Академический Документы
Профессиональный Документы
Культура Документы
ACTIVITY PLANNING
It checks whether the project is possible with in the required timescales & resource constraints. RESOURCE ALLOCATION:What are the effective ways of allocating the resource to the project. when should the resource be available? --Investigate the relationship between timescales & resource availability.
cost & other expenditures --After producing Activity plan we can obtain more detailed estimates of cost & their timings. Motivations:-provide targets monitor achievements against targets
different departments need to be available to work on a particular project? --When do the staff need to be transferred between projects.
a minimum time at an acceptable cost One effective way of shortening project duration is to carry out activities in parallel.
Project schedule
Before work commences on a project
,plan must be developed to show dates when each activity should start & finish. Once plan has been refined to this level of detail we call it a project schedule. Creating a project schedule consist of four stages.
Stages
1)Decide what activities need to be
carried out & in what order they are to be done. 2)Create a Ideal activity plan where each activity taken without resource constraint. ideal activity plan is subject to risk analysis
resources might place constraint on when certain activity is carried out. 4)schedule production:-once resources has been allocated to each activity --the schedule is drawn up & publish which indicate plan starting & completing dates
Defining activities
Project is composed of interrelated activities Project may start when at least one of its
activities is ready to start Project will be completed when all of activities have been completed If an activity have a clearly defined start & end point then marked by the production of a tangible deliverables.
forecastable assuming normal circumstances & reasonable availability of resource Some activities require that others are completed before they can begin called precedence requirements.
IDENTIFYING ACTIVITIES
THE ACTIVITY BASED APPROACH
--consist of creating a list of all activities that project is thought to involve --WBS (Work break down structure)involve identifying the main tasks has been required to complete a project & then breaking down into lower level tasks
I V P
I T R
Y O EI S S
B J I G
A E BN NSH
S C U SY
E T
A D A
N T
A A
Y DS
I L
P D R E O S C I G EP
S D I EC
HYBRID APPROACH
Structures activities
& products
breakdown structure & product flow diagram. PFD indicates for each product which other product are required as input.
O R
D E
U Q
C U
T I R
B E
R M
E CU
R C E A Q T U A I P LR
RO E
OG M
the dependencies among activities and schedule them Scheduling and sequencing is based on the availability of the staff and the resources. A bar chart may be used for representing scheduling and sequencing.
activities and their relationships as a network. For example:- CPM (critical path method), PERT (program evaluation review techniques). Both of these techniques used an activity-on-arrow approach.
where activities are drawn as arrows joining circles or nodes which represent start & end of an activity. ACTIVITY ON NODE APPROACH Activities represented as nodes, links represented as precedence network (sequencing)
represent the activities and their interrelationships as a graph. In activity-on-node we do this by representing activities as nodes (arrowed lines) in the graph- the nodes (circles) representing the events of activities starting and finishing. The steps in formulating network model are: Constructing precedence networks Representing lagged activities Labeling conventions
A dangle
Design Program Install Program
Code Program
Test Program
Design Program
Code Program
Test Program
Install Program
Sign-off
1 Document amendments
Hammock activities
They are activities which in themselves,
have zero duration but are assumed to start at the same time as the first ham mocked activity and end at the same time
Labelling conventions
One of more common conventions for
labeling nodes Divide the node circle into quadrants use those quadrants to show earliest date, latest date, Event slack (difference between earliest & latest finish date)
with two primary objectives: Planning the project in such a way that it is completed as quickly as possible & Identifying activities where delay in their execution will affect overall end date of project.
The method requires that for each activity we have an estimate of its duration. The network is then analysed by carrying out a forward passto calculate the earliest dates at which activities may be started & completed. Backward pass:-to calculate latest date at which activity may be started & finished without delaying the end date.
Assignment 2
Explain with example forward pass &
backward pass.
path through the network that defines the duration of the project .This is known as critical path Any delay to any activity on this critical path will delay the completion of whole project
attention to monitoring activities on the critical path so that effects of any delay can be corrected at the earliest.
Activity float
Its a measure of how much the start &
completion of an activity can be delayed without affecting the end date of the project. Free float:-time by which activity can be delayed without affecting subsequent activities
project. We will apply more resources to task, working overtime ,procuring additional staff.
Part-2
RISK MANAGEMENT
What is Risk
Uncertain event or condition that if it
occurs has positive or negative condition on project objectives. Key elements of Risk follows:It relates to the future-risk involves speculating about future events. Involves cause & effects
Categories of Risk
Project Risk:-are those could prevent
achievement of objectives given to the project manager & project team. Business Risk:-Economic downturn or import of cheaper alternative products
STRUCTURE
TECHNOLOGY
TASKS
the development of application. Includes various department specialists, user groups, managers with different responsibilities. Example:-if developer builds software components & leave before testing, team member taking over that component find lack of familiarity with software make correction of faults difficult
TECHNOLOGY:-consist of both
technology used to implement application & embedded in the delivered products. STRUCTURE:-describe management structure & system structure. TASKS:-work to be carried out is called tasks
RISK IDENTIFICATION
Main approaches for Risk Identification Use of check lists Brainstorming
CHECKLISTS
They are simply lists of the risks have
been found to occur regularly in software development projects Creators of checklists also suggest potential counter measures for each risk. If manager identifies risk ,he can use counter measures to cope with them.
BRAIN STORMING
Representative of main stakeholders
can be brought together ,and a plan is drafted. It is used to identify the possible solutions to the problem. All stakeholders have a meeting and risk in the projects are discussed.
CASUAL MAPPING
One way of identifying possible threats
to the success of a project & measures that might eliminate & reduce them is the use of casual mapping. Casual maps & diagrams represent chains of causes & effects that will influence outcomes in particular area ifactivity
Stableunstable environment
Risk Assessment
Problem with risk identification is lists of
risk is endless. Risk assessment is distinguishing more damaging & likely risks. This can be done by risk exposure for each risk using formula risk exposure=(potential damage X(probability of occurrence)
Risk planning
Now the task is to deal with identified
risks Risk acceptance Risk avoidance Risk reduction & mitigation Risk transfer
Risk acceptance
This is do nothing option. We would decide that damage inflicted
Risk avoidance
Some activities are so prone to
accidents that it is best to avoid them If u are worried about crocodiles then dont go into the water When Manager will decide to avoid the risk he will buy an off the shelf components.
departure of staffthen reduce by providing them bonus, Risk reduction attempts to reduce likelihood of risk occurring. Risk mitigation is action taken to ensure that impact of risk is lessened when it occurs.
Example
Taking regular backups of data storage
Risk transfer
Risk is transferred to another person or
organization With software projects example would be where a software development task is outsourced to an outside agency for a fixed fee.
Risk management
Contingency In a project of 10 people one fall ill then
this kind of risk needs a contingency plan . The manager will draft another member to cover that work
uncertainty PERT require three estimates Most likely time Optimistic time Pessimistic time
expect the task to take under normal circumstances ,denoted by:-m Optimistic timeshortest time in which we could expect to complete the activity, denoted by a. Pessimistic timeworst possible ,denoted by b te=(a+4m+b)/6
Pert technique use three steps to calculate probability of meeting & missing the target
example
Activity A has optimistic time(a)=5