Unit 3 Complete Notes
Unit 3 Complete Notes
UNIT - 3
Dr S Jayanthi
Activity Planning and Risk Management
o Objectives of Activity planning
o Project schedules, Activities,
o Sequencing and scheduling
o Network Planning models
o Formulating Network Model
o Forward Pass and Backward Pass techniques
o Critical path (CRM) method
o Risk identification – Assessment
o Risk Planning
o Risk Management – PERT technique – Monte Carlo simulation
o Resource Allocation – Creation of critical paths – Cost schedules.
Activity Planning and Risk Management
Activities /
Tasks
A Work Breakdown Structure based on deliverables
The final outcome of the planning process
A project plan as a bar chart (schedule) that clearly indicates when each
of the project's activities is planned to occur and what resources it will
need.
o Task dependencies.
o Resource allocation (who
is doing what and when).
o The expected start and
end dates for each task.
o Parallel Task Execution
Network Planning Models
• These project scheduling techniques model the project's activities and
their relationships as a network. In the network, time flows from left to
right
• the two best known being CPM (Critical Path Method) and PERT
(Program Evaluation Review Technique).
Network Planning Models
Activity-On-Arrow [1/2]
• The figure implies that the project is complete once the software
has been installed and the user manual written
• We should redraw the network with a final completion activity
Lagged activities
• Where activities can occur in parallel with a time lag between them, we represent the lag
with a duration on the linking arrow as shown in Figure 6.13.
• This indicates that documenting amendments can start one day after the start of prototype
testing and will be completed two days after prototype testing is completed
Formulating A Network Model
Labelling Convention
A: Hardware selection
Duration
(weeks)
6
Precedents
)
X(9 , 8
MA
1 0)
X(7 ,
MA
The Forward Pass
The Calculation of Earliest Start Date [4/4]
o The project will be complete when both activities H and G have been completed
o The earliest project completion date will be the later of weeks 11 and 13 – that is, week 13
The Forward Pass
The Network After The Forward Pass
Backward Pass in Critical Path Method (CPM)
The backward pass is used to calculate the latest start (LS) and latest finish (LF)
times for each activity in a project. This helps determine how late an activity can start
or finish without delaying the overall project.
To identify the critical path, we need to calculate the activity float for each
activity.
If the float of an activity is zero, then the activity is critical and must be added to the
critical path of the project network.
In this example, activities F and G have zero float and hence, are critical activities.
• Activity’s float: the difference between an activity’s earliest start date and its latest
start date (or, equally, the difference between its earliest and latest finish dates)
• and it indicates how much the activity can be delayed without delaying the completion of the
entire project
• Activity span: the difference between the earliest start date and the latest finish
date
• Measure of maximum time allowable for the activity
Identifying The Critical Path
The Critical Path [3/3] Float = ES-LS
(or)
Float = EF-LF
6.12 Identifying The Critical Path
The Significance of The Critical Path
• In managing the project, we must pay particular attention to
monitoring activities on the critical path
• The effects on any delay or resources unavailability are detected and corrected
at the earliest opportunity
• In planning project, it is the critical path that we must shorten if we are
to reduce the overall duration of the project
6.13 Activity Float
Other Measures of Activity Float
• Free float: the time by which an activity may be delayed without
affecting subsequent activity
• The difference between the earliest completion for the activity and the earliest
date of the succeeding activity
• Interfering float: the difference between total float and free float
• Tells us how much the activity may be delayed without delaying project end
date
Shortening The Project Duration
Duration
Activity Precedents
(weeks)
A: Hardware selection 6 -
B: System configuration 4 -
C: Install hardware 3 A
D: Data migration 4 B
E: Draft office procedures 3 B
F: Recruit staff 10 -
G: User training 3 E, F
H: Install and test system 2 C, D
Activity-On-Arrow Networks
Activity Labelling
• Typically the diagram is used to record information about the events
rather than activities
• One of the more common is to divide the node circle in quadrants
Activity-On-Arrow Networks
Network Analysis
• Analysis proceeds in the same way as with activity-on-node networks
• The discussion places emphasis on the events rather than activity start and
completion time
• Stages
• The forward pass
• The backward pass
• Identifying the critical path
Activity-On-Arrow Networks
The Forward Pass [1/4]
• Activities A, B and F may start immediately
• The earliest date for event 1 is zero
• The earliest start date for these three activities is also zero
• Activity A will take 6 weeks
• The earliest it can finish is week 6 Activity
Duration
Precedents
• The earliest we can achieve event 2 is week 4 (weeks)
A: Hardware selection 6 -
B: System configuration 4 -
C: Install hardware 3 A
D: Data migration 4 B
E: Draft office procedures 3 B
F: Recruit staff 10 -
G: User training 3 E, F
H: Install and test system 2 C, D
Activity-On-Arrow Networks
The Forward Pass [2/4]
• Activity B will take 4 weeks
• The earliest it can finish and the earliest we can achieve event 3 is week 4
• Activity F will take 10 weeks
• The earliest it can finish is week 10
• We cannot tell whether or not this is also the earliest date that we can achieve event 5 since we have not,
as yet, calculated when activity E will finish
Activity-On-Arrow Networks
The Forward Pass [3/4]
• Activity E can start as early as week 4 (the earliest date for event 3)
• It is forecasted to take 3 weeks, it will be completed, at the earliest, at the end of week 7
• Event 5 may be achieved when both E and F have been completed, that is week 10 (the later of 7
and 10)
Activity-On-Arrow Networks
The Forward Pass [4/4]
• Similarly, we can reason that event 4 will have an earliest date of week 9
• The later of the earliest finish for activity D (week 8) and the earliest finish for activity C (week 9)
• The earliest date for the completion of the project, event 6, is therefore the end of week 13
• The later of 11 (the earliest finish for H) and 13 (the earliest finish for G)
Activity-On-Arrow Networks
The CPM Network After The Forward Pass
Activity-On-Arrow Networks
The Activity Table After The Forward Pass
Activity Duration Earliest start Latest start Earliest finish Latest finish Total float
(week) date date date date
A 6 0 6
B 4 0 4
C 3 6 9
D 4 4 8
E 3 4 7
F 10 0 10
G 3 10 13
H 2 9 11
Activity Duration Earliest start Latest start Earliest finish Latest finish Total float
(week) date date date date
A 6 0 6
B 4 0 4
C 3 6 9
D 4 4 8
E 3 4 7
F 10 0 10
G 3 10 13
H 2 9 11
Activity-On-Arrow Networks
The Backward Pass
• Calculate the latest date at which each event may be achieved, each
activity started and finished, without delaying the end of the project
• The latest date for an event is the latest date by which all immediately
following activities must be started for the project to be completed on
time
Activity-On-Arrow Networks
The CPM Network After the Backward Pass
Activity-On-Arrow Networks
The Activity Table After the Backward Pass
Activity Duration Earliest start Latest start Earliest finish Latest finish Total float
(week) date date date date
A 6 0 2 6 8
B 4 0 3 4 7
C 3 6 8 9 11
D 4 4 7 8 11
E 3 4 7 7 10
F 10 0 0 10 10
G 3 10 10 13 13
H 2 9 11 11 13
Activity-On-Arrow Networks
Identifying The Critical Path
• The critical path is identified in a way similar to that used in activity-
on-node networks
• A different concept is used: slack
• A slack is the difference between the earliest date and the latest date
for an event
• It is a measure of how late an event may be
Activity-On-Arrow Networks
The Critical Path
• The critical path is the path joining all nodes with a zero slack
• Activity plan tells us the order in which we should execute activities
and the earliest and latest we can start and finish them
• The critical path method and precedence networks can be used to
obtain an ideal activity plan
Conclusion
• The critical path method and precedence networks techniques helps us
to identify which activities are critical to meeting a target completion
date
• In order to manage the project we need to turn the activity plan into
schedule that will specify precisely when each activity is scheduled to
start and finish
Conclusion
• Before we can do scheduling, we must consider what resources will be
required and whether or not they will be available at appropriate times
• The allocation of resources to an activity may be affected by how we
view the importance of the task and the risks associated with it
PERT Technique
• Used to evaluate the effects of uncertainty
• CPM & PERT are similar
• CPM requires Single Estimate
• PERT requires Three Estimates
PERT Three Estimates
Most Likely Time
oThe time we would expect the task to take under normal
circumstances. “ m”
Optimistic Time
oShortest time in which we could expect to complete the activity,
barring the miracles. “a”
Pessimistic Time
oWorst Possible time. “b”
Target
Event No
Date
Expected Standard
Date Deviation
Expected Duration
Reference
Expected Duration te = = ( a+4m+b ) / 6
o The expected durations are used to carry out a forward pass through
a network, using the same method as the CPM technique.
o In this case, however, the calculated event dates are not the earliest
possible dates but the dates by which we expect to achieve those
events.
Duration
Activity Precedents
(weeks)
A: Hardware selection 6 -
B: System configuration 4 -
C: Install hardware 3 A
D: Data migration 4 B
E: Draft office procedures 3 B
F: Recruit staff 10 -
G: User training 3 E, F
H: Install and test system 2 C, D
Duration
Activity Precedents
(weeks)
A: Hardware selection 6 -
B: System configuration 4 -
C: Install hardware 3 A
D: Data migration 4 B
E: Draft office procedures 3 B
F: Recruit staff 10 -
C G: User training 3 E, F
H: Install and test system 2 C, D
A
B D H
F G Target
Event No
Date
Expected Standard
Date Deviation
Optimistic Most Pessimistic Expected
Activity
(a) Likely (m) (b) (te)
PERT Network after the Forward Pass A 5 6 8 6.17
o Unlike the CPM approach, the PERT method does not indicateBthe 3 4 5 4.00
C 2 3 3 2.83
earliest date by which we could complete the project but the
D 3.5 4 5 4.08
expected date.
E 1 3 4 2.83
o An advantage of this approach is that it places an emphasis on the
F 8 10 15 10.50
uncertainty of the real world
G 2 3 4 3.00
H 2 2 2.5 2.08
C
A 2 t=2.83
6. 17 6.17 Max(9, 8.08)
t=
B D H
1 t=4.00 3 t=4.08 4 t=2.08 6
0 4
E 9 13.5
t =2
.83 Max(13.50, 11. 08)
F G
t=10.50 5 t=3.00 Target
Event No
10.5 Date
Expected Standard
Max(6.83,
Date Deviation
10.50)
Activity standard deviations
Calculate The activity standard deviation for each activity in the table
The main advantage of the PERT technique is that it provides a method for
estimating the probability of meeting or missing target dates.
o Suppose that we must complete the project within 15 weeks at the outside.
o We expect it will take 13.5 weeks but it could take more or, perhaps, less.
o In addition, Suppose that activity C must be completed by week 10, as it is to be
carried out by a member of staff who is scheduled to be working on another project,
and that event 5 represents the delivery of intermediate products to the customer,
which must take place by week 10.
PERT technique - three-step method
The PERT technique uses the following three-step method for calculating the
probability of meeting or missing a target date:
o calculate the standard deviation of each project event;
o calculate the z value for each event that has a target date;
o convert z values to probabilities.
Standard
Optimistic Most Pessimis Expect
PERT Network with Standard Deviation Activity
(a) Likely (m) tic (b) ed (te)
Deviation
(s)
A 5 6 8 6.17 0.50
B 3 4 5 4.00 0.33
C 2 3 3 2.83 0.17
D 3.5 4 5 4.08 0.25
E 1 3 4 2.83 0.50
F 8 10 15 10.50 1.17
G 2 3 4 3.00 0.33
C H 2 2 2.5 2.08 0.08
A 2 t=2.83
If the project requires some safety buffer,
= 6.17 2
6.17 0.50 s=0.17
t 50 the deadline could be extended to 15.
s=0. B D H
1 t=4.00 3 t=4.08 4 10 t=2.08 6 15
0 0 s=0.33 4 0.33 s=0.25 9 0.53 s=0.08
E 13.5 1.22
t =2
s=0 .83
.
50 G
F
t=10.50 5 10 t=3.00 Target
Event No
s=1.17 10.5 1.17 Date
s=0.33
Expected Standard
Date Deviation
Calculating the z values
• The z value is calculated for each node that has a target date.
• It is equivalent to the number of standard deviations between the node's expected (Te)
and target dates (T).
• It is calculated using the formula:
93
Steps for Event 4
Z-Score Calculation:
Target date = 10 weeks
Expected time = 9 weeks
Standard deviation = 0.5
Z=(10−9)/0.5=1/0.5=2.0
Using the Z-Table:
There is about a 3% chance of not meeting the target for event 4.
There is a 97.72% chance of meeting the target for event 4
Steps for Event 5
Z-Score Calculation:
Target date = 10 weeks
Expected time = 10.5 weeks
Standard deviation = 1.17
Z=(10−10.5)/1.17=−0.5/1.17≈−0.43
Using the Z-Table:
This means there is a 66.64% chance of not meeting the target date for event 5.
There is a 67% chance of delay for event 5 by week 10.
There is a 33% chance of meeting the target for event 4
Risk management
96
Risk management
This lecture will touch upon:
• Definition of ‘risk’ and ‘risk management’
• Some ways of categorizing risk
• Risk management
• Risk identification – what are the risks to a project?
• Risk analysis – which ones are really serious?
• Risk planning – what shall we do?
• Risk monitoring – has the planning worked?
• We will also look at PERT risk and critical chains
97
Risk Categories
• Project Risks: are risks that could prevent the achievement of the
objectives given to the project manager and the project team.
• These objectives are formulated toward achieving project success.
99
Categories of risk
A different way to categorize risks:
• A sociotechnical model proposed by Kalle Lyytinen and his colleagues.
Interconnected Risks:
oThe sociotechnical model shows that risks are often interlinked.
oFor example, novel technologies may lead to delays if developers lack experience
in their use, reflecting an interaction between technology and people.
oOnce developers gain experience, the technology is no longer considered novel.
Risk Framework
A framework for dealing with risk
• When risks are identified, plans can be made to reduce or remove their
effects.
• The plans are reassessed to ensure:
– That the original risks are reduced sufficiently and
– No new risks are inadvertently introduced.
A framework for dealing with risk
107
Boehm’s top 10 development risks
Risk Risk reduction techniques
Personnel shortfalls Staffing with top talent; job matching; teambuilding; training
and career development; early scheduling of key personnel
Unrealistic time and cost Multiple estimation techniques; design to cost; incremental
estimates development; recording and analysis of past projects;
standardization of methods
Developing the wrong Improved software evaluation; formal specification methods;
software functions user surveys; prototyping; early user manuals
108
Boehm’s top ten risk - continued
109
Risk identification
Brainstorming (thinking ahead):
o Representatives of the main stakeholders of the project, are brought
together , in order to use their individual knowledge of different parts of
the project
to identify the problems that can occur (identify risks).
110
Causal mapping
Risk Assessment
Risk analysis and prioritization
o In order to prioritize the risks that were identified, we need a way to distinguish:
o The likely and damaging risks from those identified in the previous step “risk
identification”.
o One way of doing so is to calculate the risk exposure for each risk identified, using
the following formula:
o The risk exposure (RE) in this case would be: 500,000 *0.001=$500
o The higher the RE, the more attention or priority is given to the risk
Risk prioritization
Example (True or False):
A risk that has a potential damage of $40,000 and a probability of
occurrence of 12%will be given a higher priority than a risk having a
potential damage of $35,000 and a likelihood of 14%. False
Probability Chart
● The probability completion: shows the probability of completing the task in x days.
● The accumulated probability: shows the probability of completing the task on or
before the xth day.
Risk Assessment (cont’d)
Relative scales from 0 to 10.
• Both risk loss (impact) and the likelihood (probability of occurrence) will be assessed
using relative scales from 0 to 10.
• Then they will be multiplied together to get a notional risk exposure (RE).
Risk Assessment (cont’d)
Risk probability: qualitative descriptors
Qualitative descriptors:
Qualitative descriptors:
Qualitative descriptors of “impact on cost” and associated range values.
118
Risk Assessment (cont’d)
Consider R5, which refers to that coding the module would take longer than
planned. This risk has an impact on what?
– Time (the planned completion date) and cost.
• What could be a response to such risk?
Option: Add software developers and split the remaining work between them.
• This may increase the cost but will save the planned completion date.
The risk exposure cannot be calculated by multiplying the two factors when you
are using qualitative descriptors.
oThe risk exposure instead is indicated by the position of the risk in a matrix.
oThe matrices used are called probability impact grids or summary risk
profiles.
oPart of the matrix (some of the cells) is zoned off by a tolerance line.
oRisks appearing in that zone are given more attention than other risks (higher
degree of seriousness).
120
Risk Assessment (cont’d)
Probability impact matrix
Tolerance Line: Separates acceptable and unacceptable risks. Risks above the
line (e.g., R1 and R6) are considered unacceptable and require attention or
mitigation.
121
Risk Assessment (cont’d)
Example:
o Risk: the key users might not be available when needed to supply
details for their requirements.
o Once the requirement gathering is done.
o – The risk is no longer significant.
122
Risk planning
123
Risk Management
o Managing risks involves identifying potential risks, assessing their impact, and
determining how to mitigate them.
o Risks could include unexpected staff illness, project delays, or technical failures.
124
Risk reduction leverage
125
Risk Management
Contingency vs. Preventative Actions:
oPreventative actions (e.g., maintaining health programs, or backing up data) incur costs whether or not
the risk occurs. For instance, regular database backups are necessary to ensure data can be restored if
needed.
oContingency actions, on the other hand, only incur costs when the risk actually happens (e.g., hiring
temporary staff during an illness).
Risk Register:
oA risk register documents potential risks, their impacts, the likelihood of occurrence, and mitigation or
contingency plans.
oIt is a dynamic tool, regularly updated as new risks emerge or as existing risks are mitigated or
resolved.
Maintaining the Risk Register:
oThe risk register should be reviewed at regular intervals as part of project control processes.
oRisks that are no longer relevant can be closed, and new risks should be documented as they arise.
Using PERT to evaluate the effects of uncertainty
Three estimates are produced for each activity
Most likely time (m)
Optimistic time (a)
Pessimistic (b)
127
A chain of activities
Task a m b te s
A 10 12 16 ? ?
B 8 10 14 ? ?
C 20 24 38 ? ?
A chain of activities
129
Assessing the likelihood of meeting a target
130
Graph of z values
131
Monte Carlo Simulation
An alternative to PERT.
•A class of general analysis techniques:
•Valuable to solve any problem that is complex, nonlinear, or involves
more than just a couple of uncertain parameters.
•Monte Carlo simulations involve repeated random sampling to
compute the results.
•Gives more realistic results as compared to manual approaches.
Activity Start Date:
oThe white bars represent the distribution of possible start dates.
oFor example, most activities start between week 60 and week 65, with the highest
likelihood around week 62. This means that in most simulation scenarios, the activity
starts somewhere within this range.
Activity End Date:
oThe gray bars represent the distribution of possible end dates.
oMost activities end between week 66 and week 74, with the peak likelihood at
week 70.
Random Input Generation: For each simulation run, the Monte Carlo method randomly selects
values from the defined distributions for each parameter (e.g., task duration, costs, or risks).
These distributions could be normal, triangular, uniform, or any other distribution that best describes
the uncertainty of that variable.
Resource Allocation - Introduction
o CPM introduced activity network analysis to plan and schedule activities based
on the time span between the earliest start and latest finish dates.
o PERT technique was used to forecast a range of expected completion dates for
activities.
o Both CPM and PERT, however, do not account for resource availability when
planning.
o This chapter explores how to align the activity plan with available resources and
assess the impact of modifying the plan to fit resource constraints.
Resource Allocation
o Precedence graph
o Activity bar chart
o Resource histograms
SPM (5e) resource allocation© The McGraw-Hill Companies,
143
2011
Resource Requirement List
Stage Activity Resource Days Quantity Notes
ALL Project manager - 104 F/T -
1 All Workstation - 34 Check software availability
IoE/P/1 Senior analyst 34 F/T -
2 All Workstation - 3 One per person essential
IoE/P/2 Analyst/designer 20 F/T -
IoE/P/3 Analyst/designer 15 F/T -
IoE/P/4 Analyst/designer 25 F/T -
IoE/P/5 Analyst/designer 15 F/T - Could use analyst/programmer
3 All Workstation - 2
IoE/P/6 Senior analyst* 2 F/T -
4 All Workstation - 3 As stage 2
IoE/P/7 Analyst/designer 7 F/T -
IoE/P/8 Analyst/designer 6 F/T -
IoE/P/9 Analyst/designer 4 F/T -
IoE/P/10 Analyst/designer 4 F/T -
5 All Workstation - 4 One per programmer
All Office space - - If contract programmers used
IoE/P/11 Programmer 30 F/T -
IoE/P/12 Programmer 28 F/T -
IoE/P/13 Programmer 15 F/T -
IoE/P/14 Programmer 25 F/T -
6 All Full system access - - Approx. 16 hours for full system test
IoE/P/15 Analyst/designer 6 F/T -
Scheduling Resources
o After identifying resource requirement list, next is to map this list to
activity plan to assess the distribution of resources required over the
duration of the project.
o Can be done by representing the activity plan as a bar chart and
produce a histogram for each resource.
Resource histogram: systems analysts
5
STAFF REQD.
WEEK 1 2 3 4 5 6 7
147
Problem
o It causes
o Two analyst/designers to be idle for twelve days
o One for seven days
o One for two days between specification and design
o Another problem in uneven histogram is it is that more likely to call
for levels of resource beyond those available.
Resource smoothing
o It is usually difficult to get specialist staff who will work odd days to fill in
gaps – need for staff to learn about application etc
o Staff often have to be employed for a continuous block of time
o Therefore desirable to employ a constant number of staff on a project – who
as far as possible are fully employed
o Hence need for resource smoothing
149
Resource smoothing
o By adjusting the start date of some activities and splitting others, a resource
histogram can subject to constraints such as precedence requirement, be
smoothed to contain resource at available levels.
o By delaying the start of some activities, reduces the maximum level of
demand for the resource.
o Non-critical activities can be split, they can provide a useful way of filling.
150
The different letters represent staff working on a series of module testing tasks, that is, one person working
on task A, two on tasks B and C etc
A resource histogram showing demand for staff before and after smoothing
Resource smoothing
5
STAFF REQD.
WEEK 1 2 3 4 5 6 7 8
152
Prioritizing activities
Total float priority
o Activities are ordered according to the total float those with Smallest total float
has higher priority (Like Ranking)
Ordered list priority
o Activities that can be proceed at the same time are ordered according to a set of
simple criteria.
153
Resource usage
154
Critical path
o Scheduling resources can create new dependencies between activities –
recall critical chains
o It is best not to add dependencies to the activity network to reflect resource
constraints
o Makes network very messy
o A resource constraint may disappear during the project, but link remains on
network
o Amend dates on schedule to reflect resource constraints
155
Allocating individuals to activities
o Individual Allocation: Allocating specific individuals to activities early in software
projects can help refine estimates of task duration due to differences in skill and
experience.
o Factors in Individual Allocation:
o Availability: Check if individuals will be available when needed, while also
considering risks (e.g., project overruns affecting availability).
o Criticality: Assign more experienced staff to tasks on the critical path to potentially
shorten project duration and reduce overrun risks.
o Risk: Allocate experienced staff to high-risk activities to reduce project uncertainties,
though they may come at a higher cost.
o Training: Assign junior staff to non-critical tasks with sufficient slack to allow for
skill development and training, benefiting both the project and the organization.
o Team Building: Consider how individual choices will shape the team dynamics and
ensure team collaboration
156
Cost schedules
Cost Schedule:
•Weekly or monthly cost schedules provide accurate estimates for project costs and a plan
to monitor progress.
158
Accumulative costs
Balancing concerns