SlideShare a Scribd company logo
1 of 32
Sachin Kumar
L-2012-BS-05-MBA(AB)
Management of any project involves
planning, coordination and control of a
number of interrelated activities with
limited resources.
Furthermore, it becomes necessary to
incorporate any change from the initial
plan as they occur, and immediately know
the effects of the change
Network analysis is a common name for a
number of associated projects which need
planning and control procedures which
based on the concept of network.
It provides a framework which :
• defines the job to be done,
• integrates them in a logical time sequence and
finally,
• affords a system of dynamic control over the
progress of the plan
Network analysis helps in all the phases of
project management. There phases are mainly
Planning
Scheduling
Controling
Identify the distinct activities,
 Determine their durations and inter
dependencies
 Construct a network diagram,
Determine minimum overall project duration
(using the network diagram),
Identify the tasks critical (i.E. Essential) to this
minimum duration.
Construct schedule (‘time chart’),
Schedule contains start and finish times for
each activity, and
Evaluate cost-time trade-offs (evaluate
effects of putting extra money, people or
machines in a particular task in order to
shorten project duration).
Monitor/control project by use of network
diagram,
Follow progress of the various activities
Make adjustment where appropriate (as
network analysis make the planning
susceptible to change in original plan)
There are mainly two types of networking
techniques which are used in project
evaluation
CPM – Critical Path Method
PERT – Project Evaluation and Review
Technique
CPM is akin to PERT as both techniques
use similar network models and methods
are have the same general purpose.
But CPM is primarily concerned with the
trade-off between cost and time.
It has been applied mostly to projects that
employ fairly stable technology and are
relatively risk free.
Hence its orientation is ‘deterministic’
PERT is eminently suitable for
• research and development and programmes,
aerospace projects,
• other projects involving new technology.
In such projects the time required for
completing various jobs or activities can be
highly variable.
Hence the orientation of PERT is
probabilistic
 The PERT/CPM is capable of giving answers to
the following questions to the project manager :
 When will the project be finished ?
 When is each individual part of the scheduled to
start and finish ?
 Of the numerous jobs in the project, which one
must be timed to avoid being late ?
 Is it possible to shift resources to critical jobs of the
project from other non-critical jobs of the project
without affecting the overall completion time of the
project ?
 Among all the jobs in the project, where should
management concentrate its efforts at one time ?
 In order to represent a project network, two
basic elements are used which are node and
activity.
 A circle called “node”, represents an event.
 An event describes a checkpoint.
 It does not symbolize the performance of
work, bit it represents the point in time in
which the event is accomplished.
 An arrow, called “arc”, represents an activity-a
recognizable part of the project.
 It involve mental or physical work and require time
and resources for its completion.
 The network will try to reflect all the relationships
between the activities.
• Arrow direction indicates general progression in
time – tail events represent start while head
events represent end of activities
The simple rules govern the construction of a project
network :
 Each activity must be represented by only one directed
arc or arrow.
 No two activities can begin and end on the same two
nodes circle
 There should be no loops in the network.
• Events are identified by numbers while activities are
represented by their starting and ending events
 Dummy activities are Tasks that must be
completed in sequence but that don’t require
resources or completion time are considered to
have event dependency.
 These are represented by dotted lines with arrows
and are called dummy activities.
 To explain it, we will consider the following
ACTIVITY IMMEDIATE
PREDECESSOR
A
.........................
B .........................
C A, B
D B
Activity Imm. Pred. Activity Imm. Pred.
A - G C, F
B - H B
C - I E, H
D A, B J E, H
E B K C, D, F, J
F B L K
A
C
B
E
H
F
D
G
I
J
K
L
1
2
3
4
5
6
7 8
9
 Critical path refers to the longest path of a given
project network
 Duration of a project is given by the length of the
critical path
 Activities on a critical path are called critical
activities while remaining activities are non-critical
 A project can have more than one critical path as
well
 Critical activities are so called because their
timely completion is critical to the completion of
the project in time
 Critical activities can not be delayed while non-
critical activities have some cushion available
Information on the activities required for a
project is as follows:
Draw the network and calculate the earliest
start(ES), earliest finish(EF), latest
start(LS), and latest finish(LF) times of each
of the activities.
Name A B C D E F G H I J K
Activities
Node
1-2 1-3 1-4 2-5 3-5 3-6 3-7 4-6 5-7 6-8 7-
8
Duration
(Days)
2 7 8 3 6 10 4 6 2 5 6
i - j t ES EF LS LF slack
1-2 2 0 2 9 11 7
1-3 7 0 7 0 7 0
1-4 8 0 8 3 11 3
2-5 3 2 5 11 14 9
3-5 6 7 13 8 14 1
3-6 10 7 17 7 17 0
3-7 4 7 11 12 16 5
4-6 6 8 14 11 17 3
5-7 2 13 1 14 16 15
6-8 5 17 22 17 22 0
7-8 6 15 21 16 22 1
 Critical Path: 1-3-6-8
 Critical Activities: B F J
 Project Duration: 22 days
 Non-critical Activities: A C E G H I K
B 7
C 8
D 3
E 6
G 4
H 6
F 10
I 2
K 6
J 5
1
2
3
4
5
6
7 8
 Total float is the amount of time by which an activity may
be delayed without delaying the project completion
Caution: interpret total floats of activities carefully - all can
not be used independently
 Free float is that part of total float which can be used
without affecting floats of the succeeding activities
 Independent float is the amount of time which can be
used without affecting the head and the tail events
Total Float ≥ Free Float ≥ Independent Float
 Total float
= Latest start time of the activity – Earliest start time of the activity
 Free float
= Earliest start time of the next activity – Earliest finish time of the
activity
 Interfering float
= Total float – Free float
 Independent float
= Earliest start time of the next activity – Latest finish time of the
preceding activity – Duration of the activity
= Free float – Tail event slack, or zero, whichever is higher
i - j t ES EF LS LF TF FF lnF
1-2 2 0 2 9 11 9 0 0
1-3 7 0 7 0 7 0 0 0
1-4 8 0 8 3 11 3 0 0
2-5 3 2 5 11 14 9 8 0
3-5 6 7 13 8 14 1 0 0
3-6 10 7 17 7 17 0 0 0
3-7 4 7 11 12 16 5 4 4
4-6 6 8 14 11 17 3 3 0
5-7 2 13 15 14 16 1 0 0
6-8 5 17 22 17 22 0 0 0
7-8 6 15 21 16 22 1 1 0
For each activity, the model usually
includes three times estimates
• Optimistic time (a) - generally the shortest time in
which the activity can be completed under ideal,
favorable conditions
• Most likely time (m) - the completion time under
the normal conditions, having the highest
probability.
• Pessimistic time (b) - the longest time under worst,
externally unfavorable conditions, which an
activity might require
The expected time for each activity can be
approximated using the following weighted
average
Expected time = (Optimistic + 4 x Most
likely + Pessimistic) / 6
te=(a+4m+b)/6
Variance is [(b – a )/6]2
 The owner of a chain of fast-food restaurants is
considering a new computer system for accounting
and inventory control. A computer company sent the
following information about the system installation:
Activity Immediate
Predecess
or
Most
Optimistic
Most likely Most
Pessimisti
c
A - 4 6 8
B A 5 7 15
C A 4 8 12
D B 15 20 25
E B 10 18 26
F C 8 9 16
G E 4 8 12
H D,F 1 2 3
I G,H 6 7 8
Critical activities: A B E G I
Project duration = 6+8+18+8+7 = 47 days
Project variance = 4/9 + 25/9 + 64/9 + 16/9 + 1/9 = 110/9
Project standard deviation = √(110/9) = 3.496
Example
Activity a m b te σ2
A 4 6 8 6 4/9*
B 5 7 15 8 25/9*
C 4 8 12 8 16/9
D 15 20 25 20 25/9
E 10 18 26 18 64/9*
F 8 9 16 10 16/9
G 4 8 12 8 16/9*
H 1 2 3 2 1/9
I 6 7 8 7 1/9*
For Pr (completion in 55 days): Z = (X - µ)/σ
Z = (55 – 47)/3.496 = 2.29.
Now, Area to the left of Z = 2.29 is 0.5+0.4890 = 0.9890
For Pr (completion with 0.90 chance):
Z corresponding to area 0.40 (between µ and X) is 1.28.
Thus, 1.28 = (X – 47)/3.496 and X = 51.47 or 52 app.
The project should start 52 days before due date
Project Network
A
B
C
E
F
D
H
G
I
 Especially useful when scheduling and controlling
large projects
 Straightforward concept and not mathematically
complex
 Graphical networks help to perceive relationships
among project activities
 Critical path and slack time analyses help pinpoint
activities that need to be closely watched
 Project documentation and graphics point out who
is responsible for various activities
 Applicable to a wide variety of projects
 Useful in monitoring not only schedules but costs
as well
Project activities have to be clearly defined,
independent, and stable in their relationships
Precedence relationships must be specified and
networked together
Time estimates tend to be subjective and are
subject to fudging by managers
There is an inherent danger of too much
emphasis being placed on the longest or critical
path
Network Analysis and Project Management Techniques

More Related Content

What's hot

Critical path method(cpm)
Critical path method(cpm)Critical path method(cpm)
Critical path method(cpm)chandkec
 
Project Management Techniques ( CPM & PERT Techniques )
Project Management Techniques ( CPM & PERT Techniques )Project Management Techniques ( CPM & PERT Techniques )
Project Management Techniques ( CPM & PERT Techniques )Akaresh Jose Kaviyil JY
 
Project management & Network analysis
Project management & Network analysisProject management & Network analysis
Project management & Network analysisHarinadh Karimikonda
 
Chapter 12(cpm pert)
Chapter 12(cpm pert)Chapter 12(cpm pert)
Chapter 12(cpm pert)Debanjan15
 
Project monitoring and control & planning for monitoring
Project monitoring and control & planning for monitoringProject monitoring and control & planning for monitoring
Project monitoring and control & planning for monitoringSandeep Kumar
 
Critical path method (cpm)
Critical path method (cpm)Critical path method (cpm)
Critical path method (cpm)hoang tung
 
Project Network project approaches and rules
Project Network  project approaches and rules Project Network  project approaches and rules
Project Network project approaches and rules tassawarshahzad2
 
Pert,cpm, resource allocation and gert
Pert,cpm, resource allocation and gertPert,cpm, resource allocation and gert
Pert,cpm, resource allocation and gertRaj J Das
 
Introduction-to-project-management
Introduction-to-project-managementIntroduction-to-project-management
Introduction-to-project-managementSavaş Şakar
 
Difference between PERT and CPM
Difference between PERT and CPMDifference between PERT and CPM
Difference between PERT and CPMMunaf Dayee
 
PROJECT CONTROL PROCESS
PROJECT CONTROL PROCESS PROJECT CONTROL PROCESS
PROJECT CONTROL PROCESS Akash Prasanna
 
Resource Scheduling
Resource SchedulingResource Scheduling
Resource SchedulingNicola2903
 
Work breakdown structure ppt
Work breakdown structure pptWork breakdown structure ppt
Work breakdown structure pptnazi2020
 

What's hot (20)

Critical path method(cpm)
Critical path method(cpm)Critical path method(cpm)
Critical path method(cpm)
 
Pert & Cpm
Pert & CpmPert & Cpm
Pert & Cpm
 
Project Management Techniques ( CPM & PERT Techniques )
Project Management Techniques ( CPM & PERT Techniques )Project Management Techniques ( CPM & PERT Techniques )
Project Management Techniques ( CPM & PERT Techniques )
 
Project management & Network analysis
Project management & Network analysisProject management & Network analysis
Project management & Network analysis
 
Network analysis
Network analysisNetwork analysis
Network analysis
 
crashing of project
crashing of project crashing of project
crashing of project
 
Network Techniques
Network TechniquesNetwork Techniques
Network Techniques
 
Chapter 12(cpm pert)
Chapter 12(cpm pert)Chapter 12(cpm pert)
Chapter 12(cpm pert)
 
Pert and cpm
Pert and cpmPert and cpm
Pert and cpm
 
Project monitoring and control & planning for monitoring
Project monitoring and control & planning for monitoringProject monitoring and control & planning for monitoring
Project monitoring and control & planning for monitoring
 
Critical path method (cpm)
Critical path method (cpm)Critical path method (cpm)
Critical path method (cpm)
 
Project Network project approaches and rules
Project Network  project approaches and rules Project Network  project approaches and rules
Project Network project approaches and rules
 
Pert,cpm, resource allocation and gert
Pert,cpm, resource allocation and gertPert,cpm, resource allocation and gert
Pert,cpm, resource allocation and gert
 
project management information system
project management information systemproject management information system
project management information system
 
Introduction-to-project-management
Introduction-to-project-managementIntroduction-to-project-management
Introduction-to-project-management
 
Difference between PERT and CPM
Difference between PERT and CPMDifference between PERT and CPM
Difference between PERT and CPM
 
PROJECT CONTROL PROCESS
PROJECT CONTROL PROCESS PROJECT CONTROL PROCESS
PROJECT CONTROL PROCESS
 
Critical path method
Critical path methodCritical path method
Critical path method
 
Resource Scheduling
Resource SchedulingResource Scheduling
Resource Scheduling
 
Work breakdown structure ppt
Work breakdown structure pptWork breakdown structure ppt
Work breakdown structure ppt
 

Similar to Network Analysis and Project Management Techniques

Cpm n pert lecture 1
Cpm n pert lecture 1Cpm n pert lecture 1
Cpm n pert lecture 1adeelmunir158
 
Pb602 operation management chapter 7
Pb602  operation management chapter 7Pb602  operation management chapter 7
Pb602 operation management chapter 7Akihisa Akimoto
 
PERT AND CPM PROJECT MANAGEMENT
PERT AND CPM PROJECT MANAGEMENTPERT AND CPM PROJECT MANAGEMENT
PERT AND CPM PROJECT MANAGEMENTsalsa moyara
 
Lec - 3 Construction_Management_Time_Estimation_2014_summer23.pptx
Lec - 3 Construction_Management_Time_Estimation_2014_summer23.pptxLec - 3 Construction_Management_Time_Estimation_2014_summer23.pptx
Lec - 3 Construction_Management_Time_Estimation_2014_summer23.pptxNegeseTeklearegay
 
Project Management & Engineering Economics
Project Management & Engineering EconomicsProject Management & Engineering Economics
Project Management & Engineering EconomicsDeepak Paithankar
 
chapter 6.ppt
chapter 6.pptchapter 6.ppt
chapter 6.pptDejeneDay
 
Unit 3 PERT.pptx in related to supply chain
Unit 3 PERT.pptx in related to supply chainUnit 3 PERT.pptx in related to supply chain
Unit 3 PERT.pptx in related to supply chaintanishkagupta907
 
PMP Project Management Basics Tutorial For Beginners
PMP Project Management Basics Tutorial For BeginnersPMP Project Management Basics Tutorial For Beginners
PMP Project Management Basics Tutorial For BeginnersIIMSE Edu
 
PROJECT-SCHEDULING-pptx.pptx
PROJECT-SCHEDULING-pptx.pptxPROJECT-SCHEDULING-pptx.pptx
PROJECT-SCHEDULING-pptx.pptxTecnicoItca
 
Lec 9 & 10 chapter 5 project scheduling
Lec 9 & 10 chapter 5 project schedulingLec 9 & 10 chapter 5 project scheduling
Lec 9 & 10 chapter 5 project schedulingSyed Hamza
 
Chapter 6 project management
Chapter 6 project managementChapter 6 project management
Chapter 6 project managementShadina Shah
 
Cpm module iii reference
Cpm module iii referenceCpm module iii reference
Cpm module iii referenceahsanrabbani
 
(PROGRAM EVALUATION AND REVIE TECHNIQUE)
(PROGRAM EVALUATION AND REVIE TECHNIQUE)(PROGRAM EVALUATION AND REVIE TECHNIQUE)
(PROGRAM EVALUATION AND REVIE TECHNIQUE)hannahpepino1
 

Similar to Network Analysis and Project Management Techniques (20)

Cpm n pert lecture 1
Cpm n pert lecture 1Cpm n pert lecture 1
Cpm n pert lecture 1
 
Pb602 operation management chapter 7
Pb602  operation management chapter 7Pb602  operation management chapter 7
Pb602 operation management chapter 7
 
Ch 5.pptx
Ch 5.pptxCh 5.pptx
Ch 5.pptx
 
PERT AND CPM PROJECT MANAGEMENT
PERT AND CPM PROJECT MANAGEMENTPERT AND CPM PROJECT MANAGEMENT
PERT AND CPM PROJECT MANAGEMENT
 
Cpm pert
Cpm pertCpm pert
Cpm pert
 
Project management
Project managementProject management
Project management
 
Lec - 3 Construction_Management_Time_Estimation_2014_summer23.pptx
Lec - 3 Construction_Management_Time_Estimation_2014_summer23.pptxLec - 3 Construction_Management_Time_Estimation_2014_summer23.pptx
Lec - 3 Construction_Management_Time_Estimation_2014_summer23.pptx
 
Project Management & Engineering Economics
Project Management & Engineering EconomicsProject Management & Engineering Economics
Project Management & Engineering Economics
 
chapter 6.ppt
chapter 6.pptchapter 6.ppt
chapter 6.ppt
 
Unit 3 PERT.pptx in related to supply chain
Unit 3 PERT.pptx in related to supply chainUnit 3 PERT.pptx in related to supply chain
Unit 3 PERT.pptx in related to supply chain
 
PMP Project Management Basics Tutorial For Beginners
PMP Project Management Basics Tutorial For BeginnersPMP Project Management Basics Tutorial For Beginners
PMP Project Management Basics Tutorial For Beginners
 
PROJECT-SCHEDULING-pptx.pptx
PROJECT-SCHEDULING-pptx.pptxPROJECT-SCHEDULING-pptx.pptx
PROJECT-SCHEDULING-pptx.pptx
 
Lec 9 & 10 chapter 5 project scheduling
Lec 9 & 10 chapter 5 project schedulingLec 9 & 10 chapter 5 project scheduling
Lec 9 & 10 chapter 5 project scheduling
 
Pert cpm
Pert cpmPert cpm
Pert cpm
 
Pert cpm
Pert cpmPert cpm
Pert cpm
 
Chapter 6 project management
Chapter 6 project managementChapter 6 project management
Chapter 6 project management
 
Cpm module iii reference
Cpm module iii referenceCpm module iii reference
Cpm module iii reference
 
Nce603 mod unit2
Nce603 mod unit2Nce603 mod unit2
Nce603 mod unit2
 
(PROGRAM EVALUATION AND REVIE TECHNIQUE)
(PROGRAM EVALUATION AND REVIE TECHNIQUE)(PROGRAM EVALUATION AND REVIE TECHNIQUE)
(PROGRAM EVALUATION AND REVIE TECHNIQUE)
 
Cpm n pert
Cpm n pertCpm n pert
Cpm n pert
 

More from Sachin Kapoor

ਗੁਰੂ ਗੋਬਿੰਦ ਸਿੰਘ ਜੀ
ਗੁਰੂ ਗੋਬਿੰਦ ਸਿੰਘ ਜੀਗੁਰੂ ਗੋਬਿੰਦ ਸਿੰਘ ਜੀ
ਗੁਰੂ ਗੋਬਿੰਦ ਸਿੰਘ ਜੀSachin Kapoor
 
Laws and regulations related to food industries
Laws and regulations related to food industries Laws and regulations related to food industries
Laws and regulations related to food industries Sachin Kapoor
 
Customer relationship management
Customer relationship managementCustomer relationship management
Customer relationship managementSachin Kapoor
 

More from Sachin Kapoor (7)

ਨਾਂਵ
ਨਾਂਵਨਾਂਵ
ਨਾਂਵ
 
ਗੁਰੂ ਗੋਬਿੰਦ ਸਿੰਘ ਜੀ
ਗੁਰੂ ਗੋਬਿੰਦ ਸਿੰਘ ਜੀਗੁਰੂ ਗੋਬਿੰਦ ਸਿੰਘ ਜੀ
ਗੁਰੂ ਗੋਬਿੰਦ ਸਿੰਘ ਜੀ
 
Basics of punjab
Basics of punjabBasics of punjab
Basics of punjab
 
Interviewing skills
Interviewing skillsInterviewing skills
Interviewing skills
 
ABC ANALYSIS
ABC ANALYSISABC ANALYSIS
ABC ANALYSIS
 
Laws and regulations related to food industries
Laws and regulations related to food industries Laws and regulations related to food industries
Laws and regulations related to food industries
 
Customer relationship management
Customer relationship managementCustomer relationship management
Customer relationship management
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Network Analysis and Project Management Techniques

  • 2. Management of any project involves planning, coordination and control of a number of interrelated activities with limited resources. Furthermore, it becomes necessary to incorporate any change from the initial plan as they occur, and immediately know the effects of the change
  • 3. Network analysis is a common name for a number of associated projects which need planning and control procedures which based on the concept of network. It provides a framework which : • defines the job to be done, • integrates them in a logical time sequence and finally, • affords a system of dynamic control over the progress of the plan
  • 4. Network analysis helps in all the phases of project management. There phases are mainly Planning Scheduling Controling
  • 5. Identify the distinct activities,  Determine their durations and inter dependencies  Construct a network diagram, Determine minimum overall project duration (using the network diagram), Identify the tasks critical (i.E. Essential) to this minimum duration.
  • 6. Construct schedule (‘time chart’), Schedule contains start and finish times for each activity, and Evaluate cost-time trade-offs (evaluate effects of putting extra money, people or machines in a particular task in order to shorten project duration).
  • 7. Monitor/control project by use of network diagram, Follow progress of the various activities Make adjustment where appropriate (as network analysis make the planning susceptible to change in original plan)
  • 8. There are mainly two types of networking techniques which are used in project evaluation CPM – Critical Path Method PERT – Project Evaluation and Review Technique
  • 9. CPM is akin to PERT as both techniques use similar network models and methods are have the same general purpose. But CPM is primarily concerned with the trade-off between cost and time. It has been applied mostly to projects that employ fairly stable technology and are relatively risk free. Hence its orientation is ‘deterministic’
  • 10. PERT is eminently suitable for • research and development and programmes, aerospace projects, • other projects involving new technology. In such projects the time required for completing various jobs or activities can be highly variable. Hence the orientation of PERT is probabilistic
  • 11.  The PERT/CPM is capable of giving answers to the following questions to the project manager :  When will the project be finished ?  When is each individual part of the scheduled to start and finish ?  Of the numerous jobs in the project, which one must be timed to avoid being late ?  Is it possible to shift resources to critical jobs of the project from other non-critical jobs of the project without affecting the overall completion time of the project ?  Among all the jobs in the project, where should management concentrate its efforts at one time ?
  • 12.
  • 13.  In order to represent a project network, two basic elements are used which are node and activity.  A circle called “node”, represents an event.  An event describes a checkpoint.  It does not symbolize the performance of work, bit it represents the point in time in which the event is accomplished.
  • 14.  An arrow, called “arc”, represents an activity-a recognizable part of the project.  It involve mental or physical work and require time and resources for its completion.  The network will try to reflect all the relationships between the activities. • Arrow direction indicates general progression in time – tail events represent start while head events represent end of activities
  • 15. The simple rules govern the construction of a project network :  Each activity must be represented by only one directed arc or arrow.  No two activities can begin and end on the same two nodes circle  There should be no loops in the network. • Events are identified by numbers while activities are represented by their starting and ending events
  • 16.  Dummy activities are Tasks that must be completed in sequence but that don’t require resources or completion time are considered to have event dependency.  These are represented by dotted lines with arrows and are called dummy activities.  To explain it, we will consider the following ACTIVITY IMMEDIATE PREDECESSOR A ......................... B ......................... C A, B D B
  • 17. Activity Imm. Pred. Activity Imm. Pred. A - G C, F B - H B C - I E, H D A, B J E, H E B K C, D, F, J F B L K A C B E H F D G I J K L 1 2 3 4 5 6 7 8 9
  • 18.  Critical path refers to the longest path of a given project network  Duration of a project is given by the length of the critical path  Activities on a critical path are called critical activities while remaining activities are non-critical  A project can have more than one critical path as well  Critical activities are so called because their timely completion is critical to the completion of the project in time  Critical activities can not be delayed while non- critical activities have some cushion available
  • 19. Information on the activities required for a project is as follows: Draw the network and calculate the earliest start(ES), earliest finish(EF), latest start(LS), and latest finish(LF) times of each of the activities. Name A B C D E F G H I J K Activities Node 1-2 1-3 1-4 2-5 3-5 3-6 3-7 4-6 5-7 6-8 7- 8 Duration (Days) 2 7 8 3 6 10 4 6 2 5 6
  • 20. i - j t ES EF LS LF slack 1-2 2 0 2 9 11 7 1-3 7 0 7 0 7 0 1-4 8 0 8 3 11 3 2-5 3 2 5 11 14 9 3-5 6 7 13 8 14 1 3-6 10 7 17 7 17 0 3-7 4 7 11 12 16 5 4-6 6 8 14 11 17 3 5-7 2 13 1 14 16 15 6-8 5 17 22 17 22 0 7-8 6 15 21 16 22 1
  • 21.  Critical Path: 1-3-6-8  Critical Activities: B F J  Project Duration: 22 days  Non-critical Activities: A C E G H I K B 7 C 8 D 3 E 6 G 4 H 6 F 10 I 2 K 6 J 5 1 2 3 4 5 6 7 8
  • 22.  Total float is the amount of time by which an activity may be delayed without delaying the project completion Caution: interpret total floats of activities carefully - all can not be used independently  Free float is that part of total float which can be used without affecting floats of the succeeding activities  Independent float is the amount of time which can be used without affecting the head and the tail events Total Float ≥ Free Float ≥ Independent Float
  • 23.  Total float = Latest start time of the activity – Earliest start time of the activity  Free float = Earliest start time of the next activity – Earliest finish time of the activity  Interfering float = Total float – Free float  Independent float = Earliest start time of the next activity – Latest finish time of the preceding activity – Duration of the activity = Free float – Tail event slack, or zero, whichever is higher
  • 24. i - j t ES EF LS LF TF FF lnF 1-2 2 0 2 9 11 9 0 0 1-3 7 0 7 0 7 0 0 0 1-4 8 0 8 3 11 3 0 0 2-5 3 2 5 11 14 9 8 0 3-5 6 7 13 8 14 1 0 0 3-6 10 7 17 7 17 0 0 0 3-7 4 7 11 12 16 5 4 4 4-6 6 8 14 11 17 3 3 0 5-7 2 13 15 14 16 1 0 0 6-8 5 17 22 17 22 0 0 0 7-8 6 15 21 16 22 1 1 0
  • 25. For each activity, the model usually includes three times estimates • Optimistic time (a) - generally the shortest time in which the activity can be completed under ideal, favorable conditions • Most likely time (m) - the completion time under the normal conditions, having the highest probability. • Pessimistic time (b) - the longest time under worst, externally unfavorable conditions, which an activity might require
  • 26. The expected time for each activity can be approximated using the following weighted average Expected time = (Optimistic + 4 x Most likely + Pessimistic) / 6 te=(a+4m+b)/6 Variance is [(b – a )/6]2
  • 27.  The owner of a chain of fast-food restaurants is considering a new computer system for accounting and inventory control. A computer company sent the following information about the system installation: Activity Immediate Predecess or Most Optimistic Most likely Most Pessimisti c A - 4 6 8 B A 5 7 15 C A 4 8 12 D B 15 20 25 E B 10 18 26 F C 8 9 16 G E 4 8 12 H D,F 1 2 3 I G,H 6 7 8
  • 28. Critical activities: A B E G I Project duration = 6+8+18+8+7 = 47 days Project variance = 4/9 + 25/9 + 64/9 + 16/9 + 1/9 = 110/9 Project standard deviation = √(110/9) = 3.496 Example Activity a m b te σ2 A 4 6 8 6 4/9* B 5 7 15 8 25/9* C 4 8 12 8 16/9 D 15 20 25 20 25/9 E 10 18 26 18 64/9* F 8 9 16 10 16/9 G 4 8 12 8 16/9* H 1 2 3 2 1/9 I 6 7 8 7 1/9*
  • 29. For Pr (completion in 55 days): Z = (X - µ)/σ Z = (55 – 47)/3.496 = 2.29. Now, Area to the left of Z = 2.29 is 0.5+0.4890 = 0.9890 For Pr (completion with 0.90 chance): Z corresponding to area 0.40 (between µ and X) is 1.28. Thus, 1.28 = (X – 47)/3.496 and X = 51.47 or 52 app. The project should start 52 days before due date Project Network A B C E F D H G I
  • 30.  Especially useful when scheduling and controlling large projects  Straightforward concept and not mathematically complex  Graphical networks help to perceive relationships among project activities  Critical path and slack time analyses help pinpoint activities that need to be closely watched  Project documentation and graphics point out who is responsible for various activities  Applicable to a wide variety of projects  Useful in monitoring not only schedules but costs as well
  • 31. Project activities have to be clearly defined, independent, and stable in their relationships Precedence relationships must be specified and networked together Time estimates tend to be subjective and are subject to fudging by managers There is an inherent danger of too much emphasis being placed on the longest or critical path