduling and BudgetingS07 Scheduling and Budgeting
S07 Scheduling and BudgetingRoland Berberich
 
Project-Planning
Project-PlanningProject-Planning
Project-PlanningRon Drew
 
Software Project Management( lecture 1)
Software Project Management( lecture 1)Software Project Management( lecture 1)
Software Project Management( lecture 1)Syed Muhammad Hammad
 
Work breakdown structure
Work breakdown structureWork breakdown structure
Work breakdown structureNicola2903
 
Spm unit 1
Spm unit 1Spm unit 1
Spm unit 1sweetyammu
 
Project Schedule Management - PMBOK6
Project Schedule Management - PMBOK6Project Schedule Management - PMBOK6
Project Schedule Management - PMBOK6Agus Suhanto
 
Software Project Management: Risk Management
Software Project Management: Risk ManagementSoftware Project Management: Risk Management
Software Project Management: Risk ManagementMinhas Kamal
 
Resource Allocation In Software Project Management
Resource Allocation In Software Project ManagementResource Allocation In Software Project Management
Resource Allocation In Software Project ManagementSyed Hassan Ali
 
PROJECT SCHEDULE
PROJECT SCHEDULEPROJECT SCHEDULE
PROJECT SCHEDULEAjeesh Mk
 
Project Cost Management - PMBOK6
Project Cost Management - PMBOK6Project Cost Management - PMBOK6
Project Cost Management - PMBOK6Agus Suhanto
 
Earned value analysis - presentation
Earned value analysis  -  presentationEarned value analysis  -  presentation
Earned value analysis - presentationProPM Academy
 
06. Project Management Process Groups
06. Project Management Process Groups06. Project Management Process Groups
06. Project Management Process GroupsBhuWan Khadka
 
PMP Lecture 1: Introduction to Project Management
PMP Lecture 1: Introduction to Project ManagementPMP Lecture 1: Introduction to Project Management
PMP Lecture 1: Introduction to Project ManagementMohamed Loey
 

Mais procurados (20)

Primavera P6 Tips and Tricks
Primavera P6 Tips and TricksPrimavera P6 Tips and Tricks
Primavera P6 Tips and Tricks
 
Software project-scheduling
Software project-schedulingSoftware project-scheduling
Software project-scheduling
 
Software Project Planning 1
Software Project Planning 1Software Project Planning 1
Software Project Planning 1
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
S07 Scheduling and Budgeting
S07 Scheduling and BudgetingS07 Scheduling and Budgeting
S07 Scheduling and Budgeting
 
Project-Planning
Project-PlanningProject-Planning
Project-Planning
 
Software Project Management( lecture 1)
Software Project Management( lecture 1)Software Project Management( lecture 1)
Software Project Management( lecture 1)
 
Work breakdown structure
Work breakdown structureWork breakdown structure
Work breakdown structure
 
Spm unit 1
Spm unit 1Spm unit 1
Spm unit 1
 
Project Schedule Management - PMBOK6
Project Schedule Management - PMBOK6Project Schedule Management - PMBOK6
Project Schedule Management - PMBOK6
 
Project Monitoring and Control
Project Monitoring and ControlProject Monitoring and Control
Project Monitoring and Control
 
Software Project Management: Risk Management
Software Project Management: Risk ManagementSoftware Project Management: Risk Management
Software Project Management: Risk Management
 
Resource Allocation In Software Project Management
Resource Allocation In Software Project ManagementResource Allocation In Software Project Management
Resource Allocation In Software Project Management
 
PROJECT SCHEDULE
PROJECT SCHEDULEPROJECT SCHEDULE
PROJECT SCHEDULE
 
Project Cost Management - PMBOK6
Project Cost Management - PMBOK6Project Cost Management - PMBOK6
Project Cost Management - PMBOK6
 
Project Planning Scheduling
Project Planning SchedulingProject Planning Scheduling
Project Planning Scheduling
 
Earned value analysis - presentation
Earned value analysis  -  presentationEarned value analysis  -  presentation
Earned value analysis - presentation
 
software project management
software project managementsoftware project management
software project management
 
06. Project Management Process Groups
06. Project Management Process Groups06. Project Management Process Groups
06. Project Management Process Groups
 
PMP Lecture 1: Introduction to Project Management
PMP Lecture 1: Introduction to Project ManagementPMP Lecture 1: Introduction to Project Management
PMP Lecture 1: Introduction to Project Management
 

Destaque

Precedence Diagramming Method PDM
Precedence Diagramming Method PDMPrecedence Diagramming Method PDM
Precedence Diagramming Method PDMShaiful Amri Mansur
 
Efa ppt 9-2013
Efa   ppt  9-2013Efa   ppt  9-2013
Efa ppt 9-2013Gregory Wing
 
Project schedule network diagram
Project schedule network diagramProject schedule network diagram
Project schedule network diagramsimplesteps
 
New Product Development
New Product DevelopmentNew Product Development
New Product Developmentelsanora
 
Product Launch Team Charter
Product Launch Team CharterProduct Launch Team Charter
Product Launch Team CharterDemand Metric
 
Ch22-Software Engineering 9
Ch22-Software Engineering 9Ch22-Software Engineering 9
Ch22-Software Engineering 9Ian Sommerville
 
Across Project Charter
Across Project CharterAcross Project Charter
Across Project CharterJ Patrick Reirdon
 
Importance of Microsoft Project and Primavera
Importance of Microsoft Project and Primavera Importance of Microsoft Project and Primavera
Importance of Microsoft Project and Primavera Sagar Tilwani
 
Creating a network diagram
Creating a network diagramCreating a network diagram
Creating a network diagramJames Abela
 
SIPOC and New Product Launch
SIPOC and New Product LaunchSIPOC and New Product Launch
SIPOC and New Product LaunchVivek Naik
 
Software Project Management
Software Project ManagementSoftware Project Management
Software Project ManagementAyaz Shariff
 
Project Management, Planning And Analysis Tools
Project Management, Planning And Analysis ToolsProject Management, Planning And Analysis Tools
Project Management, Planning And Analysis Toolsahmad bassiouny
 
Critical path analysis for pmp exam
Critical path analysis for pmp examCritical path analysis for pmp exam
Critical path analysis for pmp examManish Purwar
 
Primavera vs Microsoft project
Primavera vs Microsoft projectPrimavera vs Microsoft project
Primavera vs Microsoft projectWigene Tabamo
 
Network Diagrams
Network DiagramsNetwork Diagrams
Network DiagramsNicola2903
 
The Project's Network Diagram
The Project's Network DiagramThe Project's Network Diagram
The Project's Network DiagramRicardo Viana Vargas
 
Construction Project Managment Techniques
Construction Project Managment TechniquesConstruction Project Managment Techniques
Construction Project Managment Techniquesguestc8140fe
 

Destaque (20)

Precedence Diagramming Method PDM
Precedence Diagramming Method PDMPrecedence Diagramming Method PDM
Precedence Diagramming Method PDM
 
Cpm pert
Cpm pertCpm pert
Cpm pert
 
Efa ppt 9-2013
Efa   ppt  9-2013Efa   ppt  9-2013
Efa ppt 9-2013
 
Project schedule network diagram
Project schedule network diagramProject schedule network diagram
Project schedule network diagram
 
New Product Development
New Product DevelopmentNew Product Development
New Product Development
 
Product Launch Team Charter
Product Launch Team CharterProduct Launch Team Charter
Product Launch Team Charter
 
Ch22-Software Engineering 9
Ch22-Software Engineering 9Ch22-Software Engineering 9
Ch22-Software Engineering 9
 
Across Project Charter
Across Project CharterAcross Project Charter
Across Project Charter
 
Importance of Microsoft Project and Primavera
Importance of Microsoft Project and Primavera Importance of Microsoft Project and Primavera
Importance of Microsoft Project and Primavera
 
Creating a network diagram
Creating a network diagramCreating a network diagram
Creating a network diagram
 
SIPOC and New Product Launch
SIPOC and New Product LaunchSIPOC and New Product Launch
SIPOC and New Product Launch
 
Software Project Management
Software Project ManagementSoftware Project Management
Software Project Management
 
Project Management, Planning And Analysis Tools
Project Management, Planning And Analysis ToolsProject Management, Planning And Analysis Tools
Project Management, Planning And Analysis Tools
 
Construction Management - New Trends
Construction Management - New TrendsConstruction Management - New Trends
Construction Management - New Trends
 
Critical path analysis for pmp exam
Critical path analysis for pmp examCritical path analysis for pmp exam
Critical path analysis for pmp exam
 
Primavera vs Microsoft project
Primavera vs Microsoft projectPrimavera vs Microsoft project
Primavera vs Microsoft project
 
Project scheduling
Project schedulingProject scheduling
Project scheduling
 
Network Diagrams
Network DiagramsNetwork Diagrams
Network Diagrams
 
The Project's Network Diagram
The Project's Network DiagramThe Project's Network Diagram
The Project's Network Diagram
 
Construction Project Managment Techniques
Construction Project Managment TechniquesConstruction Project Managment Techniques
Construction Project Managment Techniques
 

Semelhante a Software Project Scheduling Diagrams

PM-5 chapter project management (1).pptx
PM-5 chapter project management (1).pptxPM-5 chapter project management (1).pptx
PM-5 chapter project management (1).pptxMdSabujHossen2
 
PM-chapter 00005 project management.pptx
PM-chapter 00005 project management.pptxPM-chapter 00005 project management.pptx
PM-chapter 00005 project management.pptxMdSabujHossen2
 
06 project time management
06  project time management06  project time management
06 project time managementAla Ibrahim
 
Project planning and scheduling techniques
Project planning and scheduling techniquesProject planning and scheduling techniques
Project planning and scheduling techniquesShivangi Saini
 
pm--basic.pptx
pm--basic.pptxpm--basic.pptx
pm--basic.pptxssuserbc5970
 
Chapt5.pptx it is notes of the 5th chapter
Chapt5.pptx it is notes of the 5th chapterChapt5.pptx it is notes of the 5th chapter
Chapt5.pptx it is notes of the 5th chapterpreetidamakale
 
Critical Path Method (CPM) & Network Analysis
Critical Path Method (CPM) & Network AnalysisCritical Path Method (CPM) & Network Analysis
Critical Path Method (CPM) & Network AnalysisAsif Sultan Razu
 
3210cpmslideshare-1610302073773770419.pdf
3210cpmslideshare-1610302073773770419.pdf3210cpmslideshare-1610302073773770419.pdf
3210cpmslideshare-1610302073773770419.pdfPabitraMitra3
 
Chapter 4.pptx
Chapter 4.pptxChapter 4.pptx
Chapter 4.pptxssuser8cd298
 
Network diagrams
Network diagramsNetwork diagrams
Network diagramsLii Van
 
vnc.pptx
vnc.pptxvnc.pptx
vnc.pptxPigPug1
 
vnc_1660543731.pptx
vnc_1660543731.pptxvnc_1660543731.pptx
vnc_1660543731.pptxPigPug1
 
PERT AND CPM PROJECT MANAGEMENT
PERT AND CPM PROJECT MANAGEMENTPERT AND CPM PROJECT MANAGEMENT
PERT AND CPM PROJECT MANAGEMENTsalsa moyara
 
Traditional Management System.ppt
Traditional Management System.pptTraditional Management System.ppt
Traditional Management System.pptUtkarshDwivedi74
 
project management -04.ppt
project management -04.pptproject management -04.ppt
project management -04.pptMdHelalHossain6
 
Project Management
Project ManagementProject Management
Project ManagementBenjaminMuganzi
 
Time management pressent
Time management pressentTime management pressent
Time management pressentiklil fairuz
 

Semelhante a Software Project Scheduling Diagrams (20)

PM-5 chapter project management (1).pptx
PM-5 chapter project management (1).pptxPM-5 chapter project management (1).pptx
PM-5 chapter project management (1).pptx
 
PM-chapter 00005 project management.pptx
PM-chapter 00005 project management.pptxPM-chapter 00005 project management.pptx
PM-chapter 00005 project management.pptx
 
06 project time management
06  project time management06  project time management
06 project time management
 
Project planning and scheduling techniques
Project planning and scheduling techniquesProject planning and scheduling techniques
Project planning and scheduling techniques
 
pm--basic.pptx
pm--basic.pptxpm--basic.pptx
pm--basic.pptx
 
Chapt5.pptx it is notes of the 5th chapter
Chapt5.pptx it is notes of the 5th chapterChapt5.pptx it is notes of the 5th chapter
Chapt5.pptx it is notes of the 5th chapter
 
PMNM101 Lesson 2 2022.pptx
PMNM101 Lesson 2 2022.pptxPMNM101 Lesson 2 2022.pptx
PMNM101 Lesson 2 2022.pptx
 
Critical Path Method (CPM) & Network Analysis
Critical Path Method (CPM) & Network AnalysisCritical Path Method (CPM) & Network Analysis
Critical Path Method (CPM) & Network Analysis
 
3210cpmslideshare-1610302073773770419.pdf
3210cpmslideshare-1610302073773770419.pdf3210cpmslideshare-1610302073773770419.pdf
3210cpmslideshare-1610302073773770419.pdf
 
Project Scheduling
Project SchedulingProject Scheduling
Project Scheduling
 
Chapter 4.pptx
Chapter 4.pptxChapter 4.pptx
Chapter 4.pptx
 
Network diagrams
Network diagramsNetwork diagrams
Network diagrams
 
vnc.pptx
vnc.pptxvnc.pptx
vnc.pptx
 
vnc_1660543731.pptx
vnc_1660543731.pptxvnc_1660543731.pptx
vnc_1660543731.pptx
 
Network Analysis- CPM ppt..pptx
Network Analysis- CPM  ppt..pptxNetwork Analysis- CPM  ppt..pptx
Network Analysis- CPM ppt..pptx
 
PERT AND CPM PROJECT MANAGEMENT
PERT AND CPM PROJECT MANAGEMENTPERT AND CPM PROJECT MANAGEMENT
PERT AND CPM PROJECT MANAGEMENT
 
Traditional Management System.ppt
Traditional Management System.pptTraditional Management System.ppt
Traditional Management System.ppt
 
project management -04.ppt
project management -04.pptproject management -04.ppt
project management -04.ppt
 
Project Management
Project ManagementProject Management
Project Management
 
Time management pressent
Time management pressentTime management pressent
Time management pressent
 

Mais de Saqib Raza

The Design and Analysis of Algorithms.pdf
The Design and Analysis of Algorithms.pdfThe Design and Analysis of Algorithms.pdf
The Design and Analysis of Algorithms.pdfSaqib Raza
 
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...Saqib Raza
 
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdfData_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdfSaqib Raza
 
Social Impacts of Artificial intelligence
Social Impacts of Artificial intelligenceSocial Impacts of Artificial intelligence
Social Impacts of Artificial intelligenceSaqib Raza
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course OutlineSaqib Raza
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingSaqib Raza
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice Saqib Raza
 
7 Engineering Profession
7 Engineering Profession7 Engineering Profession
7 Engineering ProfessionSaqib Raza
 
6 software contracts
6 software contracts6 software contracts
6 software contractsSaqib Raza
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual PropertySaqib Raza
 
Itroduction to Business Ethics
Itroduction to Business EthicsItroduction to Business Ethics
Itroduction to Business EthicsSaqib Raza
 
Types of Ethics
Types of EthicsTypes of Ethics
Types of EthicsSaqib Raza
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethicsSaqib Raza
 
Project Management Concepts
Project Management ConceptsProject Management Concepts
Project Management ConceptsSaqib Raza
 
Software Re-Engineering
Software Re-EngineeringSoftware Re-Engineering
Software Re-EngineeringSaqib Raza
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality AssuranceSaqib Raza
 
User Interface Analysis and Design
User Interface Analysis and DesignUser Interface Analysis and Design
User Interface Analysis and Design Saqib Raza
 
Architecture Design
Architecture DesignArchitecture Design
Architecture DesignSaqib Raza
 

Mais de Saqib Raza (20)

The Design and Analysis of Algorithms.pdf
The Design and Analysis of Algorithms.pdfThe Design and Analysis of Algorithms.pdf
The Design and Analysis of Algorithms.pdf
 
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
 
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdfData_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
 
Social Impacts of Artificial intelligence
Social Impacts of Artificial intelligenceSocial Impacts of Artificial intelligence
Social Impacts of Artificial intelligence
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
12 security policies
12 security policies12 security policies
12 security policies
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice
 
7 Engineering Profession
7 Engineering Profession7 Engineering Profession
7 Engineering Profession
 
6 software contracts
6 software contracts6 software contracts
6 software contracts
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual Property
 
Itroduction to Business Ethics
Itroduction to Business EthicsItroduction to Business Ethics
Itroduction to Business Ethics
 
Types of Ethics
Types of EthicsTypes of Ethics
Types of Ethics
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Project Management Concepts
Project Management ConceptsProject Management Concepts
Project Management Concepts
 
Software Re-Engineering
Software Re-EngineeringSoftware Re-Engineering
Software Re-Engineering
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 
User Interface Analysis and Design
User Interface Analysis and DesignUser Interface Analysis and Design
User Interface Analysis and Design
 
Architecture Design
Architecture DesignArchitecture Design
Architecture Design
 

Último

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto GonzĂĄlez Trastoy
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfWilly Marroquin (WillyDevNET)
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 

Último (20)

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 

Software Project Scheduling Diagrams

  • 1. Scheduling Diagrams Syed Saqib Raza Rizvi Lecture Final 1 and 2
  • 2. Project Network Diagram: • Pictorial representation of project schedule • A network diagram in project management is useful for planning and tracking the project from beginning to finish. • A project network is a graph (flow chart) depicting the sequence in which a project's terminal elements are to be completed by showing terminals elements and their dependencies. • It is always drawn from left to right to reflect project chronology.
  • 3. Project Network Diagram: • The work breakdown structure or the product breakdown structure show the "part-whole" relations. • In contrast, the project network shows the "before-after" relations. • The most popular form of project network diagram is Activity on Node (“AON” as shown in previous slide). • The other one is Activity on Arrow (“AOA”) • Project dependencies can also be depicted by a predecessor table. • Although such a form is very inconvenient for human analysis
  • 4.
  • 5. Activity on Node Example: • Activity-on-node is a project management term that refers to a precedence diagramming method which uses boxes to denote schedule activities. • These various boxes or “nodes” are connected from beginning to end with arrows to depict a logical progression of the dependencies between the schedule activities. • Typically, an activity-on-node diagram will be designed to show which activities must be completed in order for other activities to commence. • This is referred to as “finish-to-start” precedence – meaning one activity must be finished before the next one can start.
  • 6. Predecessor Relationships for Software Development Activity Identifier Code Activity Description Immediate Predecessors 1 Requirement Engineering None 2 Feasibility Report None 3 Planning None 4 Architecture Design 1 5 6 ROI Team Management 2 , 3 3 7 Low level Design 4 8 9 10 11 12 UI Design Payment Plan Code and Development White Box Testing Acceptance Testing 4 5 7 , 8 10 11
  • 7. Activity on Node Example: • Predecessor activity and Successor activity • An activity-on-node diagram can be used to provide a visual representation of the network logic of an entire project schedule. Start Requirement Engineering Feasibility Report Architecture Design ROI Team Management Low-level Design User Interface Design Code & Development Payment Plan White Box Testing END Planning Acceptance TestingLeaf
  • 8. Activity on Node Example: The condition for a valid project network is that it doesn't contain any circular references. Activity 1 Activity 2 Activity 3 Activity 4
  • 9. Activity on Arrow Example: • ADM is used for scheduling activities in a project plan.
  • 10. Project Network Diagram: • It represents a project’s critical path as well as the scope for the project. • Using the arrow and node method, you can depict project dependencies.
  • 11. Critical Path Method: • Critical path method is one of the frequently used techniques in project planning. • A typical project has many tasks involving lots of different people so project managers have a hard time keeping track of things. • It is far too easy for certain activities to fall behind. • These forgotten tasks and errors in planning can severely affect the time scale of the whole project. • A late project will cost money and lead to non-satisfied customers. • Critical path method helps managers figure out two very important things: 1. How long it will take to complete the project 2. what are the critical tasks that must be completed before starting other dependent tasks.
  • 12. Critical Path Method: • The best way for project managers to avoid poor planning is to incorporate the critical path method in their diagrams. • Having this as a diagram makes it easy to visualize the important tasks of a project. • The main aim is to produce a visual of the entire project broken down into smaller activities which are vital to the completion of the entire project. • All of the activities which are added onto the network diagram are ones which have to be completed on time. • By adding them on to a diagram it is possible to see how long each section will take.
  • 13. Critical Path Method: The benefits of applying each of the set time critical and essential activities to a diagram include: • Predicating the time each activity will take and offering a timescale to the client • Seeing how each section is important to the progress of the rest of the plan • Assigning the right team and department to their corresponding tasks
  • 14. Critical Path Method: MOST LIKELY TIME
  • 15. Critical Path Method: MOST LIKELY TIME
  • 16. Critical Path Method: MOST LIKELY TIME • The team’s job is to take note of which of the nodes D, E, and F, will be taking the most amount of time, and which of those nodes is expected to take the least amount of time. • This is essential when creating the Critical Path. • Nodes A, B, and C run in series, so the critical path is straightforward.
  • 17. Critical Path Method: MOST LIKELY TIME • Notice that between the three nodes that run in parallel, (nodes D, E, and F) node D is expected to take the longest to complete as compared to the other two nodes. • The line above shows the critical path. By looking at the Activity Network Diagram the team can easily see that the expected completion time as defined by the critical path is 50 days. (5+2+12+9+10+7+5 = 50 days) That’s the MOST LIKELY time.
  • 18. Critical Path Method: Optimistic Time • The team might want to know what the best case (Optimistic Time), in terms of time, would be. To come up with that number, the team would decide upon the shortest possible time for each of the nodes, and then add those up. The numbers in parenthesis are the most optimistic times. (4+2+10+8+8+7+4 = 43)
  • 19. Critical Path Method: Pessimistic Time • The team also might want to know what the worst case (Pessimistic Time), in terms of time, would be. To come up with that number, the team would decide upon the longest possible time for each of the nodes, and then add those up. Note: To determine the best case or the worst case, the critical path line must be followed. The numbers in parentheses are the most pessimistic times.(7+3+14+10+11+8+6 = 59) .
  • 20. Critical Path Method: Expected Time • Expected Time:
  • 21. Critical Path Method: Control Bands • Control Bands: 50.3 + 2.7 = 53 on the high side 50.3 – 2.7 = 47.6 on the low side. For the critical path, we can expect the project to take from 47.6 days to 53.0 days.
  • 22. PERT Chart: • PERT stands for Program Evaluation Review Technique, a methodology developed by the U.S. Navy in the 1950s to manage the Polaris submarine missile program • A PERT chart is a project management tool used to schedule, organize, and coordinate tasks within a project. • Most popular in the fields of business management and quality control
  • 23.
  • 24. Gantt-Chart: • A Gantt chart is a type of bar chart, devised by Henry Gantt in the 1910s, that illustrates a project schedule. • Gantt charts illustrate the start and finish dates of the terminal elements and summary elements of a project. Terminal elements and summary elements comprise the work breakdown structure of the project. • Modern Gantt charts also show the dependency (i.e., precedence network) relationships between activities.
  • 27.
  • 28. Critical Chain Method: • CCM was used to develop the project schedule. • However, in today’s fast moving era, a project manager has to build an aggressive and realistic schedule because time is important, resources are costly, and the organization may be managing many projects at the same time, requiring cross utilizing of resources. • In such scenarios in the past, project managers were having difficulties with managing schedules because of some inherent drawbacks of the critical path method. • These projects were having poor responses, such as not being able to complete on time, over budgeted, and in some cases terminated.
  • 29.
  • 30. Issues with the Critical Path Method: • The following are a few issues faced by project managers while dealing with the schedule based on the critical path method. • Unlimited Resources The first issue with the critical path model is that it is an optimistic model which assumes that all resources will be available at all times and can be utilized whenever they are needed. However, practically this was not always possible. Many times this assumption led to delay in projects and more spending.
  • 31. Issues with the Critical Path Method: • Misuse of Float or Slack Another issue with critical path method is misuse of float or slack. According to Parkinson’s Law which states that “work expands so as to fill the time available for its completion,” team members misuse the slack, causing the project to be delayed. • Activity Completion Gain/Loss In the critical path method, even if an activity is completed before its planned completion date, the time gain cannot be utilized by the next activity, because the next activity has to wait until its early start date. Usually this happens because the resource allocated to the next activity may not be available at the moment.
  • 32. Critical Chain Method: • Student Syndrome The critical path method is also infected with Student Syndrome, where team members do not start the task until the last moment. (Path “Start->C->D->E->F->End” is the critical chain)
  • 33. Critical Chain Method: • In other words, you can say that the critical chain method is a modified form of the critical path method. Here, availability of resources is considered while creating the project schedule. • In critical chain project management, instead of float, buffers are used. These buffers are designed in such a way that they completely eliminate the concept of float or slack. • Project Buffer: This buffer is placed between the last task and the project completion date as a non-activity buffer, and this buffer acts as a contingency for the critical chain activities. • Feeding Buffers: These buffers are added to the non-critical chain so that any delay on the non-critical chain does not affect the critical chain. • Resource Buffer: These buffers are kept alongside the critical chain to make sure that they are available when they are required.
  • 34. How to Create the Critical Chain Network Diagram: Three steps are required to create a critical chain from the critical path. These steps are as follows: • Remove all contingencies from activities, regardless of whether you have added the calculated contingencies or any percentage of it. If you’ve used the PERT (Program Evaluation and Review Technique) estimate to build the schedule, replace your estimate with optimistic estimate. • Align the activities with late finish dates and remove resource constraints. Give priority to critical chain activities while assigning resources. • Add feeding buffers to non-critical chains so that their durations become equal to the critical chain. Add project buffer to end of the critical chain, but before the project end date. The project buffer should be approximately half the contingency you removed from the activities. This helps improve the efficiency, and reduces the schedule duration.
  • 35. Now, let’s see a real world example: • Suppose you get a project to construct a building. You build the schedule based on the critical path method, and start working on it. • However, during the execution of this project, you happen to know that: There is a shortage of cement, or Some of the equipment needed by you is assigned to some other projects, or One of your key team members is pulled out for some other important tasks by management. What will happen now? Of course this will cause a delay in your project. Did the critical path not identify the resources required by your project?
  • 36. Now, let’s see a Real World Example: The problem was with the resource allocation. Although the critical path had identified the resources, it did not account for the limited availability of resources into the schedule. The project schedule was developed optimistically, assuming that all resources would be available whenever they were needed. Unfortunately this could not happen in this case, putting the project in trouble. Therefore, to solve these issues, you made some modifications to the critical path, considering limited resource availability. Now this critical path has been converted to the critical chain, and it is more realistic.
  • 37. Key Features of Critical Chain Management: • It is a deterministic model • It avoids mismanagement of slack or float • It optimizes the utilization of resources • The project based on the critical chain method completes 10% to 30% faster than that based on the critical path method • It is a more practical approach • It encourages team members to perform efficiently, and • It improves the productivity
  • 38. Summary • Critical chain method is an upgraded version of the critical path method, which is a more practical approach to developing the project schedule. • In critical chain method, the availability of resources is taken into consideration while drawing the network diagram. • In this method, you use buffers instead of float, which reduce the mismanagement of float, which is seen in the critical path method. There is no doubt that the critical chain method is one of the most important developments in project management recently. This method answers many shortcomings of the critical path method, provides a realistic schedule, encourages team members to perform efficiently, and improves productivity.