Professional Documents
Culture Documents
2
Network Diagram: Activity on Arrow representation
B
1 2 D
A
4
C
Start
E
3 F
End
Activity on Arrow (A-O-A) representation:
Network shows each activity as an arrow, and the
nodes represent the starting and ending points
3
Network Diagram: Activity on Node representation
B D
A F
C E
A dummy activity is added to a project schedule as a placeholder. A dummy activity is employed when a logical
relationship between two activities cannot be linked in A-O-A representation. It consumes zero duration 5
Estimating time and cost
1. Expert Judgement: Expertise should be considered from
individuals or groups with specialized knowledge or training in
Schedule development, management, and control, Expertise
in estimating; and Discipline or application knowledge
7
Estimating entire project time: Forward Pass
Let us consider an example project.
8
Estimating entire project time: Forward Pass
Early Early
start finish
activity
duration
2 5 5 7
B D
3 2
0 2 8 9
A F
2 1
A Gantt chart is a project management tool assisting in the planning and scheduling of projects of all sizes,
although they are particularly useful for simplifying the visual representation of complex projects.
10
Identifying Critical activities: Backward Pass
Early Early
start finish
Forward Pass
activity
Late Durat Late
start ion finish
2 5 5 7
B D
3 3 6 6 2 8
0 2 8 9
A F
0 2 2 8 1 9
A-C-E-F Late
start
Durat
ion
Late
finish
2 1 5 5 1 7
B D
3 3 6 6 2 8
0 0 2 8 0 9
A F
0 2 2 8 1 9
2 0 4 4 0 8
C E
2 2 4 4 4 8
Total Float = Late Finish – Early Finish (or) Late Start – Early Start
• Record the optimistic time (a): This represents the minimum reasonable
period of time during which the activity can be completed.
• Record the most likely time (m): This is the time required to complete an
activity based on typical conditions and historical information.
• Record the pessimistic time (b): This is the maximum reasonable period
of time the activity would need to be completed.
13
Understanding PERT graphically
Mean =
Variance =
14
Recollect Central Limit Theorem
• If you keep drawing larger and larger samples and taking their sums,
the sums form their own normal distribution (the sampling distribution),
which approaches a normal distribution as the sample size increases.
• Mean of the resulting normal distribution will be the sum of individual
means
• Variance of the resulting normal distribution will be the sum of individual
variances
15
EXAMPLE : Let us consider a Technology Infrastructure Project
Best case Most likely Worst case Critical Weighted Variance of
ID Activity (Te) of Critical Variance =
duration (Tp) duration (Tm) duration (Tp) Activity? Activity Critical
Activities [(Tp-To)/6]2
estimate (Te) Activities
1 Gather data 1 3 5 No 3 0
2 Study Feasibility 2 4 5 Yes 4 4 0 0
Prepare Problem Definition
3 1 1 2 Yes 1 1 0 0
Report
4 Interview Users 3 5 10 Yes 6 6 1 1
5 Study Existing System 5 8 12 No 8 1
6 Define User requirements 3 5 8 Yes 5 5 1 1
7 Prepare System Analysis Report 1 1 2 Yes 1 1 0 0
8 Input and Output 5 8 12 No 8 1
9 Processing and Database 7 10 14 Yes 10 10 1 1
10 Evaluation 1 2 5 Yes 2 2 0 0
11 Prepare System Design report 2 2 5 Yes 3 3 0 0
12 Software development 10 15 20 Yes 15 15 3 3
13 Hardware development 3 10 24 No 11 12
14 Network development 6 6 12 No 7 1
Prepare System development
15 2 2 8 Yes
report 3 3 1 1
16 Software testing 5 6 10 Yes 7 7 1 1
17 Hardware testing 3 4 6 No 4 0
18 Network testing 2 4 5 No 4 0
19 Prepare Testing Report 1 1 4 Yes 2 2 0 0
20 Training 2 4 8 Yes 4 4 1 1
21 System Conversion 1 2 2 No 2 0
22 Prepare Implementation Report 1 1 2 Yes 1 1 0 0
63 9
Std. Dev 3
17
EXAMPLE:
Estimated Project Duration = Mean TE = 63 days; with a Std. Dev of 3
days. What is the probability that project will be completed before 65
days?
19
Risk Planning
Project risk is defined as, "an uncertain event or condition that, if it occurs, has a positive or
negative effect on a project’s objectives. Project risk is something that Project manager should be
able to anticipate, and manage, as part of Project Risk Management.
Monitor &
Identify Perform Risk Plan Risk control
Risks Analysis Responses Risks
20
Identify Risks
Some Sources for Risk Identification:
• Stakeholder Register
• Project team members
• Enterprise Environmental Factors
• Organizational Process Assets
• Schedule estimates
• Cost estimates
• Scope Baseline
• Assumptions Log
• Lessons learned Register
• Business requirements document
• Agreements or Procurement
documents
• Resource Management Plan
22
Risk Register
A log of identified risks along with their root causes, likelihood of occurrence (probability), consequences (impact)
and risk responses is called Risk Register
23
Plan Risk Responses *Scope Creep: uncontrolled changes in
scope
**Gold plating: Adding extra features at
no additional cost to the client or without
RISK RESPONSE client’s approval
STRATEGIES
• Adopt this strategy where the • Adopt this strategy where risk • If the level of risk is high and • This strategy attempts to • Where no proactive risk
level of overall project risk is is significantly positive and firm is unable to address it reduce the probability of response strategy is possible
significantly high and outside the agreed-upon risk effectively, a third party may occurrence and/or impact of a to address overall project
negative. thresholds for the project. be involved to manage the threat risk, the organization may
• This involves taking focused • This involves taking focused risk on behalf of the firm. • This strategy attempts to choose to continue with the
action to eliminate the action to capture the positive • In case of negative high risk, enhance the probability of project as currently defined,
negative effect of uncertainty effect of uncertainty on the this may involve payment of a occurrence and/or impact of even if overall project risk is
on the project as a whole and project as a whole risk premium. an opportunity outside the agreed upon
bring the project back within • NOT TO BE CONFUSED • In the case of positive high thresholds.
the thresholds WITH SCOPE CREEP* OR risk, ownership may be • Acceptance can be either
GOLD PLATING**! shared in order to reap the active or passive
associated benefits.
Example: Removal of high-risk Example: Modifying project Examples: Purchasing an Examples: Replanning the Examples:
elements of scope from the scope through formal change insurance, launching a joint project, Adjusting schedules, For active acceptance – include
project through a formal change requests to accommodate venture or special-purpose modifying project priority, contingency reserves
request inclusion of high-benefit company, or subcontracting key changing resource allocations For passive acceptance –
elements to stakeholders elements of the project through formal change requests Periodic reviews 24
Appendix
25
Summary of Session3
• Project visualization using network diagrams
• Estimation methods (expert judgement, analogous estimation,
parametric estimation, bottom-up method)
• Critical Path method: Forward Pass, Backward pass, Float
• What is PERT and how is it different from Critical Path Method
(CPM)?
• What is risk planning, stages, associated tools and artifacts?
26
Dummy activity in A-O-A example
27
Define Scope
• The preparation of a detailed project scope statement builds upon
the major deliverables, assumptions, and constraints that are
documented during project initiation.
• During project planning, the project scope is defined and described
with greater specificity as more information about the project is
known.
• Existing risks, assumptions, and constraints are analyzed for
completeness and added or updated as necessary.
• Defining Scope can be highly iterative. In iterative life cycle projects,
a high-level vision will be developed for the overall project, but the
detailed scope is determined one iteration at a time, and the detailed
planning for the next iteration is carried out as work progresses on
the current project scope and deliverables.
28
Importance of Work Packages
• A work package is the smallest unit of a Work Breakdown
Structure
• They cannot be broken down further (decomposed) into another
smaller deliverables
• Project cost and schedule estimations are performed at work
package level, aggregating upwards in WBS
• A work package gives a sense of achievement to project team
and satisfy stakeholder(s) with some tangible value
• Work packages help in performance tracking of the project
using a commonly used technique – earned value management
29
Rules to follow: A-O-A network representations
1.No single activity can be represented more than once in a
network. The length of an arrow has no significance.
2.Before an activity can be undertaken, all activities preceding it
must be completed. That is, the activities must follow a logical
sequence (or – interrelationship) between activities.
3.In assigning numbers to events, there should not be any
duplication of event numbers in a network.
4.Dummy activities must be used only if it is necessary to reduce
the complexity of a network.
5.A network should have only one start event and one end event.
30
Critical Path Method
• The critical path method is used to estimate the minimum project duration
and determine the amount of schedule flexibility on the logical network
paths within the schedule model
• The critical path is the sequence of activities that represents the longest
path through a project, which determines the shortest possible project
duration
• The total float or schedule flexibility is measured by the amount of time that
a schedule activity can be delayed or extended from its early start date
without delaying the project finish date or violating a schedule constraint.
• Total Float = Late Finish – Early Finish (or) Late Start – Early Start
• Free float is how long an activity can be delayed, without delaying the
Early Start of its successor activity.
• Free Float = Early Start date of the next activity - Early Finish date of the activity
• A critical path is normally characterized by zero total float on the critical
path.
31