SlideShare une entreprise Scribd logo
1  sur  46
Télécharger pour lire hors ligne
MG6088 SOFTWARE PROJECT MANAGEMENT
UNIT – III
Dr.A.Kathirvel, Professor and Head, Dept of CSE
M.N.M Jain Engineering College, Chennai
UNIT I
ACTIVITY PLANNING AND RISK MANAGEMENT
Objectives of Activity planning – Project schedules –
Activities – Sequencing and scheduling – Network
Planning models – Forward Pass & Backward Pass
techniques – Critical path (CRM) method – Risk
identification – Assessment – Monitoring – PERT
technique – Monte Carlo simulation – Resource
Allocation – Creation of critical patterns – Cost
schedules.
TEXT BOOK
Bob Hughes, Mike Cotterell and Rajib Mall: Software Project
Management – Fifth Edition, Tata McGraw Hill, New Delhi, 2012.
Objectives of Activity planning
 Activity planning is also the project management plan preparation. It
is called Software Project Management Plan(SPMP).
 Objectives
 Feasibility assessment
 Resource allocation
 Motivation to team
 Effective utilization of human resources
 Effective time management
 Project costing
 Project tracking
 RMMM activities
3
Project schedules
‘Time is nature’s way of stopping everything
happening at once’
Having
 worked out a method of doing the project
 identified the tasks to be carried
 assessed the time needed to do each task
need to allocate dates/times for the start and end of
each activity
4
Activity networks
These help us to:
 Assess the feasibility of the planned project
completion date
 Identify when resources will need to be deployed
to activities
 Calculate when costs will be incurred
This helps the co-ordination and motivation of the
project team
5
Identifying activities
 Work-based: draw-up a Work Breakdown
Structure listing the work items needed
 Product-based approach
 list the deliverable and intermediate products of
project – product breakdown structure (PBS)
 Identify the order in which products have to be
created
 work out the activities needed to create the products
6
Hybrid approach
A Work Breakdown Structure based on deliverables
7
8
The final outcome of the planning process
A project plan as a bar chart
ACTIVITIES SEQUENCING AND SCHEDULING
Risk management
 Definition of ‘risk’ and ‘risk management’
 Some ways of categorizing risk
 Risk management
 Risk identification – what are the risks to a project?
 Risk analysis – which ones are really serious?
 Risk planning – what shall we do?
 Risk monitoring – has the planning worked?
 We will also look at PERT risk and critical chains
9
Some definitions of risk
‘the chance of exposure to the adverse consequences of
future events’ PRINCE2
 Project plans have to be based on assumptions
 Risk is the possibility that an assumption is wrong
 When the risk happens it becomes a problem or an issue
10
Categories of risk
11
A framework for dealing with risk
The planning for risk includes these steps:
 Risk identification – what risks might there be?
 Risk analysis and prioritization – which are the
most serious risks?
 Risk planning – what are we going to do about
them?
Risk monitoring – what is the current state of the
risk?
12
Risk identification
Approaches to identifying risks include:
 Use of checklists – usually based on the
experience of past projects
 Brainstorming – getting knowledgeable
stakeholders together to pool concerns
 Causal mapping – identifying possible chains
of cause and effect
13
14
Boehm’s top 10 development risks
Risk Risk reduction techniques
Personnel shortfalls Staffing with top talent; job matching; teambuilding;
training and career development; early scheduling
of key personnel
Unrealistic time and cost
estimates
Multiple estimation techniques; design to cost;
incremental development; recording and analysis
of past projects; standardization of methods
Developing the wrong
software functions
Improved software evaluation; formal specification
methods; user surveys; prototyping; early user
manuals
Developing the wrong
user interface
Prototyping; task analysis; user involvement
14
15
Boehm’s top ten risk - continued
Gold plating Requirements scrubbing, prototyping,
design to cost
Late changes to
requirements
Change control, incremental development
Shortfalls in externally
supplied components
Benchmarking, inspections, formal
specifications, contractual agreements, quality
controls
Shortfalls in externally
performed tasks
Quality assurance procedures, competitive
design etc
Real time performance
problems
Simulation, prototyping, tuning
Development
technically too difficult
Technical analysis, cost-benefit analysis,
prototyping , training
15
16
Causal mapping
16
Causal mapping - interventions
17
Risk prioritization
❑ Risk exposure (RE)
= (potential damage) x (probability of occurrence)
❑ Ideally
❑ Potential damage: a money value e.g. a flood would
cause £0.5 millions of damage
❑ Probability 0.00 (absolutely no chance) to 1.00
(absolutely certain) e.g. 0.01 (one in hundred chance)
❑ RE = £0.5m x 0.01 = £5,000
❑ Crudely analogous to the amount needed for an
insurance premium
18
Risk probability: qualitative descriptors
Probability
level
Range
High Greater than 50% chance of happening
Significant 30-50% chance of happening
Moderate 10-29% chance of happening
Low Less than 10% chance of happening
19
20
Qualitative descriptors of impact on cost and
associated range values
Impact level Range
High Greater than 30% above budgeted
expenditure
Significant 20 to 29% above budgeted
expenditure
Moderate 10 to 19% above budgeted
expenditure
Low Within 10% of budgeted
expenditure.
20
21
Probability impact matrix
21
Risk planning
Risks can be dealt with by:
 Risk acceptance
 Risk avoidance
 Risk reduction
 Risk transfer
 Risk mitigation/contingency measures
22
Risk reduction leverage
❑ Risk reduction leverage =
(REbefore- REafter)/ (cost of risk reduction)
❑ REbeforeis risk exposure before risk reduction e.g. 1%
chance of a fire causing £200k damage
❑ REafter is risk exposure after risk reduction e.g. fire
alarm costing £500 reduces probability of fire
damage to 0.5%
❑ RRL = (1% of £200k)-(0.5% of £200k)/£500 = 2
❑ RRL > 1.00 therefore worth doing
23
Probability chart
24
Using PERT to evaluate the effects of uncertainty
Three estimates are produced for each activity
 Most likely time (m)
 Optimistic time (a)
 Pessimistic (b)
 ‘expected time’ te = (a + 4m +b) / 6
 ‘activity standard deviation’ S = (b-a)/6
25
26
A chain of activities
Task A Task B Task C
Task a m b te s
A 10 12 16 ? ?
B 8 10 14 ? ?
C 20 24 38 ? ?
26
A chain of activities
 What would be the expected duration of the chain
A + B + C?
 Answer: 12.66 + 10.33 + 25.66 i.e. 48.65
 What would be the standard deviation for A + B+ C?
 Answer: square root of (12 + 12 + 32) i.e. 3.32
27
Assessing the likelihood of meeting a target
 Say the target for completing A+B+C was 52 days (T)
 Calculate the z value thus
z = (T – te)/s
 In this example
z = (52-48.33)/3.32 i.e. 1.01
 Look up in table of z values
– see next overhead
Graph of z values
28
What is Monte Carlo (MC) method ?
The Monte Carlo method is a numerical method
for statistical simulation which utilizes sequences
of random numbers to perform the simulation
29
What the meaning of MC simulation?
❑MC simulation is a versatile tool to analyze
and evaluate complex measurements
❑ Constructing a model of a system.
❑Experimenting with the model to
draw inferences of the system’s behavior
30
A simulation model
Decision and
uncontrollable
variables
Simulation
model
Measures of
performance or
behaviour of the
system
Inputs outputs
31
A simulation model cont..
 Model inputs capture the environment of the problem
 The simulation model
Conceptual model: set of assumptions that define
the system
Computer code: the implementation of the
conceptual model
 Outputs describe the aspects of system behaviour that we
are interested in
32
Random numbers
❑ Uniform Random numbers or pseudo-random numbers
(PRN) are essentially independent random variables
uniformly Distributed over the unit interval (0,1).
❑ The PRNs are good if they are uniformly distributed,
statistically independent and reproducible.
33
Linear congruential generator
 Generating a random sequence of numbers
{X1,X2,…….,Xk} of length M over the interval [0,M-1]
Xi=mod(AXi-1+C,M)
R=Xi/M
♠♠♠ mod(b,M)=b-int(b/M)*M
● Starting value X0 is called “seed”
●M,A and C are nonnegative integers known
Modulus, multiplier and increment, respectively
●M is must be prime number(2³¹-1,2 -1,…..)
34
Classic Example



44
2
2
==


r
r
circleofarea
squareofarea
Find the value of ?
Use the reject and accept method
Or hit and miss method
The area of square=(2r)²
The area of circle = r²
squareofarea
circleofarea


= *4
35
Cont…dotsofnumbertotal
circleinsidedotsof
squareofarea
circleofarea
...
...#.
..
..
=
Hit and miss algorithm
♣ Generate two sequences of N of PRN :: Ri,,Rj
♣ Xi=-1+2R i
♣ Yj=-1+2R j
♣ Start from s=zero
♣ If (X²+Y²<1) s=s+1
♣ # of dots inside circle=s
♣ total number of dots=N
NS /*4=
36
Monte Carlo Integration
♥ Hit and miss method
♥ Sample mean method
♥ importance sampled method
37
Critical chain approach
One problem with estimates of task duration:
 Estimators add a safety zone to estimate to
take account of possible difficulties
 Developers work to the estimate + safety zone,
so time is lost
 No advantage is taken of opportunities where
tasks can finish early – and provide a buffer
for later activities
38
Critical chain approach
One answer to this:
 Base targets on midpoints (i.e. te)
 Accumulate 50% of the safety zones
(between te and b) into a buffer at the end
of the project
 Work backwards and start all activities at
their latest start dates
 During project execution use relay race
model
39
Scheduling Resources and Costs
Resources and Priorities
 Project network times are not a schedule
until resources have been assigned.
◼The implicit assumption is that resources will be
available in the required amounts when needed.
◼Adding new projects requires making realistic
judgments of resource availability and project
durations.
40
Resource-Constrained Scheduling
 Resource leveling (or smoothing) involves
attempting to even out demands on resources by
using slack (delaying noncritical activities) to
manage resource utilization.
41
Types of Project Constraints
 Technical or Logic Constraints
 Constraints related to the networked sequence in which
project activities must occur.
 Physical Constraints
 Activities that cannot occur in parallel or are affected by
contractual or environmental conditions.
 Resource Constraints
 The absence, shortage, or unique interrelationship and
interaction characteristics of resources that require a
particular sequencing of project activities.
42
Classifications
 Time Constrained Project
 A project that must be completed by an imposed date.
◼ Time is fixed, resources are flexible: additional resources are
required to ensure project meets schedule.
 Resource Constrained Project
 A project in which the level of resources available
cannot be exceeded.
◼ Resources are fixed, time is flexible: inadequate resources
will delay the project.
43
Impact of Resource Constraint Scheduling
 Reduces delay but reduces flexibility.
 Increases criticality of events.
 Increases scheduling complexity.
 May make traditional critical path no longer meaningful.
 Can break sequence of events.
 May cause parallel activities to become sequential and
critical activities with slack to become noncritical.
44
Assigning Resources to tasks
 Factors to Consider in Assigning Work:
 Don’t always pick the same people for the toughest
assignments.
 Choose people with an eye to fostering their
development through participation on the project.
 Pick people with compatible work habits and
personalities but who complement each other.
 Team-up veterans with new hires to share experience
and socialize newcomers into the organization.
 Select people who may need to learn work together on
later stages of the project or other projects.
45
MG6088 SOFTWARE PROJECT MANAGEMENT

Contenu connexe

Tendances

Selection of an appropriate project approach
Selection of an appropriate project approachSelection of an appropriate project approach
Selection of an appropriate project approachtumetr1
 
Managing people and organizing teams
Managing people and organizing teamsManaging people and organizing teams
Managing people and organizing teamstumetr1
 
Resource Allocation In Software Project Management
Resource Allocation In Software Project ManagementResource Allocation In Software Project Management
Resource Allocation In Software Project ManagementSyed Hassan Ali
 
Introduction to Software Project Management
Introduction to Software Project ManagementIntroduction to Software Project Management
Introduction to Software Project ManagementReetesh Gupta
 
Improving of software processes
Improving of software processesImproving of software processes
Improving of software processesREHMAT ULLAH
 
Spm project planning
Spm project planning Spm project planning
Spm project planning Kanchana Devi
 
Software Project Management( lecture 1)
Software Project Management( lecture 1)Software Project Management( lecture 1)
Software Project Management( lecture 1)Syed Muhammad Hammad
 
SPM Activity Planning Introduction
SPM Activity Planning IntroductionSPM Activity Planning Introduction
SPM Activity Planning IntroductionKanchana Devi
 
Software Project Management chapter-1
Software Project Management chapter-1Software Project Management chapter-1
Software Project Management chapter-1Computing Cage
 
Spm ap-network model-
Spm ap-network model-Spm ap-network model-
Spm ap-network model-Kanchana Devi
 
Software Project Management (monitoring and control)
Software Project Management (monitoring and control)Software Project Management (monitoring and control)
Software Project Management (monitoring and control)IsrarDewan
 
Software effort estimation
Software effort estimationSoftware effort estimation
Software effort estimationtumetr1
 
Software project management
Software project managementSoftware project management
Software project managementR A Akerkar
 
Software Estimation Techniques
Software Estimation TechniquesSoftware Estimation Techniques
Software Estimation Techniqueskamal
 
Decomposition technique In Software Engineering
Decomposition technique In Software Engineering Decomposition technique In Software Engineering
Decomposition technique In Software Engineering Bilal Hassan
 

Tendances (20)

Selection of an appropriate project approach
Selection of an appropriate project approachSelection of an appropriate project approach
Selection of an appropriate project approach
 
Managing people and organizing teams
Managing people and organizing teamsManaging people and organizing teams
Managing people and organizing teams
 
Resource Allocation In Software Project Management
Resource Allocation In Software Project ManagementResource Allocation In Software Project Management
Resource Allocation In Software Project Management
 
Spm unit2
Spm unit2Spm unit2
Spm unit2
 
SPM Evaluation
SPM EvaluationSPM Evaluation
SPM Evaluation
 
Spm unit 1
Spm unit 1Spm unit 1
Spm unit 1
 
Introduction to Software Project Management
Introduction to Software Project ManagementIntroduction to Software Project Management
Introduction to Software Project Management
 
Improving of software processes
Improving of software processesImproving of software processes
Improving of software processes
 
Spm project planning
Spm project planning Spm project planning
Spm project planning
 
Software Project Management( lecture 1)
Software Project Management( lecture 1)Software Project Management( lecture 1)
Software Project Management( lecture 1)
 
SPM Activity Planning Introduction
SPM Activity Planning IntroductionSPM Activity Planning Introduction
SPM Activity Planning Introduction
 
Stepwise planning
Stepwise planningStepwise planning
Stepwise planning
 
Software Project Management chapter-1
Software Project Management chapter-1Software Project Management chapter-1
Software Project Management chapter-1
 
Spm ap-network model-
Spm ap-network model-Spm ap-network model-
Spm ap-network model-
 
Software Project Management (monitoring and control)
Software Project Management (monitoring and control)Software Project Management (monitoring and control)
Software Project Management (monitoring and control)
 
Software effort estimation
Software effort estimationSoftware effort estimation
Software effort estimation
 
Software project management
Software project managementSoftware project management
Software project management
 
Unit 2 spm
Unit 2 spmUnit 2 spm
Unit 2 spm
 
Software Estimation Techniques
Software Estimation TechniquesSoftware Estimation Techniques
Software Estimation Techniques
 
Decomposition technique In Software Engineering
Decomposition technique In Software Engineering Decomposition technique In Software Engineering
Decomposition technique In Software Engineering
 

Similaire à MG6088 SOFTWARE PROJECT MANAGEMENT

05-risk_assesment.ppt
05-risk_assesment.ppt05-risk_assesment.ppt
05-risk_assesment.pptKareemRasmy1
 
Using Risk Analysis and Simulation in Project Management
Using Risk Analysis and Simulation in Project ManagementUsing Risk Analysis and Simulation in Project Management
Using Risk Analysis and Simulation in Project ManagementMike Tulkoff
 
Decision and risk analysis
Decision and risk analysisDecision and risk analysis
Decision and risk analysisIndra Biswakarma
 
A data science observatory based on RAMP - rapid analytics and model prototyping
A data science observatory based on RAMP - rapid analytics and model prototypingA data science observatory based on RAMP - rapid analytics and model prototyping
A data science observatory based on RAMP - rapid analytics and model prototypingAkin Osman Kazakci
 
Risk management
Risk managementRisk management
Risk managementtumetr1
 
The use of Monte Carlo simulation in quantitative risk assessment of IT projects
The use of Monte Carlo simulation in quantitative risk assessment of IT projectsThe use of Monte Carlo simulation in quantitative risk assessment of IT projects
The use of Monte Carlo simulation in quantitative risk assessment of IT projectsEswar Publications
 
Ranga's 51 hot topics to remember for Risk Management Professional (RMP) exam
Ranga's 51 hot topics to remember for Risk Management Professional (RMP) examRanga's 51 hot topics to remember for Risk Management Professional (RMP) exam
Ranga's 51 hot topics to remember for Risk Management Professional (RMP) examrrangraj
 
DOE in Pharmaceutical and Analytical QbD.
DOE in  Pharmaceutical and Analytical QbD.DOE in  Pharmaceutical and Analytical QbD.
DOE in Pharmaceutical and Analytical QbD.SALMA RASHID SHAIKH
 
Project Controls Expo, 18th Nov 2014 - "Schedule Risk Analysis for Complex Pr...
Project Controls Expo, 18th Nov 2014 - "Schedule Risk Analysis for Complex Pr...Project Controls Expo, 18th Nov 2014 - "Schedule Risk Analysis for Complex Pr...
Project Controls Expo, 18th Nov 2014 - "Schedule Risk Analysis for Complex Pr...Project Controls Expo
 
Risk project management - Notes for the CAMP exam
Risk project management - Notes for the CAMP examRisk project management - Notes for the CAMP exam
Risk project management - Notes for the CAMP examMaria Kirk
 
Project Risk Management (10)
 Project Risk Management (10) Project Risk Management (10)
Project Risk Management (10)Serdar Temiz
 
PRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfPRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfmohamed Ismail
 
PetroSync - Project Risk Assessment & Management
PetroSync - Project Risk Assessment & ManagementPetroSync - Project Risk Assessment & Management
PetroSync - Project Risk Assessment & ManagementPetroSync
 

Similaire à MG6088 SOFTWARE PROJECT MANAGEMENT (20)

Mg6088 spm unit-3
Mg6088 spm unit-3Mg6088 spm unit-3
Mg6088 spm unit-3
 
05-risk_assesment.ppt
05-risk_assesment.ppt05-risk_assesment.ppt
05-risk_assesment.ppt
 
Using Risk Analysis and Simulation in Project Management
Using Risk Analysis and Simulation in Project ManagementUsing Risk Analysis and Simulation in Project Management
Using Risk Analysis and Simulation in Project Management
 
Decision and risk analysis
Decision and risk analysisDecision and risk analysis
Decision and risk analysis
 
A data science observatory based on RAMP - rapid analytics and model prototyping
A data science observatory based on RAMP - rapid analytics and model prototypingA data science observatory based on RAMP - rapid analytics and model prototyping
A data science observatory based on RAMP - rapid analytics and model prototyping
 
Session 18 -2 PMP 4th edition
Session 18 -2  PMP 4th editionSession 18 -2  PMP 4th edition
Session 18 -2 PMP 4th edition
 
Risk mgt 07.pptx
Risk mgt 07.pptxRisk mgt 07.pptx
Risk mgt 07.pptx
 
Risk management
Risk managementRisk management
Risk management
 
APM Edinburgh risk management january 2017 final
APM Edinburgh risk management january 2017 finalAPM Edinburgh risk management january 2017 final
APM Edinburgh risk management january 2017 final
 
The use of Monte Carlo simulation in quantitative risk assessment of IT projects
The use of Monte Carlo simulation in quantitative risk assessment of IT projectsThe use of Monte Carlo simulation in quantitative risk assessment of IT projects
The use of Monte Carlo simulation in quantitative risk assessment of IT projects
 
Ranga's 51 hot topics to remember for Risk Management Professional (RMP) exam
Ranga's 51 hot topics to remember for Risk Management Professional (RMP) examRanga's 51 hot topics to remember for Risk Management Professional (RMP) exam
Ranga's 51 hot topics to remember for Risk Management Professional (RMP) exam
 
DOE in Pharmaceutical and Analytical QbD.
DOE in  Pharmaceutical and Analytical QbD.DOE in  Pharmaceutical and Analytical QbD.
DOE in Pharmaceutical and Analytical QbD.
 
Project Controls Expo, 18th Nov 2014 - "Schedule Risk Analysis for Complex Pr...
Project Controls Expo, 18th Nov 2014 - "Schedule Risk Analysis for Complex Pr...Project Controls Expo, 18th Nov 2014 - "Schedule Risk Analysis for Complex Pr...
Project Controls Expo, 18th Nov 2014 - "Schedule Risk Analysis for Complex Pr...
 
Risk project management - Notes for the CAMP exam
Risk project management - Notes for the CAMP examRisk project management - Notes for the CAMP exam
Risk project management - Notes for the CAMP exam
 
Ds for finance day 3
Ds for finance day 3Ds for finance day 3
Ds for finance day 3
 
Project Risk Management (10)
 Project Risk Management (10) Project Risk Management (10)
Project Risk Management (10)
 
Costing
CostingCosting
Costing
 
PRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfPRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdf
 
PetroSync - Project Risk Assessment & Management
PetroSync - Project Risk Assessment & ManagementPetroSync - Project Risk Assessment & Management
PetroSync - Project Risk Assessment & Management
 
Spm
Spm Spm
Spm
 

Plus de Kathirvel Ayyaswamy

22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTUREKathirvel Ayyaswamy
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2Kathirvel Ayyaswamy
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information TechnologyKathirvel Ayyaswamy
 

Plus de Kathirvel Ayyaswamy (20)

22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
 
22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
18CS3040_Distributed Systems
18CS3040_Distributed Systems18CS3040_Distributed Systems
18CS3040_Distributed Systems
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2
 
18CS3040 Distributed System
18CS3040 Distributed System	18CS3040 Distributed System
18CS3040 Distributed System
 
20CS2021 Distributed Computing
20CS2021 Distributed Computing 20CS2021 Distributed Computing
20CS2021 Distributed Computing
 
20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING
 
18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and Sustainability
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 

Dernier

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 

Dernier (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 

MG6088 SOFTWARE PROJECT MANAGEMENT

  • 1. MG6088 SOFTWARE PROJECT MANAGEMENT UNIT – III Dr.A.Kathirvel, Professor and Head, Dept of CSE M.N.M Jain Engineering College, Chennai
  • 2. UNIT I ACTIVITY PLANNING AND RISK MANAGEMENT Objectives of Activity planning – Project schedules – Activities – Sequencing and scheduling – Network Planning models – Forward Pass & Backward Pass techniques – Critical path (CRM) method – Risk identification – Assessment – Monitoring – PERT technique – Monte Carlo simulation – Resource Allocation – Creation of critical patterns – Cost schedules. TEXT BOOK Bob Hughes, Mike Cotterell and Rajib Mall: Software Project Management – Fifth Edition, Tata McGraw Hill, New Delhi, 2012.
  • 3. Objectives of Activity planning  Activity planning is also the project management plan preparation. It is called Software Project Management Plan(SPMP).  Objectives  Feasibility assessment  Resource allocation  Motivation to team  Effective utilization of human resources  Effective time management  Project costing  Project tracking  RMMM activities 3
  • 4. Project schedules ‘Time is nature’s way of stopping everything happening at once’ Having  worked out a method of doing the project  identified the tasks to be carried  assessed the time needed to do each task need to allocate dates/times for the start and end of each activity 4
  • 5. Activity networks These help us to:  Assess the feasibility of the planned project completion date  Identify when resources will need to be deployed to activities  Calculate when costs will be incurred This helps the co-ordination and motivation of the project team 5
  • 6. Identifying activities  Work-based: draw-up a Work Breakdown Structure listing the work items needed  Product-based approach  list the deliverable and intermediate products of project – product breakdown structure (PBS)  Identify the order in which products have to be created  work out the activities needed to create the products 6
  • 7. Hybrid approach A Work Breakdown Structure based on deliverables 7
  • 8. 8 The final outcome of the planning process A project plan as a bar chart ACTIVITIES SEQUENCING AND SCHEDULING
  • 9. Risk management  Definition of ‘risk’ and ‘risk management’  Some ways of categorizing risk  Risk management  Risk identification – what are the risks to a project?  Risk analysis – which ones are really serious?  Risk planning – what shall we do?  Risk monitoring – has the planning worked?  We will also look at PERT risk and critical chains 9
  • 10. Some definitions of risk ‘the chance of exposure to the adverse consequences of future events’ PRINCE2  Project plans have to be based on assumptions  Risk is the possibility that an assumption is wrong  When the risk happens it becomes a problem or an issue 10
  • 12. A framework for dealing with risk The planning for risk includes these steps:  Risk identification – what risks might there be?  Risk analysis and prioritization – which are the most serious risks?  Risk planning – what are we going to do about them? Risk monitoring – what is the current state of the risk? 12
  • 13. Risk identification Approaches to identifying risks include:  Use of checklists – usually based on the experience of past projects  Brainstorming – getting knowledgeable stakeholders together to pool concerns  Causal mapping – identifying possible chains of cause and effect 13
  • 14. 14 Boehm’s top 10 development risks Risk Risk reduction techniques Personnel shortfalls Staffing with top talent; job matching; teambuilding; training and career development; early scheduling of key personnel Unrealistic time and cost estimates Multiple estimation techniques; design to cost; incremental development; recording and analysis of past projects; standardization of methods Developing the wrong software functions Improved software evaluation; formal specification methods; user surveys; prototyping; early user manuals Developing the wrong user interface Prototyping; task analysis; user involvement 14
  • 15. 15 Boehm’s top ten risk - continued Gold plating Requirements scrubbing, prototyping, design to cost Late changes to requirements Change control, incremental development Shortfalls in externally supplied components Benchmarking, inspections, formal specifications, contractual agreements, quality controls Shortfalls in externally performed tasks Quality assurance procedures, competitive design etc Real time performance problems Simulation, prototyping, tuning Development technically too difficult Technical analysis, cost-benefit analysis, prototyping , training 15
  • 17. Causal mapping - interventions 17
  • 18. Risk prioritization ❑ Risk exposure (RE) = (potential damage) x (probability of occurrence) ❑ Ideally ❑ Potential damage: a money value e.g. a flood would cause £0.5 millions of damage ❑ Probability 0.00 (absolutely no chance) to 1.00 (absolutely certain) e.g. 0.01 (one in hundred chance) ❑ RE = £0.5m x 0.01 = £5,000 ❑ Crudely analogous to the amount needed for an insurance premium 18
  • 19. Risk probability: qualitative descriptors Probability level Range High Greater than 50% chance of happening Significant 30-50% chance of happening Moderate 10-29% chance of happening Low Less than 10% chance of happening 19
  • 20. 20 Qualitative descriptors of impact on cost and associated range values Impact level Range High Greater than 30% above budgeted expenditure Significant 20 to 29% above budgeted expenditure Moderate 10 to 19% above budgeted expenditure Low Within 10% of budgeted expenditure. 20
  • 22. Risk planning Risks can be dealt with by:  Risk acceptance  Risk avoidance  Risk reduction  Risk transfer  Risk mitigation/contingency measures 22
  • 23. Risk reduction leverage ❑ Risk reduction leverage = (REbefore- REafter)/ (cost of risk reduction) ❑ REbeforeis risk exposure before risk reduction e.g. 1% chance of a fire causing £200k damage ❑ REafter is risk exposure after risk reduction e.g. fire alarm costing £500 reduces probability of fire damage to 0.5% ❑ RRL = (1% of £200k)-(0.5% of £200k)/£500 = 2 ❑ RRL > 1.00 therefore worth doing 23
  • 25. Using PERT to evaluate the effects of uncertainty Three estimates are produced for each activity  Most likely time (m)  Optimistic time (a)  Pessimistic (b)  ‘expected time’ te = (a + 4m +b) / 6  ‘activity standard deviation’ S = (b-a)/6 25
  • 26. 26 A chain of activities Task A Task B Task C Task a m b te s A 10 12 16 ? ? B 8 10 14 ? ? C 20 24 38 ? ? 26
  • 27. A chain of activities  What would be the expected duration of the chain A + B + C?  Answer: 12.66 + 10.33 + 25.66 i.e. 48.65  What would be the standard deviation for A + B+ C?  Answer: square root of (12 + 12 + 32) i.e. 3.32 27
  • 28. Assessing the likelihood of meeting a target  Say the target for completing A+B+C was 52 days (T)  Calculate the z value thus z = (T – te)/s  In this example z = (52-48.33)/3.32 i.e. 1.01  Look up in table of z values – see next overhead Graph of z values 28
  • 29. What is Monte Carlo (MC) method ? The Monte Carlo method is a numerical method for statistical simulation which utilizes sequences of random numbers to perform the simulation 29
  • 30. What the meaning of MC simulation? ❑MC simulation is a versatile tool to analyze and evaluate complex measurements ❑ Constructing a model of a system. ❑Experimenting with the model to draw inferences of the system’s behavior 30
  • 31. A simulation model Decision and uncontrollable variables Simulation model Measures of performance or behaviour of the system Inputs outputs 31
  • 32. A simulation model cont..  Model inputs capture the environment of the problem  The simulation model Conceptual model: set of assumptions that define the system Computer code: the implementation of the conceptual model  Outputs describe the aspects of system behaviour that we are interested in 32
  • 33. Random numbers ❑ Uniform Random numbers or pseudo-random numbers (PRN) are essentially independent random variables uniformly Distributed over the unit interval (0,1). ❑ The PRNs are good if they are uniformly distributed, statistically independent and reproducible. 33
  • 34. Linear congruential generator  Generating a random sequence of numbers {X1,X2,…….,Xk} of length M over the interval [0,M-1] Xi=mod(AXi-1+C,M) R=Xi/M ♠♠♠ mod(b,M)=b-int(b/M)*M ● Starting value X0 is called “seed” ●M,A and C are nonnegative integers known Modulus, multiplier and increment, respectively ●M is must be prime number(2³¹-1,2 -1,…..) 34
  • 35. Classic Example    44 2 2 ==   r r circleofarea squareofarea Find the value of ? Use the reject and accept method Or hit and miss method The area of square=(2r)² The area of circle = r² squareofarea circleofarea   = *4 35
  • 36. Cont…dotsofnumbertotal circleinsidedotsof squareofarea circleofarea ... ...#. .. .. = Hit and miss algorithm ♣ Generate two sequences of N of PRN :: Ri,,Rj ♣ Xi=-1+2R i ♣ Yj=-1+2R j ♣ Start from s=zero ♣ If (X²+Y²<1) s=s+1 ♣ # of dots inside circle=s ♣ total number of dots=N NS /*4= 36
  • 37. Monte Carlo Integration ♥ Hit and miss method ♥ Sample mean method ♥ importance sampled method 37
  • 38. Critical chain approach One problem with estimates of task duration:  Estimators add a safety zone to estimate to take account of possible difficulties  Developers work to the estimate + safety zone, so time is lost  No advantage is taken of opportunities where tasks can finish early – and provide a buffer for later activities 38
  • 39. Critical chain approach One answer to this:  Base targets on midpoints (i.e. te)  Accumulate 50% of the safety zones (between te and b) into a buffer at the end of the project  Work backwards and start all activities at their latest start dates  During project execution use relay race model 39
  • 40. Scheduling Resources and Costs Resources and Priorities  Project network times are not a schedule until resources have been assigned. ◼The implicit assumption is that resources will be available in the required amounts when needed. ◼Adding new projects requires making realistic judgments of resource availability and project durations. 40
  • 41. Resource-Constrained Scheduling  Resource leveling (or smoothing) involves attempting to even out demands on resources by using slack (delaying noncritical activities) to manage resource utilization. 41
  • 42. Types of Project Constraints  Technical or Logic Constraints  Constraints related to the networked sequence in which project activities must occur.  Physical Constraints  Activities that cannot occur in parallel or are affected by contractual or environmental conditions.  Resource Constraints  The absence, shortage, or unique interrelationship and interaction characteristics of resources that require a particular sequencing of project activities. 42
  • 43. Classifications  Time Constrained Project  A project that must be completed by an imposed date. ◼ Time is fixed, resources are flexible: additional resources are required to ensure project meets schedule.  Resource Constrained Project  A project in which the level of resources available cannot be exceeded. ◼ Resources are fixed, time is flexible: inadequate resources will delay the project. 43
  • 44. Impact of Resource Constraint Scheduling  Reduces delay but reduces flexibility.  Increases criticality of events.  Increases scheduling complexity.  May make traditional critical path no longer meaningful.  Can break sequence of events.  May cause parallel activities to become sequential and critical activities with slack to become noncritical. 44
  • 45. Assigning Resources to tasks  Factors to Consider in Assigning Work:  Don’t always pick the same people for the toughest assignments.  Choose people with an eye to fostering their development through participation on the project.  Pick people with compatible work habits and personalities but who complement each other.  Team-up veterans with new hires to share experience and socialize newcomers into the organization.  Select people who may need to learn work together on later stages of the project or other projects. 45