SlideShare a Scribd company logo
1 of 25
PROJECT MANAGEMENT
Lesson 5
Abhijeet Kumar
Project
 “A project is a series of activities directed
to accomplishment of a desired objective.”
Plan your work first…..then work
your plan
Network analysis
Introduction
Network analysis is the general name given to certain specific
techniques which can be used for the planning, management and
control of projects.
One definition of a project:
“A project is a temporary endeavour undertaken to create a "unique"
product or service”
History
 Developed in 1950’s
 CPM by DuPont for chemical plants
 PERT by U.S. Navy for Polaris missile
PERT was developed by the US Navy for the planning and control of
the Polaris missile program and the emphasis was on completing the
program in the shortest possible time. In addition PERT had the
ability to cope with uncertain activity completion times (e.g. for a
particular activity the most likely completion time is 4 weeks but it
could be anywhere between 3 weeks and 8 weeks).
CPM was developed by Du Pont and the emphasis was on the
trade-off between the cost of the project and its overall
completion time (e.g. for certain activities it may be possible
to decrease their completion times by spending more money -
how does this affect the overall completion time of the
project?)
CPM - Critical Path Method
 Definition: In CPM activities are shown as a network of
precedence relationships using activity-on-node network
construction
– Single estimate of activity time
– Deterministic activity times
USED IN : Production management - for the jobs of
repetitive in nature where the activity time estimates can
be predicted with considerable certainty due to the
existence of past experience.
PERT -
Project Evaluation & Review Techniques
 Definition: In PERT activities are shown as a network of
precedence relationships using activity-on-arrow network
construction
– Multiple time estimates
– Probabilistic activity times
USED IN : Project management - for non-repetitive jobs
(research and development work), where the time and cost
estimates tend to be quite uncertain. This technique uses
probabilistic time estimates.
Originated by H.L.Gantt in 1918
Gantt chart
Advantages
- Gantt charts are quite commonly used.
They provide an easy graphical
representation of when activities (might)
take place.
Limitations
- Do not clearly indicate details regarding
the progress of activities
- Do not give a clear indication of
interrelation ship between the separate
activities
CPM/PERT
These deficiencies can be eliminated to a large extent by
showing the interdependence of various activities by means of
connecting arrows called network technique.
 Overtime CPM and PERT became one technique
 ADVANTAGES:
– Precedence relationships
– large projects
– more efficient
The Project Network
 Use of nodes and arrows
Arrows  An arrow leads from tail to head directionally
– Indicate ACTIVITY, a time consuming effort that is required to
perform a part of the work.
Nodes  A node is represented by a circle
- Indicate EVENT, a point in time where one or more activities start
and/or finish.
Activity on Node & Activity on Arrow
Activity on Node
- A completion of an activity
is represented by a node
Activity on Arrow
- An arrow represents a task,
while a node is the
completion of a task
- Arrows represent order of
events
Activity Slack
Each event has two important times associated with it :
- Earliest time , Te , which is a calendar time when a event can
occur when all the predecessor events completed at the earliest
possible times
- Latest time , TL , which is the latest time the event can occur with
out delaying the subsequent events and completion of project.
 Difference between the latest time and the earliest time of an event
is the slack time for that event
Positive slack : Slack is the amount of time an event can be delayed
without delaying the project completion
Critical Path
 Is that the sequence of activities and events where there is no
“slack” i.e.. Zero slack
 Longest path through a network
 minimum project completion time
Benefits of CPM/PERT
 Useful at many stages of project management
 Mathematically simple
 Give critical path and slack time
 Provide project documentation
 Useful in monitoring costs
Questions Answered by CPM & PERT
 Completion date?
 On Schedule?
 Within Budget?
 Critical Activities?
 How can the project be finished early at the least cost?
example
Illustration of network analysis of a minor redesign of a product and
its associated packaging.
The key question is: How long will it take to complete this project ?
For clarity, this list is kept to a minimum by specifying only
immediate relationships, that is relationships involving activities
that "occur near to each other in time".
•"What activities must be finished before this activity can start"
•could we complete this project in 30 weeks?
•could we complete this project in 2 weeks?
One answer could be, if we first do activity 1, then activity 2, then activity 3,
...., then activity 10, then activity 11 and the project would then take the sum
of the activity completion times, 30 weeks.
“What is the minimum possible time in which we can complete this project ? “
Before starting any of the above activity, the questions
asked would be
We shall see below how the network analysis diagram/picture we construct
helps us to answer this question.
CRITICAL PATH TAKES 24 WEEKS FOR THE COMPLETION OF THE PROJECT
Packages are available to determine the shortest path and
other relevant information.
Data entry window
Output of the package
Limitations to CPM/PERT
 Clearly defined, independent and stable activities
 Specified precedence relationships
 Over emphasis on critical paths
YouTube Videos
https://youtu.be/-TDh-5n90vk
https://youtu.be/DdDzybQ_9vM
Thank you

More Related Content

Similar to time mamangement.ppt

project management-cpm and pert methods for managers
project management-cpm and pert methods for managersproject management-cpm and pert methods for managers
project management-cpm and pert methods for managersNaganna Chetty
 
Project managemen PERT VS CPM
Project managemen  PERT VS CPMProject managemen  PERT VS CPM
Project managemen PERT VS CPMPadamNepal1
 
Advanced project management mod 4
Advanced project management mod 4Advanced project management mod 4
Advanced project management mod 4POOJA UDAYAN
 
Project Management: NETWORK ANALYSIS - CPM and PERT
Project Management: NETWORK ANALYSIS - CPM and PERTProject Management: NETWORK ANALYSIS - CPM and PERT
Project Management: NETWORK ANALYSIS - CPM and PERTS.Vijaya Bhaskar
 
PROJECT-SCHEDULING-pptx.pptx
PROJECT-SCHEDULING-pptx.pptxPROJECT-SCHEDULING-pptx.pptx
PROJECT-SCHEDULING-pptx.pptxTecnicoItca
 
PERT Ghant chart and bench marking with application to nursing
PERT Ghant chart and bench marking with application to nursingPERT Ghant chart and bench marking with application to nursing
PERT Ghant chart and bench marking with application to nursingHariasha
 
Network analysis cpm module3
Network analysis cpm module3Network analysis cpm module3
Network analysis cpm module3ahsanrabbani
 

Similar to time mamangement.ppt (20)

06 pert cpm
06 pert cpm06 pert cpm
06 pert cpm
 
porject management
porject managementporject management
porject management
 
3...06 pert cpm
3...06 pert cpm3...06 pert cpm
3...06 pert cpm
 
S pert cpm
S pert cpmS pert cpm
S pert cpm
 
06 pert cpm (1)
06 pert cpm (1)06 pert cpm (1)
06 pert cpm (1)
 
Cpm n pert
Cpm n pertCpm n pert
Cpm n pert
 
PERT/CPM
PERT/CPMPERT/CPM
PERT/CPM
 
Pert cpm
Pert cpm Pert cpm
Pert cpm
 
project management-cpm and pert methods for managers
project management-cpm and pert methods for managersproject management-cpm and pert methods for managers
project management-cpm and pert methods for managers
 
CPM AND PERT
CPM AND PERTCPM AND PERT
CPM AND PERT
 
Pert cpm
Pert  cpmPert  cpm
Pert cpm
 
Project managemen PERT VS CPM
Project managemen  PERT VS CPMProject managemen  PERT VS CPM
Project managemen PERT VS CPM
 
Chapter 3.pptx
Chapter 3.pptxChapter 3.pptx
Chapter 3.pptx
 
Ch 5.pptx
Ch 5.pptxCh 5.pptx
Ch 5.pptx
 
Advanced project management mod 4
Advanced project management mod 4Advanced project management mod 4
Advanced project management mod 4
 
Project Management: NETWORK ANALYSIS - CPM and PERT
Project Management: NETWORK ANALYSIS - CPM and PERTProject Management: NETWORK ANALYSIS - CPM and PERT
Project Management: NETWORK ANALYSIS - CPM and PERT
 
PROJECT-SCHEDULING-pptx.pptx
PROJECT-SCHEDULING-pptx.pptxPROJECT-SCHEDULING-pptx.pptx
PROJECT-SCHEDULING-pptx.pptx
 
PERT Ghant chart and bench marking with application to nursing
PERT Ghant chart and bench marking with application to nursingPERT Ghant chart and bench marking with application to nursing
PERT Ghant chart and bench marking with application to nursing
 
project network
project networkproject network
project network
 
Network analysis cpm module3
Network analysis cpm module3Network analysis cpm module3
Network analysis cpm module3
 

More from Madhusha15

Chapter 3A (2).pptx
Chapter 3A (2).pptxChapter 3A (2).pptx
Chapter 3A (2).pptxMadhusha15
 
Chapter 1A.pptx
Chapter 1A.pptxChapter 1A.pptx
Chapter 1A.pptxMadhusha15
 
SQL Lesson 6 - Select.pdf
SQL Lesson 6 - Select.pdfSQL Lesson 6 - Select.pdf
SQL Lesson 6 - Select.pdfMadhusha15
 
Class 8 -Authentication Controls.pptx
Class 8 -Authentication Controls.pptxClass 8 -Authentication Controls.pptx
Class 8 -Authentication Controls.pptxMadhusha15
 
Class 7- XIoT and Botnets.pptx
Class 7- XIoT and Botnets.pptxClass 7- XIoT and Botnets.pptx
Class 7- XIoT and Botnets.pptxMadhusha15
 
Day 7 Project Cost Management .pdf
Day 7 Project Cost Management .pdfDay 7 Project Cost Management .pdf
Day 7 Project Cost Management .pdfMadhusha15
 
Management and Team Building.pptx
Management and Team Building.pptxManagement and Team Building.pptx
Management and Team Building.pptxMadhusha15
 

More from Madhusha15 (7)

Chapter 3A (2).pptx
Chapter 3A (2).pptxChapter 3A (2).pptx
Chapter 3A (2).pptx
 
Chapter 1A.pptx
Chapter 1A.pptxChapter 1A.pptx
Chapter 1A.pptx
 
SQL Lesson 6 - Select.pdf
SQL Lesson 6 - Select.pdfSQL Lesson 6 - Select.pdf
SQL Lesson 6 - Select.pdf
 
Class 8 -Authentication Controls.pptx
Class 8 -Authentication Controls.pptxClass 8 -Authentication Controls.pptx
Class 8 -Authentication Controls.pptx
 
Class 7- XIoT and Botnets.pptx
Class 7- XIoT and Botnets.pptxClass 7- XIoT and Botnets.pptx
Class 7- XIoT and Botnets.pptx
 
Day 7 Project Cost Management .pdf
Day 7 Project Cost Management .pdfDay 7 Project Cost Management .pdf
Day 7 Project Cost Management .pdf
 
Management and Team Building.pptx
Management and Team Building.pptxManagement and Team Building.pptx
Management and Team Building.pptx
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

time mamangement.ppt

  • 2. Project  “A project is a series of activities directed to accomplishment of a desired objective.” Plan your work first…..then work your plan
  • 3. Network analysis Introduction Network analysis is the general name given to certain specific techniques which can be used for the planning, management and control of projects. One definition of a project: “A project is a temporary endeavour undertaken to create a "unique" product or service”
  • 4. History  Developed in 1950’s  CPM by DuPont for chemical plants  PERT by U.S. Navy for Polaris missile PERT was developed by the US Navy for the planning and control of the Polaris missile program and the emphasis was on completing the program in the shortest possible time. In addition PERT had the ability to cope with uncertain activity completion times (e.g. for a particular activity the most likely completion time is 4 weeks but it could be anywhere between 3 weeks and 8 weeks). CPM was developed by Du Pont and the emphasis was on the trade-off between the cost of the project and its overall completion time (e.g. for certain activities it may be possible to decrease their completion times by spending more money - how does this affect the overall completion time of the project?)
  • 5. CPM - Critical Path Method  Definition: In CPM activities are shown as a network of precedence relationships using activity-on-node network construction – Single estimate of activity time – Deterministic activity times USED IN : Production management - for the jobs of repetitive in nature where the activity time estimates can be predicted with considerable certainty due to the existence of past experience.
  • 6. PERT - Project Evaluation & Review Techniques  Definition: In PERT activities are shown as a network of precedence relationships using activity-on-arrow network construction – Multiple time estimates – Probabilistic activity times USED IN : Project management - for non-repetitive jobs (research and development work), where the time and cost estimates tend to be quite uncertain. This technique uses probabilistic time estimates.
  • 7. Originated by H.L.Gantt in 1918 Gantt chart Advantages - Gantt charts are quite commonly used. They provide an easy graphical representation of when activities (might) take place. Limitations - Do not clearly indicate details regarding the progress of activities - Do not give a clear indication of interrelation ship between the separate activities
  • 8. CPM/PERT These deficiencies can be eliminated to a large extent by showing the interdependence of various activities by means of connecting arrows called network technique.  Overtime CPM and PERT became one technique  ADVANTAGES: – Precedence relationships – large projects – more efficient
  • 9. The Project Network  Use of nodes and arrows Arrows  An arrow leads from tail to head directionally – Indicate ACTIVITY, a time consuming effort that is required to perform a part of the work. Nodes  A node is represented by a circle - Indicate EVENT, a point in time where one or more activities start and/or finish.
  • 10. Activity on Node & Activity on Arrow Activity on Node - A completion of an activity is represented by a node Activity on Arrow - An arrow represents a task, while a node is the completion of a task - Arrows represent order of events
  • 11. Activity Slack Each event has two important times associated with it : - Earliest time , Te , which is a calendar time when a event can occur when all the predecessor events completed at the earliest possible times - Latest time , TL , which is the latest time the event can occur with out delaying the subsequent events and completion of project.  Difference between the latest time and the earliest time of an event is the slack time for that event Positive slack : Slack is the amount of time an event can be delayed without delaying the project completion
  • 12. Critical Path  Is that the sequence of activities and events where there is no “slack” i.e.. Zero slack  Longest path through a network  minimum project completion time
  • 13. Benefits of CPM/PERT  Useful at many stages of project management  Mathematically simple  Give critical path and slack time  Provide project documentation  Useful in monitoring costs
  • 14. Questions Answered by CPM & PERT  Completion date?  On Schedule?  Within Budget?  Critical Activities?  How can the project be finished early at the least cost?
  • 15. example Illustration of network analysis of a minor redesign of a product and its associated packaging. The key question is: How long will it take to complete this project ?
  • 16. For clarity, this list is kept to a minimum by specifying only immediate relationships, that is relationships involving activities that "occur near to each other in time".
  • 17. •"What activities must be finished before this activity can start" •could we complete this project in 30 weeks? •could we complete this project in 2 weeks? One answer could be, if we first do activity 1, then activity 2, then activity 3, ...., then activity 10, then activity 11 and the project would then take the sum of the activity completion times, 30 weeks. “What is the minimum possible time in which we can complete this project ? “ Before starting any of the above activity, the questions asked would be
  • 18. We shall see below how the network analysis diagram/picture we construct helps us to answer this question.
  • 19. CRITICAL PATH TAKES 24 WEEKS FOR THE COMPLETION OF THE PROJECT
  • 20. Packages are available to determine the shortest path and other relevant information.
  • 22. Output of the package
  • 23. Limitations to CPM/PERT  Clearly defined, independent and stable activities  Specified precedence relationships  Over emphasis on critical paths