Unit V
STAFFING IN SOFTWARE PROJECTS
Managing people – Organizational behavior – Best methods of staff selection – Motivation – The Oldham-Hackman job characteristic model – Ethical and Programmed concerns – Working in teams – Decision making – Team structures – Virtual teams – Communications genres – Communication plans.
UNIT IV
PROJECT MANAGEMENT AND CONTROL
Framework for Management and control – Collection of data Project termination – Visualizing progress – Cost monitoring – Earned Value Analysis- Project tracking – Change control- Software Configuration Management – Managing contracts – Contract Management.
Unit V
STAFFING IN SOFTWARE PROJECTS
Managing people – Organizational behavior – Best methods of staff selection – Motivation – The Oldham-Hackman job characteristic model – Ethical and Programmed concerns – Working in teams – Decision making – Team structures – Virtual teams – Communications genres – Communication plans.
UNIT IV
PROJECT MANAGEMENT AND CONTROL
Framework for Management and control – Collection of data Project termination – Visualizing progress – Cost monitoring – Earned Value Analysis- Project tracking – Change control- Software Configuration Management – Managing contracts – Contract Management.
Resource Allocation In Software Project ManagementSyed Hassan Ali
Resource Allocation In Software Project Management
what is Resource Allocation In Software Project Management
define Resource Allocation In Software Project Management
how to allocate resource in software project management
Project Evaluation and Estimation in Software DevelopmentProf Ansari
Cost-benefit analysis
It mainly comprise two steps
Identify and estimating all of the costs and benefits of carrying out the project and operating the delivered application.
Expressing these costs and benefits in common units
We need to evaluate the net benefit, that is, the difference between the total benefit and the total benefit and the total cost of creating and operating the system.
We can categorize cost according to where they originate in the life of the project.
Resource Allocation In Software Project ManagementSyed Hassan Ali
Resource Allocation In Software Project Management
what is Resource Allocation In Software Project Management
define Resource Allocation In Software Project Management
how to allocate resource in software project management
Project Evaluation and Estimation in Software DevelopmentProf Ansari
Cost-benefit analysis
It mainly comprise two steps
Identify and estimating all of the costs and benefits of carrying out the project and operating the delivered application.
Expressing these costs and benefits in common units
We need to evaluate the net benefit, that is, the difference between the total benefit and the total benefit and the total cost of creating and operating the system.
We can categorize cost according to where they originate in the life of the project.
Using Risk Analysis and Simulation in Project ManagementMike Tulkoff
An overview of risk management techniques that can be incorporated into project plans and schedules. Learn how to use tools such as @RISK for Excel and Microsoft project to run Monte Carlo simulations on project plans. Model uncertain inputs under several scenarios to view the effect on project outputs like duration, dates, and cost.
A data science observatory based on RAMP - rapid analytics and model prototypingAkin Osman Kazakci
RAMP approach to analytics: Rapid Analytics and Model Prototyping; collaborative data challenges with in-built data science process management tools and analytics; An observatory of data science and scientists. Presented at the Design Theory Special Interest Group of International Design Society. Mines ParisTech and Centre for Data Science.
The use of Monte Carlo simulation in quantitative risk assessment of IT projectsEswar Publications
Estimation of the likely time and cost to complete the project and in line with it, taking into account the likelihood of occurrence and severity of the risks' effect, is one of the main concerns that have busied the organizational project managers. On the other hand, the diversity and sensitivity of information technology risks have caused to proper risk management, bolder than other issues, influences these projects. Therefore, in order to describe the degree of potential consequences and probability of occurrence of incidents accurately, IT project managers benefit from quantitative assessment. One of the most effective tools for quantitative assessment and likely forecasting of risks is Monte Carlo simulation, which by generating random numbers, calculates the individual components of a project and determine the impact of each of them on project. In this study, we tried to offer the functional model of the impact of risks on performance indicators of information technology project and propose proper time and cost for completing the project under the study by doing a case study and use of software functionality of Primavera Risk Analysis in Monte Carlo simulation.
QbD is “a systematic approach to pharmaceutical development that begins with predefined objectives and emphasizes product and process understanding and process control, based on sound science and quality risk management”
Goals Of Pharmaceutical QbD:
To achieve meaningful product quality specifications
To increase process capability and reduce product variability
To increase pharmaceutical development and manufacturing efficiencies and
To enhance cause-effect analysis and regulatory flexibility
Acoording to ICH Q8 Quality should be built into the product.
Design of Experiments (DoE) generate knowledge about a product or process and established a Mathamatical relationship of dependent variables and independent variables.
The most common screening designs, such as two-level full factorial, fractionate factorial, and Plackett- Burman designs.
optimization designs, such as three-level full factorial, central composite designs (CCD), and Box-Behnken designs.
Analysis of variance (ANOVA) used in multiple regression analysis to evaluate regression significance, residual error, and lack-of-fit adjustment.
determination coefficients (R2, R2 -adj, and R2 -pred) is also evaluated.
Project Controls Expo, 18th Nov 2014 - "Schedule Risk Analysis for Complex Pr...Project Controls Expo
Schedule Risk Analysis is used on a wide range of projects as an established technique for identifying the uncertainties that threaten (or enhance) project success. However, applying the technique effectively to produce valid results on large and complex projects poses more of a challenge. This presentation summarises an approach to conducting schedule risk modelling for complex, long-term engineering projects, avoiding common pitfalls, and ensuring that outputs can be used to actively influence the project’s outcome.
Protecting project interests from possible risks of major financial liabilities has always been a major business concern. Projects must properly been managed by qualitative risk assessment to minimize or to avoid risk occur in a project planning.
MODULE III Parallel Processors and Memory Organization 15 Hours
Parallel Processors: Introduction to parallel processors, Concurrent access to memory and cache
coherency. Introduction to multicore architecture. Memory system design: semiconductor memory
technologies, memory organization. Memory interleaving, concept of hierarchical memory
organization, cache memory, cache size vs. block size, mapping functions, replacement
algorithms, write policies.
Case Study: Instruction sets of some common CPUs - Design of a simple hypothetical CPU- A
sequential Y86-64 design-Sun Ultra SPARC II pipeline structure
MODULE II Control unit, I/O systems and Pipelining 15 Hours
CPU control unit design: Hardwired and micro-programmed design approaches, Peripheral
devices and their characteristics: Input-output subsystems, I/O device interface, I/O transfersprogram controlled, interrupt driven and DMA, privileged and non-privileged instructions, software
interrupts and exceptions. Programs and processes-role of interrupts in process state transitions,
I/O device interfaces - SCII, USB. Basic concepts of pipelining, throughput and speedup, pipeline
hazards.
Functional Blocks of a Computer: Functional blocks and its operations. Instruction set architecture of a CPU - registers, instruction execution cycle, Data path, RTL interpretation of
instructions, instruction set. Performance metrics. Addressing modes. Data Representation:
Signed number representation, fixed and floating point representations, character representation.
Computer arithmetic - integer addition and subtraction, ripple carry adder, carry look-ahead
adder, etc. multiplication - shift-and add, Booth multiplier, carry save multiplier, etc. Division
restoring and non-restoring techniques, floating point arithmetic.
Module II - Distributed objects and file systems:
Introduction - Communication between distributed objects - Remote procedure call - Events and notifications - case study - Operating system support - introduction - operating system layer - protection - process and threads - communication and invocation - architecture - Introduction to DFS - File service architecture - Sun network file system - Andrew file system - Enhancements and future developments.
Module 2 - Distributed Objects and File Systems
Introduction - Communication between distributed objects - Remote procedure call - Events and notifications - case study - Operating system support - introduction - operating system layer - protection - process and threads - communication and invocation - architecture - Introduction to DFS - File service architecture - Sun network file system - Andrew file system - Enhancements and future developments.
Module I
Introduction to Distributed systems - Examples of distributed systems, resource sharing and the web, challenges - System model - introduction - architectural models - fundamental models - Introduction to inter-process communications - API for Internet protocol - external data.
Module I
Introduction to Distributed systems - Examples of distributed systems, resource sharing and the web, challenges - System model - introduction - architectural models - fundamental models - Introduction to inter-process communications - API for Internet protocol - external data.
Module 6: IP and System Security
IP security overview-IP security policy-Encapsulating Security payload-intruders-intrusion detectionvirus/worms-countermeasure-need for firewalls-firewall characteristics-types of fire
Module 4: Key Management and User Authentication
X.509 certificates- Public Key infrastructure-remote user authentication principles-remote user
authentication using symmetric and asymmetric encryption-Kerberos V5
Module 1: Introduction to Cryptography and Symmetric Key Ciphers
Computer Security Concepts - OSI Security Architecture -Security Attacks - Services, Mechanisms -
Symmetric Cipher Model - Traditional Block Cipher Structure - The Data Encryption Standard -The Strength of DES - Advanced Encryption Standard.
Module 6
Advanced Networking
Security problems with internet architecture, Introduction to Software defined networking, Working of SDN, SDN in data centre, SDN applications, Data centre networking, IoT.
Module 6: Standards for Information Security Management
Information Security Management Systems (ISMS) - ISO 27001 - Framing Security Policy of
Organization- Committees- Security Forum, Core Committee, Custodian and Users, Business
Continuity Process Team & Procedure- Information Security Auditing Process. IT Security Incidents
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
MG6088 SOFTWARE PROJECT MANAGEMENT
1. MG6088 SOFTWARE PROJECT MANAGEMENT
UNIT – III
Dr.A.Kathirvel, Professor and Head, Dept of CSE
M.N.M Jain Engineering College, Chennai
2. UNIT I
ACTIVITY PLANNING AND RISK MANAGEMENT
Objectives of Activity planning – Project schedules –
Activities – Sequencing and scheduling – Network
Planning models – Forward Pass & Backward Pass
techniques – Critical path (CRM) method – Risk
identification – Assessment – Monitoring – PERT
technique – Monte Carlo simulation – Resource
Allocation – Creation of critical patterns – Cost
schedules.
TEXT BOOK
Bob Hughes, Mike Cotterell and Rajib Mall: Software Project
Management – Fifth Edition, Tata McGraw Hill, New Delhi, 2012.
3. Objectives of Activity planning
Activity planning is also the project management plan preparation. It
is called Software Project Management Plan(SPMP).
Objectives
Feasibility assessment
Resource allocation
Motivation to team
Effective utilization of human resources
Effective time management
Project costing
Project tracking
RMMM activities
3
4. Project schedules
‘Time is nature’s way of stopping everything
happening at once’
Having
worked out a method of doing the project
identified the tasks to be carried
assessed the time needed to do each task
need to allocate dates/times for the start and end of
each activity
4
5. Activity networks
These help us to:
Assess the feasibility of the planned project
completion date
Identify when resources will need to be deployed
to activities
Calculate when costs will be incurred
This helps the co-ordination and motivation of the
project team
5
6. Identifying activities
Work-based: draw-up a Work Breakdown
Structure listing the work items needed
Product-based approach
list the deliverable and intermediate products of
project – product breakdown structure (PBS)
Identify the order in which products have to be
created
work out the activities needed to create the products
6
8. 8
The final outcome of the planning process
A project plan as a bar chart
ACTIVITIES SEQUENCING AND SCHEDULING
9. Risk management
Definition of ‘risk’ and ‘risk management’
Some ways of categorizing risk
Risk management
Risk identification – what are the risks to a project?
Risk analysis – which ones are really serious?
Risk planning – what shall we do?
Risk monitoring – has the planning worked?
We will also look at PERT risk and critical chains
9
10. Some definitions of risk
‘the chance of exposure to the adverse consequences of
future events’ PRINCE2
Project plans have to be based on assumptions
Risk is the possibility that an assumption is wrong
When the risk happens it becomes a problem or an issue
10
12. A framework for dealing with risk
The planning for risk includes these steps:
Risk identification – what risks might there be?
Risk analysis and prioritization – which are the
most serious risks?
Risk planning – what are we going to do about
them?
Risk monitoring – what is the current state of the
risk?
12
13. Risk identification
Approaches to identifying risks include:
Use of checklists – usually based on the
experience of past projects
Brainstorming – getting knowledgeable
stakeholders together to pool concerns
Causal mapping – identifying possible chains
of cause and effect
13
14. 14
Boehm’s top 10 development risks
Risk Risk reduction techniques
Personnel shortfalls Staffing with top talent; job matching; teambuilding;
training and career development; early scheduling
of key personnel
Unrealistic time and cost
estimates
Multiple estimation techniques; design to cost;
incremental development; recording and analysis
of past projects; standardization of methods
Developing the wrong
software functions
Improved software evaluation; formal specification
methods; user surveys; prototyping; early user
manuals
Developing the wrong
user interface
Prototyping; task analysis; user involvement
14
15. 15
Boehm’s top ten risk - continued
Gold plating Requirements scrubbing, prototyping,
design to cost
Late changes to
requirements
Change control, incremental development
Shortfalls in externally
supplied components
Benchmarking, inspections, formal
specifications, contractual agreements, quality
controls
Shortfalls in externally
performed tasks
Quality assurance procedures, competitive
design etc
Real time performance
problems
Simulation, prototyping, tuning
Development
technically too difficult
Technical analysis, cost-benefit analysis,
prototyping , training
15
18. Risk prioritization
❑ Risk exposure (RE)
= (potential damage) x (probability of occurrence)
❑ Ideally
❑ Potential damage: a money value e.g. a flood would
cause £0.5 millions of damage
❑ Probability 0.00 (absolutely no chance) to 1.00
(absolutely certain) e.g. 0.01 (one in hundred chance)
❑ RE = £0.5m x 0.01 = £5,000
❑ Crudely analogous to the amount needed for an
insurance premium
18
19. Risk probability: qualitative descriptors
Probability
level
Range
High Greater than 50% chance of happening
Significant 30-50% chance of happening
Moderate 10-29% chance of happening
Low Less than 10% chance of happening
19
20. 20
Qualitative descriptors of impact on cost and
associated range values
Impact level Range
High Greater than 30% above budgeted
expenditure
Significant 20 to 29% above budgeted
expenditure
Moderate 10 to 19% above budgeted
expenditure
Low Within 10% of budgeted
expenditure.
20
22. Risk planning
Risks can be dealt with by:
Risk acceptance
Risk avoidance
Risk reduction
Risk transfer
Risk mitigation/contingency measures
22
23. Risk reduction leverage
❑ Risk reduction leverage =
(REbefore- REafter)/ (cost of risk reduction)
❑ REbeforeis risk exposure before risk reduction e.g. 1%
chance of a fire causing £200k damage
❑ REafter is risk exposure after risk reduction e.g. fire
alarm costing £500 reduces probability of fire
damage to 0.5%
❑ RRL = (1% of £200k)-(0.5% of £200k)/£500 = 2
❑ RRL > 1.00 therefore worth doing
23
25. Using PERT to evaluate the effects of uncertainty
Three estimates are produced for each activity
Most likely time (m)
Optimistic time (a)
Pessimistic (b)
‘expected time’ te = (a + 4m +b) / 6
‘activity standard deviation’ S = (b-a)/6
25
26. 26
A chain of activities
Task A Task B Task C
Task a m b te s
A 10 12 16 ? ?
B 8 10 14 ? ?
C 20 24 38 ? ?
26
27. A chain of activities
What would be the expected duration of the chain
A + B + C?
Answer: 12.66 + 10.33 + 25.66 i.e. 48.65
What would be the standard deviation for A + B+ C?
Answer: square root of (12 + 12 + 32) i.e. 3.32
27
28. Assessing the likelihood of meeting a target
Say the target for completing A+B+C was 52 days (T)
Calculate the z value thus
z = (T – te)/s
In this example
z = (52-48.33)/3.32 i.e. 1.01
Look up in table of z values
– see next overhead
Graph of z values
28
29. What is Monte Carlo (MC) method ?
The Monte Carlo method is a numerical method
for statistical simulation which utilizes sequences
of random numbers to perform the simulation
29
30. What the meaning of MC simulation?
❑MC simulation is a versatile tool to analyze
and evaluate complex measurements
❑ Constructing a model of a system.
❑Experimenting with the model to
draw inferences of the system’s behavior
30
31. A simulation model
Decision and
uncontrollable
variables
Simulation
model
Measures of
performance or
behaviour of the
system
Inputs outputs
31
32. A simulation model cont..
Model inputs capture the environment of the problem
The simulation model
Conceptual model: set of assumptions that define
the system
Computer code: the implementation of the
conceptual model
Outputs describe the aspects of system behaviour that we
are interested in
32
33. Random numbers
❑ Uniform Random numbers or pseudo-random numbers
(PRN) are essentially independent random variables
uniformly Distributed over the unit interval (0,1).
❑ The PRNs are good if they are uniformly distributed,
statistically independent and reproducible.
33
34. Linear congruential generator
Generating a random sequence of numbers
{X1,X2,…….,Xk} of length M over the interval [0,M-1]
Xi=mod(AXi-1+C,M)
R=Xi/M
♠♠♠ mod(b,M)=b-int(b/M)*M
● Starting value X0 is called “seed”
●M,A and C are nonnegative integers known
Modulus, multiplier and increment, respectively
●M is must be prime number(2³¹-1,2 -1,…..)
34
38. Critical chain approach
One problem with estimates of task duration:
Estimators add a safety zone to estimate to
take account of possible difficulties
Developers work to the estimate + safety zone,
so time is lost
No advantage is taken of opportunities where
tasks can finish early – and provide a buffer
for later activities
38
39. Critical chain approach
One answer to this:
Base targets on midpoints (i.e. te)
Accumulate 50% of the safety zones
(between te and b) into a buffer at the end
of the project
Work backwards and start all activities at
their latest start dates
During project execution use relay race
model
39
40. Scheduling Resources and Costs
Resources and Priorities
Project network times are not a schedule
until resources have been assigned.
◼The implicit assumption is that resources will be
available in the required amounts when needed.
◼Adding new projects requires making realistic
judgments of resource availability and project
durations.
40
41. Resource-Constrained Scheduling
Resource leveling (or smoothing) involves
attempting to even out demands on resources by
using slack (delaying noncritical activities) to
manage resource utilization.
41
42. Types of Project Constraints
Technical or Logic Constraints
Constraints related to the networked sequence in which
project activities must occur.
Physical Constraints
Activities that cannot occur in parallel or are affected by
contractual or environmental conditions.
Resource Constraints
The absence, shortage, or unique interrelationship and
interaction characteristics of resources that require a
particular sequencing of project activities.
42
43. Classifications
Time Constrained Project
A project that must be completed by an imposed date.
◼ Time is fixed, resources are flexible: additional resources are
required to ensure project meets schedule.
Resource Constrained Project
A project in which the level of resources available
cannot be exceeded.
◼ Resources are fixed, time is flexible: inadequate resources
will delay the project.
43
44. Impact of Resource Constraint Scheduling
Reduces delay but reduces flexibility.
Increases criticality of events.
Increases scheduling complexity.
May make traditional critical path no longer meaningful.
Can break sequence of events.
May cause parallel activities to become sequential and
critical activities with slack to become noncritical.
44
45. Assigning Resources to tasks
Factors to Consider in Assigning Work:
Don’t always pick the same people for the toughest
assignments.
Choose people with an eye to fostering their
development through participation on the project.
Pick people with compatible work habits and
personalities but who complement each other.
Team-up veterans with new hires to share experience
and socialize newcomers into the organization.
Select people who may need to learn work together on
later stages of the project or other projects.
45