SlideShare a Scribd company logo
CRITICAL CHAIN PROJECT
MANAGEMENT
EMCM5103 TOPIC 9
INTRODUCTION
• This topic deals with the complications and changes that occur in
standard operating procedures. Since complications usually occur
after resource requirements have been linked to the developed
schedule of the project, alternative approaches need to be
developed in order to deal with the constrained situation.
• The discipline of the mechanism to overcome the constraints of
complications in a project comes from the theory of constraints by
Goldratt (Tu, Sebla & Vayvay, 2014). The theory of constraints
(TOC) is a management philosophy which focuses on the weakest
ring(s) in the chain to improve the performance of systems.
INTRODUCTION
• It was originally proposed as a process for removing bottlenecks from
production processes. One of the key features in critical change project
management (CCPM) theory is that the important technical and
behavioural elements must be understood in relation to each other.
• The CCPM method reengineers the project planning and management
practices, in order to eliminate issues and problems that lead to poor
project results. The critical chain refers to the longest string of
dependencies that are present in a project. The term chain is used
instead of path, because the critical path is only linked to technical
dependencies and not resource dependencies .
THEORY OF CONSTRAINTS
• Theory of Constraint (TOC) is a change method where the focus is
on identifying constraints or bottlenecks in processes and systems.
• These bottlenecks can prevent organisations to maximise its
performance and reach the objective, which is normally to
increase profit
• These bottlenecks can include information, equipment, work
force, and supplies, and can be both internal and external to an
organisation. The fundamental concept of the theory is that,
every business has at least one constraint. That is, any factor that
limits the output of the organisation and prevents it to improve
the performance.
THEORY OF CONSTRAINTS (TOC)
The 5 steps of TOC
THEORY OF CONSTRAINTS (TOC)
5 steps within TOC methodology that make up the CCPM
Identify the system’s constraint - An intensive identification
of small, minor problems or numerous secondary causes of
constraints must be made to uncover the principle constraint
- the root cause - which limits the output of any system.;
what type of bottleneck that cause problem in the system.
Determine how to exploit these
constraints: Find ways to ensure the
maximum utilisation of the
bottleneck. This could mean
reducing the number of changeovers,
offload work that can be done on
another machine or reduce setup
times to create additional capacity.
Once the root constraint is
identified, a strategy for focusing
and viewing all activities in terms of
the constraint is necessary.
Subject everything else to the system’s
constraint - Make resource commitments or
scheduling decisions after handling the needs of
the root constraint.To keep the bottleneck
running at full capacity at all times, all other
decisions must be subordinated. Running other
machines with a higher production rate than
the bottleneck is considered waste.
Elevate the system’s constraint - This
step addresses the improvement of
the system by elevating the
constraint or seeking to solve the
constraint problem by eliminating the
bottleneck effect.
Elevate constraints to a new level of
productivity: Concentrate all
resources and efforts on the
bottleneck to increase throughput rate
or output. One way to do this is to run
the bottleneck machine for extra
hours every day, this increases the
capacity of the machine . The
difference between step 2 and 4
relates to the amount of investment
required
Start again on step on: With increased capacity of the machine,
there might be a new bottleneck, which needs to be addressed.
The process of improvement must be repeated. Here it is
important to make sure inertia does not cause a system constraint
Determine if a new constraint has been uncovered, then repeat
the process.
CRITICAL CHAIN PROJECT MANAGEMENT
(CCPM)
Theory of Constraints (TOC) – developed by Goldratt : for applications within
production environment.
5 steps within TOC methodology that make up the CCPM :
(a)Identify the system’s constraint - An intensive identification of small, minor
problems or numerous secondary causes of constraints must be made to
uncover the principle constraint - the root cause - which limits the output of
any system.
(b) Exploit the system’s constraint - Once the root constraint is identified, a
strategy for focusing and viewing all activities in terms of the constraint is
necessary.
CRITICAL CHAIN PROJECT MANAGEMENT
(CCPM)
(c) Subject everything else to the system’s constraint - Make resource commitments
or scheduling decisions after handling the needs of the root constraint.
(d) Elevate the system’s constraint - This step addresses the improvement of the system
by elevating the constraint or seeking to solve the constraint problem by eliminating
the bottleneck effect.
(e) Determine if a new constraint has been uncovered, then repeat the process.
• Critical chain method is a modified form of the critical path method. Here, availability
of resources is considered while creating the project schedule.
• In critical chain project management, instead of float, buffers are used. These buffers
are designed in such a way that they completely eliminate the concept of float or
slack.
• The main philosophy of tasks under the CCPM is to manage the implementation of
individual project tasks and the critical chain of tasks scheduled around the effective
use of resources.
• CCPM focuses on the optimisation of the schedule by working with the safety margin
that people build into their task estimations. The safety margin has to be removed and
replaced by buffers at specific points in the project schedule.
CRITICAL CHAIN PROJECT MANAGEMENT
(CCPM)
ANATOMY OF A TASK
The main philosophy of tasks under the CCPM is to manage the implementation of
individual project tasks and the critical chain of tasks scheduled around the
effective use of resources . The anatomy of a task is defined as an internal structure
of task within the CCPM. It consists of tasks that define the lowest possible lead
time. The composition of tasks are made up of sequentially dependent tasks.
There are two types of dependencies between tasks involved under CCPM.
One is the ‘tail to head’ task dependency of which the output of one task is
required as an input for another task. The other is resource dependency, also
known as resource constrained critical path, which affects the completion time
of the project.
CCPM focuses on the optimisation of the schedule by working with the safety
margin that people build into their task estimations. The safety margin has to
be removed and replaced by buffers at specific points in the project schedule.
There are four types of buffers that are commonly practised:
(a) Project buffer - It is usually placed at the end of the project schedule and is
flexible to accommodate for adjustments based on project experience;
(b) Feeding buffer - This type of buffer is placed at points where inputs from
non-critical tasks merge with critical chain tasks;
(c) Resource buffer - This is the cut-off warning for having to complete the
current task and the project team has to start preparing for a critical chain
task as soon as the current work is done; and
(d) Capacity buffer - This buffer is placed as an on call resource in the schedule
when it is needed to prevent delays in the schedule. This type of buffer adds
costs to the project. Usually it is practised in multiple project setting.
• Project Buffer This buffer is placed between the last task and the project completion date as a
non-activity buffer, and this buffer acts as a contingency for the critical chain activities. Any delay on
the critical chain will eat this buffer, but the project completion date will remain unchanged. Also, if
there is any gain from the early finish of any activity, this gain will be added to this buffer as well.
Usually the duration of this buffer is 50% of the contingency that you have removed from each task
estimate.
• Feeding Buffers These buffers are added to the non-critical chain so that any delay on the non-
critical chain does not affect the critical chain. They are inserted between the last task on a non-
critical chain and the critical chain.
• Feeding buffers are also calculated the same way as the project buffer. The duration of these buffers
is based on some fraction of the safety removed from the tasks on non-critical chains.
• Resource Buffers These buffers are kept alongside the critical chain to make sure that they are
available when they are required. This buffer can be a human resource or any equipment. Critical
chain considers the resource constraints as well, it may be longer than the critical path schedule.
However, this might be compensated by removing the contingencies from the activities. Resources
used in critical chain are known as critical resources.
EXECUTION OF CRITICAL CHAIN PROJECT
SOLUTION
The word “buffer” or “safety” has been used to refer to the contingency reserve
for individual activities that project managers would like to maintain. This reserve
is reduced when we aggregate risks to ensure that all durations are realistic
rather than adopting the duration estimates based on a 90 per cent likelihood of
successful completion, hence, all activity duration estimates are at the 50 per cent
level. The provision for contingency, in the form of project safety, is removed from
the individual activities and applied at the project level. As a result, indirectly the
project duration is reduced. The remaining questions that need to be answered are:
How much of the project duration has already been reduced and how much of the
aggregated buffer is sufficient?
Realistically, the application of CCPM can be categorised into three phases:
(a) Lay all the relevant project tasks in a simplified manner using illustrated diagrams;
(b) Shrink all the duration estimates to the 50 per cent likelihood level. All individual tasks
safety or buffer have been aggregated and is now presented as the project-level buffer; and
(c) Using the rule of thumb of 50 per cent shrinkage, the project schedule is still significantly
shorter than the original. Suppose that a project activity network diagram yielded the initial
values as given in Table 9.1. Note that the modified network shortens the overall project
duration by 22 days, from the original 40 to 18 days. This is because all the risks has been
aggregated at the project level. There is a total of 22 days of potential slack in the schedule
resulting from shrinking activity estimates at each project step. A CPPM modified project
schedule would reapply 11 days of the acquired schedule shrinkage to serve as overall
project buffer. Therefore, the new project schedule will anticipate a duration estimates that
requires 29 days to complete the project.
CCPM is not without weaknesses and critics. There are several arguments in the
methodology of CCPM as mentioned in the following:
(a) Lack of project milestones make coordinated scheduling highly problematic,
particularly with external suppliers. Critics contend that the lack of inprocess project
milestones adversely affects the means to coordinate schedule dates with suppliers
who provide the external delivery of critical components;
(b) CCPM is refuted as an ill-suited technique for many types of projects or viewed as
a reconceptualisation of well-understood scheduling methodologies such as Project
evaluation review technique (PERT);
(c) Organisations have to be extremely careful when deciding to exclude conventional
project management scheduling processes in order to solely adopt a CCPM approach as
the method for planning and scheduling activities; and
(d) CCPM is known to bring increased discipline to project scheduling but arguably
seen as an inefficient method for managing the firm’s portfolio of
projects.
IMPLEMENTATION OF MULTI PROJECT
CRITICAL PATH
• Critical chain is not the same as the critical path within an activity network.
Critical chain usually skips task dependency links because it requires all
resource levelling to be done before the critical chain can be identified, not after
as in the case of PERT and CPM (Critical path method) networks.
• Critical path depends on task dependency, that is, the linkage of tasks with their
predecessors. In this process, activity slack is discovered after the fact is known
about the layout of the network and the identification of the critical path, all
other paths and activities that may contain some level of slack. For example, a
simplified PERT network that identifies three paths as shown in Figure 9.1.
• Figure 9.1 shows the length of the critical path that represents a sequence of activities in
the project network which only involves one staff. Scheduling projects with resource
constraints might lead to resource conflicts as shown in the Figure 9.1. In order to solve
this resource conflict, activities might need to be shifted further to time periods where
resources are still available as illustrated in Figure 9.2, with added path to represent the
solution.
• Given the usual practice, the critical path should have only one critical path per project
but if there is more than one path, one of the options for the project manager is to have an
additional staff (such as assistant project manager) for each critical path added to the
project. The change may be added as part of the contract documentation in the Planning
Phase (procedures, work practices and policies) and how it will be managed in Execution
Phase (meetings, inspections and status reports) in order to keep the project completion a
reality. An additional risk analysis and priority matrix may need to be considered for
each additional path. Figure 9.2 shows a suggested example of the additional path that
might be taken to curb the resource conflict.
• https://youtu.be/CLUixYV7bok
• https://youtu.be/mpc_FdAt75A
• https://youtu.be/eLuYgRhT4RI
THANK YOU

More Related Content

Similar to topic9.pdf

Asset Finance Systems: Project Initiation "101"
Asset Finance Systems: Project Initiation "101"Asset Finance Systems: Project Initiation "101"
Asset Finance Systems: Project Initiation "101"
David Pedreno
 
SDLC - Part 2
SDLC - Part 2SDLC - Part 2
SDLC - Part 2
Lakshmi-BA
 
Definition Of Project Management
Definition Of Project ManagementDefinition Of Project Management
Definition Of Project ManagementMostafa Ewees
 
Asset Finance Agile Projects
Asset Finance Agile ProjectsAsset Finance Agile Projects
Asset Finance Agile Projects
David Pedreno
 
Agile projects
Agile projectsAgile projects
Agile projects
David Pedreno
 
Agile projects are for delivering packaged software too
Agile projects are for delivering packaged software tooAgile projects are for delivering packaged software too
Agile projects are for delivering packaged software too
David Harmer
 
Rel maint-final
Rel maint-finalRel maint-final
Rel maint-final
amar sadi
 
PMBok Processes with CCPM Best Practices
PMBok Processes with CCPM Best PracticesPMBok Processes with CCPM Best Practices
PMBok Processes with CCPM Best PracticesRicardo Leite
 
Critical chain - Eliyahu goldratt
Critical chain - Eliyahu goldrattCritical chain - Eliyahu goldratt
Critical chain - Eliyahu goldratt
azadiriz
 
Chapter-1.ppt
Chapter-1.pptChapter-1.ppt
Chapter-1.ppt
KanadamKarteekaPavan1
 
RELIABILITY CENTERED MAINTAINANCE
RELIABILITY CENTERED MAINTAINANCERELIABILITY CENTERED MAINTAINANCE
RELIABILITY CENTERED MAINTAINANCE
kifayat ullah
 
RELIABILITY CENTERED MAINTAINANCE
RELIABILITY CENTERED MAINTAINANCERELIABILITY CENTERED MAINTAINANCE
RELIABILITY CENTERED MAINTAINANCE
kifayat ullah
 
Software Development Life Cycle – SDLC
Software Development Life Cycle – SDLCSoftware Development Life Cycle – SDLC
Software Development Life Cycle – SDLC
Shwetha-BA
 
SDLC
SDLCSDLC
SDLC
Sunil-QA
 
Process Quality Management, Human Resources, Quality Assurance
Process Quality Management, Human Resources, QualityAssuranceProcess Quality Management, Human Resources, QualityAssurance
Process Quality Management, Human Resources, Quality Assurance
Reem Alattas
 
Advanced concept of project risk management project report
Advanced concept of project risk management project reportAdvanced concept of project risk management project report
Advanced concept of project risk management project report
ramesh roy
 
ICEC 2014 Linking 6 Phase Project Life Cycle with TCM Framework-Paper
ICEC 2014 Linking 6 Phase Project Life Cycle with TCM Framework-PaperICEC 2014 Linking 6 Phase Project Life Cycle with TCM Framework-Paper
ICEC 2014 Linking 6 Phase Project Life Cycle with TCM Framework-Paper
Russell Archibald
 
Theory of constraints
Theory of constraintsTheory of constraints
Theory of constraints
Sourabh Joshi
 
SDLC Methodologies
SDLC MethodologiesSDLC Methodologies
SDLC Methodologies
Sunil-QA
 
Step by Step Guide to Learn SDLC
Step by Step Guide to Learn SDLCStep by Step Guide to Learn SDLC
Step by Step Guide to Learn SDLC
Sunil-QA
 

Similar to topic9.pdf (20)

Asset Finance Systems: Project Initiation "101"
Asset Finance Systems: Project Initiation "101"Asset Finance Systems: Project Initiation "101"
Asset Finance Systems: Project Initiation "101"
 
SDLC - Part 2
SDLC - Part 2SDLC - Part 2
SDLC - Part 2
 
Definition Of Project Management
Definition Of Project ManagementDefinition Of Project Management
Definition Of Project Management
 
Asset Finance Agile Projects
Asset Finance Agile ProjectsAsset Finance Agile Projects
Asset Finance Agile Projects
 
Agile projects
Agile projectsAgile projects
Agile projects
 
Agile projects are for delivering packaged software too
Agile projects are for delivering packaged software tooAgile projects are for delivering packaged software too
Agile projects are for delivering packaged software too
 
Rel maint-final
Rel maint-finalRel maint-final
Rel maint-final
 
PMBok Processes with CCPM Best Practices
PMBok Processes with CCPM Best PracticesPMBok Processes with CCPM Best Practices
PMBok Processes with CCPM Best Practices
 
Critical chain - Eliyahu goldratt
Critical chain - Eliyahu goldrattCritical chain - Eliyahu goldratt
Critical chain - Eliyahu goldratt
 
Chapter-1.ppt
Chapter-1.pptChapter-1.ppt
Chapter-1.ppt
 
RELIABILITY CENTERED MAINTAINANCE
RELIABILITY CENTERED MAINTAINANCERELIABILITY CENTERED MAINTAINANCE
RELIABILITY CENTERED MAINTAINANCE
 
RELIABILITY CENTERED MAINTAINANCE
RELIABILITY CENTERED MAINTAINANCERELIABILITY CENTERED MAINTAINANCE
RELIABILITY CENTERED MAINTAINANCE
 
Software Development Life Cycle – SDLC
Software Development Life Cycle – SDLCSoftware Development Life Cycle – SDLC
Software Development Life Cycle – SDLC
 
SDLC
SDLCSDLC
SDLC
 
Process Quality Management, Human Resources, Quality Assurance
Process Quality Management, Human Resources, QualityAssuranceProcess Quality Management, Human Resources, QualityAssurance
Process Quality Management, Human Resources, Quality Assurance
 
Advanced concept of project risk management project report
Advanced concept of project risk management project reportAdvanced concept of project risk management project report
Advanced concept of project risk management project report
 
ICEC 2014 Linking 6 Phase Project Life Cycle with TCM Framework-Paper
ICEC 2014 Linking 6 Phase Project Life Cycle with TCM Framework-PaperICEC 2014 Linking 6 Phase Project Life Cycle with TCM Framework-Paper
ICEC 2014 Linking 6 Phase Project Life Cycle with TCM Framework-Paper
 
Theory of constraints
Theory of constraintsTheory of constraints
Theory of constraints
 
SDLC Methodologies
SDLC MethodologiesSDLC Methodologies
SDLC Methodologies
 
Step by Step Guide to Learn SDLC
Step by Step Guide to Learn SDLCStep by Step Guide to Learn SDLC
Step by Step Guide to Learn SDLC
 

More from HASMANIRA

Contract Management - Contracts Types and Payment Structure
Contract Management - Contracts Types and Payment StructureContract Management - Contracts Types and Payment Structure
Contract Management - Contracts Types and Payment Structure
HASMANIRA
 
International Project Management - Core Concept and Theory of Projects
International Project Management - Core Concept and Theory of ProjectsInternational Project Management - Core Concept and Theory of Projects
International Project Management - Core Concept and Theory of Projects
HASMANIRA
 
OSHConstructionLecture_Legal Requirements .pdf
OSHConstructionLecture_Legal Requirements .pdfOSHConstructionLecture_Legal Requirements .pdf
OSHConstructionLecture_Legal Requirements .pdf
HASMANIRA
 
TOPIC8.pdf
TOPIC8.pdfTOPIC8.pdf
TOPIC8.pdf
HASMANIRA
 
TOPIC6.pdf
TOPIC6.pdfTOPIC6.pdf
TOPIC6.pdf
HASMANIRA
 
TOPIC7.pdf
TOPIC7.pdfTOPIC7.pdf
TOPIC7.pdf
HASMANIRA
 
TOPIC5.pdf
TOPIC5.pdfTOPIC5.pdf
TOPIC5.pdf
HASMANIRA
 
TOPIC3.pdf
TOPIC3.pdfTOPIC3.pdf
TOPIC3.pdf
HASMANIRA
 
TOPIC2.pdf
TOPIC2.pdfTOPIC2.pdf
TOPIC2.pdf
HASMANIRA
 
TOPIC1.pdf
TOPIC1.pdfTOPIC1.pdf
TOPIC1.pdf
HASMANIRA
 

More from HASMANIRA (10)

Contract Management - Contracts Types and Payment Structure
Contract Management - Contracts Types and Payment StructureContract Management - Contracts Types and Payment Structure
Contract Management - Contracts Types and Payment Structure
 
International Project Management - Core Concept and Theory of Projects
International Project Management - Core Concept and Theory of ProjectsInternational Project Management - Core Concept and Theory of Projects
International Project Management - Core Concept and Theory of Projects
 
OSHConstructionLecture_Legal Requirements .pdf
OSHConstructionLecture_Legal Requirements .pdfOSHConstructionLecture_Legal Requirements .pdf
OSHConstructionLecture_Legal Requirements .pdf
 
TOPIC8.pdf
TOPIC8.pdfTOPIC8.pdf
TOPIC8.pdf
 
TOPIC6.pdf
TOPIC6.pdfTOPIC6.pdf
TOPIC6.pdf
 
TOPIC7.pdf
TOPIC7.pdfTOPIC7.pdf
TOPIC7.pdf
 
TOPIC5.pdf
TOPIC5.pdfTOPIC5.pdf
TOPIC5.pdf
 
TOPIC3.pdf
TOPIC3.pdfTOPIC3.pdf
TOPIC3.pdf
 
TOPIC2.pdf
TOPIC2.pdfTOPIC2.pdf
TOPIC2.pdf
 
TOPIC1.pdf
TOPIC1.pdfTOPIC1.pdf
TOPIC1.pdf
 

Recently uploaded

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 

Recently uploaded (20)

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 

topic9.pdf

  • 2. INTRODUCTION • This topic deals with the complications and changes that occur in standard operating procedures. Since complications usually occur after resource requirements have been linked to the developed schedule of the project, alternative approaches need to be developed in order to deal with the constrained situation. • The discipline of the mechanism to overcome the constraints of complications in a project comes from the theory of constraints by Goldratt (Tu, Sebla & Vayvay, 2014). The theory of constraints (TOC) is a management philosophy which focuses on the weakest ring(s) in the chain to improve the performance of systems.
  • 3. INTRODUCTION • It was originally proposed as a process for removing bottlenecks from production processes. One of the key features in critical change project management (CCPM) theory is that the important technical and behavioural elements must be understood in relation to each other. • The CCPM method reengineers the project planning and management practices, in order to eliminate issues and problems that lead to poor project results. The critical chain refers to the longest string of dependencies that are present in a project. The term chain is used instead of path, because the critical path is only linked to technical dependencies and not resource dependencies .
  • 4. THEORY OF CONSTRAINTS • Theory of Constraint (TOC) is a change method where the focus is on identifying constraints or bottlenecks in processes and systems. • These bottlenecks can prevent organisations to maximise its performance and reach the objective, which is normally to increase profit • These bottlenecks can include information, equipment, work force, and supplies, and can be both internal and external to an organisation. The fundamental concept of the theory is that, every business has at least one constraint. That is, any factor that limits the output of the organisation and prevents it to improve the performance.
  • 5. THEORY OF CONSTRAINTS (TOC) The 5 steps of TOC
  • 6. THEORY OF CONSTRAINTS (TOC) 5 steps within TOC methodology that make up the CCPM Identify the system’s constraint - An intensive identification of small, minor problems or numerous secondary causes of constraints must be made to uncover the principle constraint - the root cause - which limits the output of any system.; what type of bottleneck that cause problem in the system. Determine how to exploit these constraints: Find ways to ensure the maximum utilisation of the bottleneck. This could mean reducing the number of changeovers, offload work that can be done on another machine or reduce setup times to create additional capacity. Once the root constraint is identified, a strategy for focusing and viewing all activities in terms of the constraint is necessary. Subject everything else to the system’s constraint - Make resource commitments or scheduling decisions after handling the needs of the root constraint.To keep the bottleneck running at full capacity at all times, all other decisions must be subordinated. Running other machines with a higher production rate than the bottleneck is considered waste. Elevate the system’s constraint - This step addresses the improvement of the system by elevating the constraint or seeking to solve the constraint problem by eliminating the bottleneck effect. Elevate constraints to a new level of productivity: Concentrate all resources and efforts on the bottleneck to increase throughput rate or output. One way to do this is to run the bottleneck machine for extra hours every day, this increases the capacity of the machine . The difference between step 2 and 4 relates to the amount of investment required Start again on step on: With increased capacity of the machine, there might be a new bottleneck, which needs to be addressed. The process of improvement must be repeated. Here it is important to make sure inertia does not cause a system constraint Determine if a new constraint has been uncovered, then repeat the process.
  • 7. CRITICAL CHAIN PROJECT MANAGEMENT (CCPM) Theory of Constraints (TOC) – developed by Goldratt : for applications within production environment. 5 steps within TOC methodology that make up the CCPM : (a)Identify the system’s constraint - An intensive identification of small, minor problems or numerous secondary causes of constraints must be made to uncover the principle constraint - the root cause - which limits the output of any system. (b) Exploit the system’s constraint - Once the root constraint is identified, a strategy for focusing and viewing all activities in terms of the constraint is necessary.
  • 8. CRITICAL CHAIN PROJECT MANAGEMENT (CCPM) (c) Subject everything else to the system’s constraint - Make resource commitments or scheduling decisions after handling the needs of the root constraint. (d) Elevate the system’s constraint - This step addresses the improvement of the system by elevating the constraint or seeking to solve the constraint problem by eliminating the bottleneck effect. (e) Determine if a new constraint has been uncovered, then repeat the process.
  • 9. • Critical chain method is a modified form of the critical path method. Here, availability of resources is considered while creating the project schedule. • In critical chain project management, instead of float, buffers are used. These buffers are designed in such a way that they completely eliminate the concept of float or slack. • The main philosophy of tasks under the CCPM is to manage the implementation of individual project tasks and the critical chain of tasks scheduled around the effective use of resources. • CCPM focuses on the optimisation of the schedule by working with the safety margin that people build into their task estimations. The safety margin has to be removed and replaced by buffers at specific points in the project schedule. CRITICAL CHAIN PROJECT MANAGEMENT (CCPM)
  • 10. ANATOMY OF A TASK The main philosophy of tasks under the CCPM is to manage the implementation of individual project tasks and the critical chain of tasks scheduled around the effective use of resources . The anatomy of a task is defined as an internal structure of task within the CCPM. It consists of tasks that define the lowest possible lead time. The composition of tasks are made up of sequentially dependent tasks. There are two types of dependencies between tasks involved under CCPM. One is the ‘tail to head’ task dependency of which the output of one task is required as an input for another task. The other is resource dependency, also known as resource constrained critical path, which affects the completion time of the project. CCPM focuses on the optimisation of the schedule by working with the safety margin that people build into their task estimations. The safety margin has to be removed and replaced by buffers at specific points in the project schedule.
  • 11. There are four types of buffers that are commonly practised: (a) Project buffer - It is usually placed at the end of the project schedule and is flexible to accommodate for adjustments based on project experience; (b) Feeding buffer - This type of buffer is placed at points where inputs from non-critical tasks merge with critical chain tasks; (c) Resource buffer - This is the cut-off warning for having to complete the current task and the project team has to start preparing for a critical chain task as soon as the current work is done; and (d) Capacity buffer - This buffer is placed as an on call resource in the schedule when it is needed to prevent delays in the schedule. This type of buffer adds costs to the project. Usually it is practised in multiple project setting.
  • 12.
  • 13. • Project Buffer This buffer is placed between the last task and the project completion date as a non-activity buffer, and this buffer acts as a contingency for the critical chain activities. Any delay on the critical chain will eat this buffer, but the project completion date will remain unchanged. Also, if there is any gain from the early finish of any activity, this gain will be added to this buffer as well. Usually the duration of this buffer is 50% of the contingency that you have removed from each task estimate. • Feeding Buffers These buffers are added to the non-critical chain so that any delay on the non- critical chain does not affect the critical chain. They are inserted between the last task on a non- critical chain and the critical chain. • Feeding buffers are also calculated the same way as the project buffer. The duration of these buffers is based on some fraction of the safety removed from the tasks on non-critical chains. • Resource Buffers These buffers are kept alongside the critical chain to make sure that they are available when they are required. This buffer can be a human resource or any equipment. Critical chain considers the resource constraints as well, it may be longer than the critical path schedule. However, this might be compensated by removing the contingencies from the activities. Resources used in critical chain are known as critical resources.
  • 14. EXECUTION OF CRITICAL CHAIN PROJECT SOLUTION The word “buffer” or “safety” has been used to refer to the contingency reserve for individual activities that project managers would like to maintain. This reserve is reduced when we aggregate risks to ensure that all durations are realistic rather than adopting the duration estimates based on a 90 per cent likelihood of successful completion, hence, all activity duration estimates are at the 50 per cent level. The provision for contingency, in the form of project safety, is removed from the individual activities and applied at the project level. As a result, indirectly the project duration is reduced. The remaining questions that need to be answered are: How much of the project duration has already been reduced and how much of the aggregated buffer is sufficient?
  • 15. Realistically, the application of CCPM can be categorised into three phases: (a) Lay all the relevant project tasks in a simplified manner using illustrated diagrams; (b) Shrink all the duration estimates to the 50 per cent likelihood level. All individual tasks safety or buffer have been aggregated and is now presented as the project-level buffer; and (c) Using the rule of thumb of 50 per cent shrinkage, the project schedule is still significantly shorter than the original. Suppose that a project activity network diagram yielded the initial values as given in Table 9.1. Note that the modified network shortens the overall project duration by 22 days, from the original 40 to 18 days. This is because all the risks has been aggregated at the project level. There is a total of 22 days of potential slack in the schedule resulting from shrinking activity estimates at each project step. A CPPM modified project schedule would reapply 11 days of the acquired schedule shrinkage to serve as overall project buffer. Therefore, the new project schedule will anticipate a duration estimates that requires 29 days to complete the project.
  • 16.
  • 17. CCPM is not without weaknesses and critics. There are several arguments in the methodology of CCPM as mentioned in the following: (a) Lack of project milestones make coordinated scheduling highly problematic, particularly with external suppliers. Critics contend that the lack of inprocess project milestones adversely affects the means to coordinate schedule dates with suppliers who provide the external delivery of critical components; (b) CCPM is refuted as an ill-suited technique for many types of projects or viewed as a reconceptualisation of well-understood scheduling methodologies such as Project evaluation review technique (PERT); (c) Organisations have to be extremely careful when deciding to exclude conventional project management scheduling processes in order to solely adopt a CCPM approach as the method for planning and scheduling activities; and (d) CCPM is known to bring increased discipline to project scheduling but arguably seen as an inefficient method for managing the firm’s portfolio of projects.
  • 18. IMPLEMENTATION OF MULTI PROJECT CRITICAL PATH • Critical chain is not the same as the critical path within an activity network. Critical chain usually skips task dependency links because it requires all resource levelling to be done before the critical chain can be identified, not after as in the case of PERT and CPM (Critical path method) networks. • Critical path depends on task dependency, that is, the linkage of tasks with their predecessors. In this process, activity slack is discovered after the fact is known about the layout of the network and the identification of the critical path, all other paths and activities that may contain some level of slack. For example, a simplified PERT network that identifies three paths as shown in Figure 9.1.
  • 19.
  • 20. • Figure 9.1 shows the length of the critical path that represents a sequence of activities in the project network which only involves one staff. Scheduling projects with resource constraints might lead to resource conflicts as shown in the Figure 9.1. In order to solve this resource conflict, activities might need to be shifted further to time periods where resources are still available as illustrated in Figure 9.2, with added path to represent the solution. • Given the usual practice, the critical path should have only one critical path per project but if there is more than one path, one of the options for the project manager is to have an additional staff (such as assistant project manager) for each critical path added to the project. The change may be added as part of the contract documentation in the Planning Phase (procedures, work practices and policies) and how it will be managed in Execution Phase (meetings, inspections and status reports) in order to keep the project completion a reality. An additional risk analysis and priority matrix may need to be considered for each additional path. Figure 9.2 shows a suggested example of the additional path that might be taken to curb the resource conflict.
  • 21.