Chapter 06.ppt china university -project

rahmanabmm 0 views 68 slides Oct 15, 2025
Slide 1
Slide 1 of 68
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68

About This Presentation

opm


Slide Content

Chapter 6Chapter 6
Developing a Project PlanDeveloping a Project Plan

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
22

3
Useful AbbreviationsUseful Abbreviations
•PERT - Program Evaluation and Review
Technique
•CPM - Critical Path Method

4
BackgroundBackground
•Schedule is the conversion of a project action
plan into an operating timetable
•Basis for monitoring a project
•One of the major project management tools
•Work changes daily, so a detailed plan is
essential
•Not all project activities need to be scheduled at
the same level of detail

5
Background ContinuedBackground Continued
•Most of the scheduling is at the WBS level, not
the work package level
•Only the most critical work packages may be
shown on the schedule
•Most of the scheduling is based on network
drawings

6
Network Scheduling AdvantageNetwork Scheduling Advantage
•Consistent framework
•Shows interdependences
•Shows when resources are needed
•Ensures proper communication
•Determines expected completion date
•Identifies critical activities

7
Network Scheduling Advantage ContinuedNetwork Scheduling Advantage Continued
•Shows which of the activities can be delayed
•Determines start dates
•Shows which task must be coordinated
•Shows which task can be run parallel
•Relieves some conflict
•Allows probabilistic estimates

8
Network Scheduling Techniques: PERT Network Scheduling Techniques: PERT
(ADM) and CPM (PDM)(ADM) and CPM (PDM)
•PERT was developed for the Polaris
missile/submarine project in 1958
•CPM developed by DuPont during the same time
•Initially, CPM and PERT were two different
approaches
–CPM used deterministic time estimates and
allowed project crunching
–PERT used probabilistic time estimates
•Microsoft Project (and others) have blended
CPM and PERT into one approach

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
99
Developing the Project PlanDeveloping the Project Plan
•The Project Network
–A flow chart that graphically depicts the sequence,
interdependencies, and start and finish times of the project
job plan of activities that is the critical path through the
network.
•Provides the basis for scheduling labor and equipment.
•Enhances communication among project participants.
•Provides an estimate of the project’s duration.
•Provides a basis for budgeting cash flow.
•Identifies activities that are critical.
•Highlights activities that are “critical” and can not be
delayed.
•Help managers get and stay on plan.

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
1010
From Work Package to NetworkFrom Work Package to Network
FIGURE
6.1
WBS/Work Packages to Network

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
1111
From Work Package to Network (cont’d)From Work Package to Network (cont’d)
FIGURE 6.1
(cont’d)
WBS/Work Packages to Network (cont’d)

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
1212
Constructing a Project NetworkConstructing a Project Network
•Terminology
–Activity: an element of the project that requires
time.
–Merge Activity: an activity that has two or more
preceding activities on which it depends.
–Parallel (Concurrent) Activities: Activities that
can occur independently and, if desired, not at
the same time.
A
C
B D

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
1313
Constructing a Project Network (cont’d)Constructing a Project Network (cont’d)
•Terminology
–Path: a sequence of connected, dependent
activities.
–Critical path: the longest path through the
activity network that allows for the completion
of all project-related activities; the shortest
expected time in which the entire project can
be completed. Delays on the critical path will
delay completion of the entire project.
C
A B D
(Assumes that minimum of A + B >
minimum of C in length of times to
complete activities.)

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
1414
Constructing a Project Network (cont’d)Constructing a Project Network (cont’d)
•Terminology
–Event: a point in time when an activity is started
or completed. It does not consume time.
–Burst Activity: an activity that has more than
one activity immediately following it (more than
one dependency arrow flowing from it).
•Two Approaches
–Activity-on-Node (AON)
•Uses a node to depict an activity.
–Activity-on-Arrow (AOA)
•Uses an arrow to depict an activity.
B
D
A C

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
1515
Basic Rules to Follow in Developing Basic Rules to Follow in Developing
Project NetworksProject Networks
•Networks typically flow from left to right.
•An activity cannot begin until all of its activities
are complete.
•Arrows indicate precedence and flow and can
cross over each other.
•Identify each activity with a unique number; this
number must be greater than its predecessors.
•Looping is not allowed.
•Conditional statements are not allowed.
•Use common start and stop nodes.

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
1616
Activity-on-Node FundamentalsActivity-on-Node Fundamentals
FIGURE
6.2

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
1717
Activity-on-Node Fundamentals (cont’d)Activity-on-Node Fundamentals (cont’d)
FIGURE 6.2
(cont’d)

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
1818
Network InformationNetwork Information
TABLE
6.1

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
1919
Koll Business Center—Partial NetworkKoll Business Center—Partial Network
FIGURE
6.3

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
2020
Koll Business Center—Complete NetworkKoll Business Center—Complete Network
FIGURE
6.4

21
Constructing Expected Time EstimatesConstructing Expected Time Estimates
Table 8-1

22
The AON Network from the previous tableThe AON Network from the previous table
Figure 8-
13

23
Calculating Activity TimesCalculating Activity Times

24
The ResultsThe Results
Table 8-2

25
'Normal' Practice in the planning phase 'Normal' Practice in the planning phase
•We identify the tasks in the Project and specify
the resources needed for each one
•We allocate to each task sufficient time that we
are confident will allow it to be completed with
those resources. That is, the time the task should
take on average, plus some contingency to give
us the confidence we seek
•We apply task dependencies, and work out the
longest path of tasks in the Project
•The time along this path is the time-line of the
Project

26
Normal practice in the execution phase Normal practice in the execution phase
•As long as every task completes on time (within
its contingency), its successors will be started on
time
•As soon as any task finishes late (outside its
contingency), its successors will start late, and
this normally means they will finish late
•In order to rescue a Project which shows any
lateness, we have to squeeze the remaining
tasks in the Project
•Typically we have to compromise on time, cost
or scope and reschedule

27
The Estimating DilemmaThe Estimating Dilemma
•If I allow more time for every task in the plan,
each task is less likely to be late, but the Project
end date will be later...
•If I allow less time, the end date will be earlier,
but the Project is more likely to overrun
•BUT I have to deliver the Project on time

28
How long should we allow in the plan for a How long should we allow in the plan for a
task ?task ?
•Some staff work more quickly than others
•Sometimes staff are distracted or interrupted
•Sometimes necessary resources are delayed
•Some staff are risk-averse in their commitments
•Some organisations reinforce risk-aversion

29
How long do we allow in the plan for a How long do we allow in the plan for a
task ?task ?
•The average time the task ought to take an
average performer who focuses on it
•PLUS The time we expect to be spent on
distractions
•PLUS A contingency time to take account of:
• The spread between average and low
performers
• Our uncertainty in the average time
• Our uncertainty in the time for distractions
• How risk-averse we are or have to be

30
Some simple math Some simple math
•If we set our estimates so that we are 90% sure
that any one task will be completed on time
•If we have 20 tasks in our Project
•The Probability that all the tasks
•will be on time is: 0.920 = 12%
•For 50 tasks, the Probability of all on time is:
0.950 = 1%

31
Emphasising Emphasising
•Doing things by the text-book, with 20 tasks,
each of which we are 90% sure will complete on
time, we have an 88% probability of being late
for the Project
•With 50 tasks, its a lot worse: its a 99%
probability of being late for the Project

32
What if we change our estimating to a 95% What if we change our estimating to a 95%
confidence level ? confidence level ?
•NB This will inflate the time for every task maybe
by 25 - 50% because we will need more
contingency
•For 20 tasks the probability of being late is now
64% (was 88%)
•For 50 tasks we are late now 92% (was 99%)
We have very much extended our Project time-line, and
increased our chances of success from 12% to 36% for the
small Project, and from 1% to 8% for the large Project
We’ll look at a way to address this problem later today…

33
Scheduling the network in timeScheduling the network in time
•Once we’ve calculated the Expected Time (Te)
for each task, we can create a preliminary
schedule
•We’ll do this in two passes: Forward and
backward
•Both passes take into account tasks that have
multiple predecessors (merge tasks) or that
generate multiple tasks (burst tasks)
•Each of the two passes answers slightly different
questions

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
3434
Network Computation ProcessNetwork Computation Process
•Forward Pass—Earliest Times
–How soon can the activity start? (early start—ES)
–How soon can the activity finish? (early finish—EF)
–How soon can the project finish? (expected time—
ET)
•Backward Pass—Latest Times
–How late can the activity start? (late start—LS)
–How late can the activity finish? (late finish—LF)
–Which activities represent the critical path?
–How long can it be delayed? (slack or float—SL)

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
3535
Forward Pass ComputationForward Pass Computation
•Add activity times along each path in the network
(ES + Duration = EF).
•Carry the early finish (EF) to the next activity
where it becomes its early start (ES) unless…
•The next succeeding activity is a merge activity,
in which case the largest EF of all preceding
activities is selected.

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
3636
Network InformationNetwork Information
TABLE
6.2

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
3737
Activity-on-Node NetworkActivity-on-Node Network
FIGURE
6.5

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
3838
Activity-on-Node Network Forward PassActivity-on-Node Network Forward Pass
FIGURE
6.6

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
3939
Backward Pass ComputationBackward Pass Computation
•Subtract activity times along each path in the
network (LF - Duration = LS).
•Carry the late start (LS) to the next activity where
it becomes its late finish (LF) unless
•The next succeeding activity is a burst activity, in
which case the smallest LF of all preceding
activities is selected.

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
4040
Activity-on-Node Network Backward PassActivity-on-Node Network Backward Pass
FIGURE
6.7

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
4141
Determining Slack (or Float)Determining Slack (or Float)
•Slack (or Float)
–The amount of time an activity can be delayed
after the start of a longer parallel activity or
activities.
•Total slack
–The amount of time an activity can be delayed
without delaying the entire project.
•The critical path is the network path(s) that has
(have) the least slack in common.
•Slack for a task = Late Start - Early Start (LS-ES)

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
4242
Activity-on-Node Network with SlackActivity-on-Node Network with Slack
FIGURE
6.8

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
4343
Practical ConsiderationsPractical Considerations
•Network Logic Errors
•Activity Numbering
•Use of Computers to Develop Networks
•Calendar Dates
•Multiple Starts and Multiple Projects

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
4444
Illogical LoopIllogical Loop
FIGURE
6.9

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
4545
Hammock ActivitiesHammock Activities
•Hammock Activity
–An activity that spans over a segment of a
project.
–Duration of hammock activities is determined
after the network plan is drawn.
–Hammock activities are used to aggregate
sections of the project to facilitate getting the
right amount of detail for specific sections of a
project.

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
4646
Hammock Activity ExampleHammock Activity Example
FIGURE
6.21

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
4747
Extended Network Techniques Extended Network Techniques
to Come Close to Realityto Come Close to Reality
•Laddering
–Activities are broken into segments so the
following activity can begin sooner and not
delay the work.
•Lags
–The minimum amount of time a dependent
activity must be delayed to begin or end.
•Lengthy activities are broken down to reduce
the delay in the start of successor activities.
•Lags can be used to constrain finish-to-start,
start-to-start, finish-to-finish, start-to-finish, or
combination relationships.

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
4848
Example of Laddering Using Example of Laddering Using
Finish-to-Start RelationshipFinish-to-Start Relationship
FIGURE
6.12

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
4949
Use of LagsUse of Lags
FIGURE
6.13
FIGURE
6.14
Finish-to-Start Relationship
Start-to-Start Relationship

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
5050
Use of Lags Cont’dUse of Lags Cont’d
FIGURE
6.15
Use of Lags to Reduce Detail

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
5151
New Product Development ProcessNew Product Development Process
FIGURE
6.16

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
5252
Use of Lags (cont’d)Use of Lags (cont’d)
FIGURE
6.17
FIGURE
6.18
FIGURE
6.19
Finish-to-Finish
Relationship
Start-to-Finish
Relationship
Combination
Relationship

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
5353
Network Using LagsNetwork Using Lags
FIGURE
6.20

54
•We can reduce variability, but we cannot
eliminate it, because it is inherent to the nature
of a Project
Introduction to Critical Chain planning
We must manage the variability that remains

55
How we handle variability in Critical Chain How we handle variability in Critical Chain
•We do not build in any contingency at the Task
level
•We move all the contingency to the Project level
- we call this the Completion Buffer
Individual Tasks can now be late without affecting the
completion date of the Project
The Project due date is protected as long as
the accumulated lateness along any one
chain is less than the completion buffer

56
What difference does this make to our What difference does this make to our
probability of being late ?probability of being late ?
•Under 'normal' practice, if any task is later than
its contingency allows, we have a problem
•Under Critical Chain, we only have a problem if
the total lateness exceeds the total contingency
•This second condition is much less likely than
the first [ Law of averages / Central limit theorem]
and increasingly so as the number of tasks
increases

57
The Completion Buffer The Completion Buffer
•A Buffer is a block of time which protects a
deliverable from being affected by delays
upstream. The Completion Buffer protects the
Project completion date
•Over the course of the Project we expect our
buffers to be used up, in proportion to progress
made

58
Scarcity of Resources Scarcity of Resources
•In putting together the plan, we must take into
account scarcity of resources
•In particular, if two tasks want exclusive use of
the same resource, at the same time, they have
to be staggered
•This affects the plan in a similar way to the task
dependencies

59
Scarcity of Resources Scarcity of Resources
Task C – 10
d
Task B – 10
d
Task A – 10
d
Project Time required - 20
d
Task C depends on both A and B
Each task uses a different resource

60
Scarcity of Resources Scarcity of Resources
Task C – 10
d
Task B – 10
d
Task A – 10
d
Task C depends on both A and B,
Both A and B need exclusive use of the same
resource
Project Time required - 30
d
Resource conflict

61
The Critical ChainThe Critical Chain
•We identify the longest chain of dependent tasks
by resource through the Project - this is the
Critical Chain, at the end we place the
Completion Buffer
The time taken to complete the
Project is the time taken to complete
the Critical Chain
Any delay in the Critical Chain delays
the Project completion

62
Completion Buffer Completion Buffer
Task
C
Task
B
Task
A
Completion Buffer
Committed end date

63
In Practice In Practice
Task
CTask
B
Task
A
Task
C
Task
A
Completion Buffer
The buffer is 25-33% of
chain length
Project duration held constant
Task
B

64
Feeding ChainsFeeding Chains
•All the other chains of tasks we call Feeding
Chains , because each one at some point feeds
into the Critical Chain
•Every task in the Project is part of either the
Critical Chain or a Feeding Chain

65
Feeding BuffersFeeding Buffers
•We must not allow anything to delay the Critical
Chain
•We must protect the critical chain from being
delayed by lateness in the Feeding Chains
•We start the feeding chains a little early, and
insert a block of time to decouple the Critical
Chain from each Feeding Chain
•We call these blocks of time Feeding Buffers

66
Feeding Buffers Feeding Buffers
Task
C
Task
B
Task
A
Task D
Completion Buffer
FB

67
Planning Phase SummaryPlanning Phase Summary
•There is no contingency at task level
•The Project due date is protected by the a block
of time called the Completion Buffer
•The Critical Chain is the longest chain of tasks
through the Project
•All other chains of tasks are Feeding Chains
•We place Feeding Buffers to decouple the
Critical Chain from the feeding chains

Copyright © 2006 The McGraw-
Hill Companies. All rights
reserved.
6868
Key TermsKey Terms
Activity
Activity-on-arrow (AOA)
Activity-on-node (AON)
Burst activity
Concurrent engineering
Critical path
Early and late times
Gantt chart
Hammock activity
Lag relationship
Merge activity
Network sensitivity
Parallel activity
Slack/float—total and free