Project Management PDF
Project Management PDF
MANAGEMENT
with CPM, PERT and
Precedence
Diaarammina w V
THIRD EDITION
Joseph J. Moder
Professor, Department of Management Science and Computer
Information Systems, University of Miami
Cecil R. Phillips
Vice President, Kurt Salmon Associates, Inc.
Edward W. Davis
Professor, Colgate Darden Graduate School of Business
Administration, University oJ Virginia
Macmillan of Canada
Division of Gage Publishing Limited
164 Commander Boulevard
Agincourt, Ontario MIS 3C7, Canada
15 14 13 12 11 10 9 8 7 6 5 4
The year 1983 marks well over a decade since the publication of the 2nd edition
of this text, and a quarter century since the initial development of PERT and
CPM. During this period, the methodology has matured considerably and the
emphasis on the early "frills" of these techniques has all but disappeared. While
the concepts of PERT probabilities and the elegant timecost tradeoff of CPM
were useful and helped to create credibility andinterest in these techniques dur-
ing their development and early application, emphasis has shifted towards prob-
lems deemed to be of more importance to practitioners. We have tended to
follow this movement in this third edition of the text. While we have not elimi-
nated the socalled "frills," we have reduced the space devoted to them some-
what, and have added new material that may improve their applicability.
Since the major benefit of network based methods of project planning and
control is the development of the project network itself, the most important
change in this thud edition is the emphasis on node and precedence diagrams
as alternatives t o the arrow diagram representation of a project plan. While the
arrow diagram was the mainstay of PERTICPM and their immediate offsprings
in the 1960s, the 1970s saw a gradual shift towards node diagrams, and more
recently to precedence diagrams. As the reader will learn, this is a mixed bless-
ing. The enrichment of network logic afforded by precedence diagramming
comes only at the expense of more complex results in the scheduling time anal-
ysis computations. We have included in this edition a comprehensive treatment
of this problem so that the reader can intelligently assess its potential in specific
application areas.
Another topic of increasing importance in the application of networkmethods
is the scheduling of activities under constraints on resource availablities. This
chapter of the text has been considerably expanded, and updated t o reflect the
current methods being used in this area. Finally, the use of computers in this
field has tended to follow the continued improvement and cost reduction in
computer hardware. The chapter on computer processing has also been ex-
panded and updated.
The basic organization of the chapters remains essentially the same as previous
editions, with Part I basic and Part I1 advanced subjects. The 6 chapters of Part
1 comprise a complete course in the fundamentals of the planning and scheduling
features of critical path methods, including cost control methods and practical
applications. One consistent set of terms and symbols is used throughout Part I.
Thus, industrial and commercial users of the methods may study only Part I in
preparation for most practical applications. A good two- or three-day training
course for industrial personnel can be based on Part I, with selected portions
from Part 11 as appropriate to the needs of the group.
The material in Part I1 is suitable for more advanced users and college level
courses in departments of management science and business administration, in-
dustrial and systems engineering, and civil engineering. While certain portions
of the text require some statistics and linear programming background, the
prerequisites are generally satisfied by upper level undergraduate students of
business or engineering.
Of interest to college instructors will be the added exercises at the end of
most chapters, and the inclusion of many problem solutions at the end of the
book.
Joseph J. Moder
Coral Gables, Florida
Cecil R. Phillips
Atlanta, Georgia
Edward W. Davis
Charlottesville, Virginia
NOMENCLATURE
Preface V
Nomenclature vii
1 Introduction
Overview of PERT
Basic Probability Theory
PERT System of Three Time Estimates
Contents xiii
Development of GERT
Gert Nomenclature
An Application of Q-GERT
Results of Computer Simulation
Summary Discussion of GERT
References
Exercises
11 Computer Processing
Advantages of Computers
When a Computer is Needed
Computer Software
Input for Initial Computation
Output for Initial Computation
Input for Updating
Output for Updated Schedule
Precedence Method
How to Find Computer Services
Comparative Features
Trends in Software
Representative Software
xiv Contents
Summary
Software Vendor Addresses
References
Exercises
Solutions to Exercises
PROJECT MANAGEMENT
with CPM, PERT and
Precedence Diagramming
I
BASIC TOPICS
INTRODUCTION
The network diagram is essentially an outgrowth of the bar chart which was de-
veloped by Gantt in the context of a World War 1 military requirement. The bar
chart, which is primarily designed to control the time element of a program, is
depicted in Figure I-la. Here, the bar chart lists the major activities comprising
a hypothetical project, their scheduled start and finish times, and their current
status. The steps followed in preparing a bar chart are as follows:
The primary advantage of the bar chart is that the plan, schedule, and progress
of the project can all be portrayed graphically together. Figure I -l a shows the
five-activity plan and 15-week schedule, and current status (end of third week)
indicates, for example, that activity B is slightly behind schedule. In spite of this
important advantage, bar charts have not been too successful onone-time-through
projects with a high engineering content, or projects of large scope. The reasons
for this include the following:
With the above disadvantages in mind, along with certain events of the mid-
fifties, the stage was set for the development of a network-based project manage-
ment methodology. Some of the notable events were the emergence of general
systems theory and the second generation of large digital computers, and the
initiation of very large and technically demanding programs in weapons systems,
power generation systems, etc. Because of the enormous size of many of these
6 I I Basic Topics
Activities I
I
A I
V I
B. I
C I - Scheduled
proiect
D I
complerion
E I time
~imelnow
Time in
l I I l I I ~ ~ I (
0 / 3 4 5 6 7 8 9 10 11 12 13 14 15
Time estimares
I
D-2 ---A I
0
i
1 2
l
3
I
4
1
5 6
1
7
l
8
i
9
1 ~ 1 ~1
10
1 1 1
11 12 13 14 15
- Time in
weeks
Figure 1-1 Comparison of G a n n chart, project network, and time-scaled network.
Introduction 7
quire less time to perform than the time allowed for them. For example, the
estimated time t o perform activities D-1 and 0 - 2 is 2 + 3 = 5 weeks, as indicated
on the time scale. However, the time interval between the occurrence of the ini-
tial and terminal events of this path, i.e., events 0 and 7, is 7 weeks. Thus, we
say that this path has two weeks of "slack" or "float." Now activities 17-1, C,
and 0 - 3 have no dashed portions; the sum of their expected performance times,
15, is the same as the time interval between the occurrence of events 0 and 8.
For this reason, this path is referred to as the criticalpath; it is the longest path
through the network.
From Figure 1-1c it is easy to see how the third of the above listed disadvan-
tages of the bar chart can be overcome. The impact of delays in completion of
any activity can be easily ascertained. For example, any delays in activities B-1,
C, and 0 - 3 will result in a corresponding delay in project completion, since they
have no slack. However, delays in activities D-1 plus 0 - 2 can be up to 2 weeks
before any delay in project completion would result. These concepts are treated
in detail in Chapter 4.
Although the network may be drawn t o a time scale, as shown in Figure 1-lc,
the nature of the network concept precludes this luxury in most applications, at
least in the initial planning stage. Thus, the length of the arrow is unimportant.
You can "slide" activities back and forth on a bar chart with ease, because the
dependency relations are not shown explicitly. However, if a network is drawn
on a time scale, a change in the schedule of one activity will usually displace a
large number of activities following it, and, hence, may require a considerable
amount of redrawing each time the network is revised or updated. There are
practical applications for time-scaled networks especially where the network is
closely related to production planning and where scheduling to avoid overload-
ing of labor or facilities is a prime consideration. In these cases the time-scaling
effort is worthwhile, for it clearly illustrates conflicting requirements.
Cleland and King1 * point out the strong influence of general systems theory, as
it had evolved in the mid-fifties, on the development of network-based project
management methodology. The systems concept instills the desire to achieve
overall effectiveness of the organization, in an environment which invariably in-
volves conflicting organuationalobjectives. A systems-oriented manager realizes
that he can achieve the overall goals of the organization only by viewing the en-
tire system. He must seek to understand and measure departmental interrela-
tionships, and to integrate them in a fashion which enables the organization to
efficiently pursue its goals. To accomplish this, increasing use is required of ob-
jective scientific analysis in solving decision problems. These methods rely on
Random
outside heat
load distutbances
Furnace
AIC
Temperature
Negative feedback loop
-- --
Random outside
disturbances:
procurement delays,
personnel problems,
technical problem.
weather effects
action by the project manager who initiates control decision actions, as needed,
to bring the project back into line. This is the basic methodology to be devel-
oped in this text.
trated in Figure 1-3, using the same network adopted in Figure 1 - 1 . Note that
the activity strips are ordered so that the predecessors of any given activity will
always be found to its left. The activity strips each contain a movable tab whose
length is proportional to the estimated duration of the activity, and whose loca-
tion along the time scale denotes the scheduled start and finish time for each ac-
tivity. Thus, starting at the first column on the left in Figure 1-3 and working to
the right, it is easy to schedule each activity so that all time precedence con-
straints are satisfied. This is carried out by noting that constraining completion
times of all predecessor activities will have already been determined, and will ap-
pear nearby t o the left. For example, activity E-2, in Figure 1-3, has an earliest
allowable start time of 11, since the earliest finish times of its predecessorsA-3,
E-1, and Dummy, are 9, 11 and 7, respectively. The largest, or latest, of these
times is 1 I, which becomes the earliest allowable start time for activity E-2.
The Harmonygraph is equivalent to an arrow diagram of the project plan, and
hence it could alleviate all of the shortcomings of the bar chart listed above. By
incorporating sliding tabs on each activity strip, it even overcomes the difficulty
of keeping a bar chart up to date. These tabs facilitate the simulation of alterna-
tive schedules and network updating to reflect current status deviations from
original schedules.
*The first column or strip represents ACTIVITY A-1, where (4) indicates the estimated time
to perform this activity. The dash in the FROM row indicates that activity A-1 has no pre-
decessor activities, and the A-2 in the T O row indicates that it is a successor to A-1.
Figure 1-3 Harmonygraph drawing of the project depicted in Figure 1-1, with all activities
placed at their earliest start times.
12 1 / Basic Topics
One can only conjecture why this elegant solution to the problem was ig-
nored, and had to be reinvented some years later. First, the author, while de-
veloping a fine methodology, did very little to sell its merits with impressive ap-
plications. But the most important reason was undoubtedly the timing of the
development; in 1930 it was ahead of its time by a quarter of a century.
After these 25 years passed, an explosion occurred in interest in the problem
of scheduling large projects. Three developments in the U.S. and Great Britain
will be described below. Although they were independent, concurrent studies,
they all based their respective methodologies on a network representation of the
project plan, such as that shown in Figure 1-lb. They all essentially rediscovered
the Harmonygraph in the systems approach age of the computer, and added one
essential feature: They broke away from a strict graphical procedure by adding a
tabular and arithmetic approach to the scheduling process.
The unpublished British development is discussed by L ~ c k ~ e He r.~describes
how the Operational Research Section of the Central Electricity Generating
Board investigated the problem involved with the overhaul of generating plants.
By 1957, they had devised a technique which consisted essentially of identifying
the "longest irreducible sequence of events." This term was later shortened to
"major sequence," and corresponds to what we have referred to above as the
critical path. Successive experimental applications of this methodology in the
period 1958-60 resulted in very impressive project duration reductions of 42%
and then 32%of the previous average times.
While this study was being conducted in Great Britain, two corresponding de-
velopments were taking place in the U.S. They are called PERT and CPM, and
the historical highlights of each will be given below.
The development of PERT began when the Navy was faced with the challenge
of producing the Polaris missile system in record time in 1958. Several studies4'
indicated that there was a great deal to be desired with regard to the time and
cost performance of such projects conducted during the 1950's. These studies
of major military development contracts indicated that actual costs were, on the
average, two t o three times the earliest estimated costs, and the project durations
averaged 40 to 50 percent greater than the earliest estimates. Similar studies of
commercial projects indicated average cost and time overruns were 70 and 4 0
percent, respectively. While many people feel that original estimates must be
optimistic in order to obtain contracts, a more important reason for these fail-
ures was the lack of adequate project management planning and control tech-
niques for large complex projects.
It was recognized that something better was needed in the form of an inte-
grated planning and control system for the Polaris Weapons System program. To
face this challenge, a research team was assembled consisting of representatives
of Lockheed Aircraft Corporation (prime contractor of Polaris), the Navy Spe-
cial Projects Office, and the consulting firm of Booz, Allen and Hamilton. This
research project was designated as PERT, or Program Evaluation Research Task.
Introduction 13
By the time of the first internal project report, PERT had become Project Eval-
uation and Review T e ~ h n i ~ u eThis. ~ research team evolved the PERT system
from a consideration of techniques such as Line-of-Balance,' Gantt charts, and
milestone reporting systems.
Time was of the essence in the Polaris program, so the research team concen-
trated on planning and controlling this element of the program. A major accom-
plishment of the PERT statistical procedure is the utilization of probability
theory for managerial decision making. Scheduling systems have, traditionally,
been based upon the idea of a f ~ e dtime for each task. In the PERT system
three time estimates are obtained for each activity-an optimistic time, a most
likely time, and a pessimistic time. This range of times provides a measure of the
uncertainty associated with the actual time required to perform the activity
sometime in the future. With the PERT procedure, it is possible, on the basis of
these estimates, to derive the probabilities that a project will be completed on or
before a specified schedule date. The misleading notion of a definite time for
the completion of a project, or subproject, can be replaced by statements of the
possible range of times and the probabilities associated with each. The result is
a meaningful and potentially useful management tool. By adding to this infor-
mation an appraisal of the consequences of not meeting a scheduled date and the
cost of expediting a project in various ways, management can better plan at the
outset of a project.
PERT also emphasizes the control phase of project management by various
forms of periodic project status reports. The work of the original PERT research
team has been extended into the areas of planning and controlling c o s t s , 8 ~and
~
to a lesser degree, into the areas of the performance or quality of the product.1°
CPM (Critical Path Method) grew out of a joint effort conducted in the period
Dec. 1956-Feb. 1959 by the duPont Company and Remingt~nRandUnivac."~'~
The objective of the CPM research team was to determine how best to reduce
the time required to perform routine plant overhaul, maintenance, and constmc-
tion work. In essence, they were interested in determining the optimum trade-
off of time (project duration) and total project cost. This objective amounts to
the determination of the duration of a project which minimizes the sum of the
direct and indirect costs, where, for example, direct costs include labor and ma-
terials, while indirect costs include the usual items, such as supervision, as well
as "cost" of production time lost due to plant downtime.
The activities comprising this type of project are characteristically subject to a
relatively small amount of variation compared to the activities of the Polaris pro-
gram. Hence, unlike PERT, CPM treats activity performance times in a deter-
ministic manner and has as its main feature the ability to arrive at a project
schedule which minimizes total project costs.
The pioneering PERT and CPM groups did not know of each other's existence
until early 1959, when the momentum of each effort was too great to influence
the other. What has finally emerged from them is essentially a methodology
14 I 1 Basic Topics
The activities making up the project are defmed, and their technological depen-
dencies upon one another are shown explicitly in the form of a network dia-
gram. This step is shown in box (1) of Figure 1-4, and is the subject of Chapter
2, Developing the Network. Three alternative methods of networking will be
Introduction 15
I
-
-
i
t (3) Basic critical PLANNING
Modifications t o time, +
path calculations PHASE
cost, performance, or
resource constraints
t
-
+
(7)Management
replanning and overall NY 14) Resolution
Of
and time
resource allocation constraints
No Yes
t CONTROL
(6) Periodic status PHASE
,
reports: elapsed time.
measured progress,
resources expended.
money expended, etc.
-
Fiiure 1-4 Dynamic network-based planning and control procedure.
taken up, called m w ,node, and precedence diagramming. Thii is the most im-
portant step in the entire PERTlCPM procedure. The disciplined approach of
expressing a plan for carrying out a project in the form of a network accounts
for a large portion of the benefits to be derived from PERTICPM. The develop-
ment of the network is, in a sense, the simulation of alternative ways of carrying
out the project. Experience has shown that it is preferable to make planning er-
rors on paper, rather than in "bricks and mortar." It should also be added that
if useful results are not obtained from these methods, it is usually because of
inadequately prepared networks.
Estimates of the time required to perform each of the network activities are
made; these estimates are based upon assumed manpower and equipment require-
ments and availabiiity, and other assum~tionsthat mav have been made in dan-
ning the project in step 1. This step isshown in boxi2) of Figure 1-4. ~;ngle-
time estimation is taken up in Chapter 3. The three-time estimation method
associated with PERT is treated in Chapter 9.
16 l l Basic Topics
The basic scheduling computations give the earliest and latest allowable start and
finish t i e s for each activity, and as a byproduct, they identify the critical path
through the network, and indicate the amount of slack or float time associated
with the noncritical paths. This step, shown in box (3) of Figure 1-4, is taken
up in Chapter 4.
The feasibaity of each schedule must be checked with respect to manpower and
equipment requirements, which may not have been explicitly considered in Step
3. This step, shown in box (4) of Figure 1-4, is taken up in Chapter 7. The rou-
tine scheduling computations of Step 3 determine the slack along each network
path. This indicates where certain activity schedules can be moved forward or
backwards in time without affecting the completion time of the project. This
movement can then be used to arrive at schedules which satisfy outside con-
straints placed on the quantity of resources available as a function of time.
Establishing complete feasibility of a specific schedule requires frequent rep-
etition of the basic scheduling computations, as shown by the recycle path from
box (4) to box (3). It may also require replanning and overall adjustment of re-
sources, as shown by the path from box (4) to box (7). Hence, establishing an
acceptable project plan for implementation may require the performance of a
number of cycles of Steps 3 and 4, and possibly Steps I and 2 as well.
When the network plan and schedule have been developed to a satisfactory ex-
tent, they are prepared in final form for use in the field. The project is con-
trolled by checking off progress against the schedule, as indicated in box (6), and
by assigning and scheduling manpower and equipment, and analyzing the effects
of delays. Whenever major changes are required in the schedule, as shown in box
(7), the network is revised accordingly and a new schedule is computed. The
subject of time control is taken up in Chapter 4, and cost control in Chapter 5.
In addition to its value as a means of planning a project t o optimize the time-
cost relationship, the critical path network provides a powerful vehicle for the
control of costs throughout the course of the project. Most cost accounting sys-
tems in industry are functionally-oriented, providing cost data by cost centers
within the company organization rather than by project. By the utilization of
the project network as a basis for project accounting, expenditures may be
coded to apply to the activities, or groups of activities within a project, thus en-
abling management to monitor the costs as well as the schedule progress of the
work.
Although the theory of network cost control is relatively simple, it is just be-
ginning to be employed as a practical supplement to basic critical path technol-
ogy, primarily because of the necessary involvement in established cost account-
ing procedures, and the fairly recent widespread availability of general computer
programs. Thus, each organization interested in network cost control has been
faced with the inconvenience and expense of developing new accounting proce-
dures and the adoption of appropriate computer programs. In the mid-60s sev-
eral large agencies of the U.S. Governments required the use of cost control
supplements to basic CPM and PERT requirements, and generalized computer
programs were developed. The U.S. Army Corp of Engineers still has this re-
quirement on complex projects. They have not, however, succeeded in making
cost control supplements as widely used as the basic PERTICPM procedures, but
they did provide some impetus for continued development of cost control sys-
tems. Also, as the installation of computers has expanded further in industry,
changes in accounting procedures have become more frequent. Indeed, this ex-
pansion is becoming a necessity in many functionally organized companies that
are experiencing problems of coordinating project activities because of rapid
expansion of the volume of their work. Much of this has been brought about by
the frequent occurrence of multibillion dollar projects contracted on a cost basis.
Such firms are currently expending a great deal of effort to develop network-
based management information systems to alleviate this problem.
An introduction to the concepts and practical problems of network cost con-
trol is presented in Chapter 5 . A discussion of the available computer programs
for all types of network analysis is contained in Chapter 11.
The basic procedures incorporated in Steps 1 through 6 can be performed, at
least to some extent, by hand. Such methods will be presented in this text be-
cause they are useful in their own right, and also because they are an excellent
means of introducing the more complex procedures that require the use of com-
puters. It is particularly important that one be able to perform, by hand, the
basic critical path calculations indicated in box (3) of Figure 1-4, since this is the
first step in the evaluation of a proposed network plan for carrying out a project.
A very simple method of hand calculation will be presented in Chapter 4. Hand
methods for the resolution of relatively simple time and resource constraints will
also be presented; they will then lead into more complex procedures for which
computers are a necessity. Hand and computer methods of preparing periodic
status reports will also be presented. A description of available computer pro-
grams is given in Chapter 11.
Since the successful application of PERT in the Polaris program, and the initial
success of CPM in the chemical and construction industries, the use and further
development of critical path methods has grown at a rapid rate. The applica-
tions of these techniques now cover a wide spectrum of project
Research and development programs range from pure research, applied re-
search, and development to design and production engineering. While PERT is
most useful in the middle of this spectrum, variations of it have been used in the
production end of this spectrum. However, overall usage is not as widespread
now as in the 1960s. PERT is not particularly useful in pure research, and in
fact some say it should be avoided here because it may stifle ingenuity and imag-
ination, which are the keystones of success in pure research.
Maintenance and shutdown procedures, an area in which CPM was initially de-
veloped, continues t o be a most productive area of application of critical path
methods. Construction type projects continue to be the largest individual area
in which these methods are applied. It is extremely useful in this field of appli-
cation t o be able to evaluate alternate project plans and resource assumptions on
paper rather than in mortar and bricks.
More recent applications of critical path methods include the development
and marketing of new products of all types, including such examples as new
automobile models, food products, computer programs, Broadway plays, and
complex surgical operations.
In addition t o an increase in the variety of applications of critical path meth-
ods, they are being extended to answer questions of increasing sophistication.
The important problem of resource constraints has been successfully expanded
lntroductlon 19
to include multiple resource types associated with multiple projects. Cost con-
trol, project bidding, and incentive contracting are also areas where significant
developments are taking place.
It is fitting to close this chapter with an enumeration of the advantages that one
might expect from the use of critical path methods in the planning and control-
ling of projects.
1 . Planning Critical path methods first require the establishment of project
objectives and specifications, and then provide a realistic and disciplined
basis for determining how t o attain these objectives, considering pertinent
time and resource constraints. It reduces the risk of overlooking tasks nec-
essary to complete a project, and also it provides a realistic way of carrying
out more long-range and detailed planning of projects, including their coor-
dination at all levels of management.
2 . Communication Critical path methods provide a clear, concise, and un-
ambiguous way of documenting and communicating project plans, sched-
ules, and time and cost performance.
3. Psychological Critical path methods, if properly developed and applied,
can encourage a team feeling. It is also very useful in establishing interim
schedule objectives that are most meaningful t o operating personnel, and
in the delineation of responsibilities to achieve these scheduled objectives.
4 . Control Critical path methods facilitate the application of the principle
of management by exception by identifying the most critical elements in
the plan, focusing management attention on the 10 to 20 per cent of the
project activities that are most constraining on the schedule. I t continu-
ally defines new schedules, and illustrates the effects of technical and pro-
cedural changes on the overall schedule.
5 . Training Critical path methods are useful in training new project mana-
gers, and in the indoctrination of other personnel that may be connected
with a project from time to time.
REFERENCES
EXERCISES
The first step in utilizing critical path methods is the identification of all the ac-
tivities involved in the project and the graphical representation of these activities
in a flow chart or network. This step is usually called the "planning phase," be-
cause the identification of the project activities and their interconnections re-
quires a thorough analysis of the project, and many decisions are made regarding
the resources to be used and the sequence of the various elements of the project.
In one sense the network is only a graphical representation or model of a proj-
ect plan. The plan may have previously existed in some other fom-in the
minds of the project supervisors, in a narrative report, or in some form of bar
chart. In practice, however, the preparation of a network usually influences the
actual planning decisions and results in a plan that is more comprehensive, con-
tains more detail, and is often different from the original thoughts about how
the project should proceed. These changes derive from the discipline of the net-
working process, which requires a greater degree of analytical thinking about the
project than does a narrative, a bar chart, or other types of project descriptions.
Thus, the contruction of the network often becomes an aid to and an integral
part of project planning, rather than an after-the-fact graphical exercise. Indeed,
the planning phase has proven to be the most beneficial part of critical path ap-
plications. In developing a detailed and comprehensive project network, users
often make significant improvements over their original ideas; they do a better
22 I 1 Basic Topics
Some experienced network users will say that all one needs t o begin networking
is a large piece of paper, several sharp pencils, and a large eraser. Actually, there
is a bit more to it than that. Several general questions need to be raised and
answered before detailed project planning should begin. Among these questions
are:
BASIC TERMS
Several of the most common terms in networking are defined and illustrated
below. Terms associated with scheduling computations are explained in later
chapters.
Definition:
synonymous with "activity" are "task" and 'Sob." In the arrow scheme of net-
24 l l Basic Topics
Prepare a m r k
t
8 days
Figure 2-1
--------*
Figure 2-2a
Figure 2-26
Definition:
Definition:
The beginninp and ending points of activities are called events. Theoretically,
an event is an instantaneous point in time. Synonyms are ''node" and "connec-
.
tor." If an event represents the joint completion of more than one activity, it is
called a "merge" e m . If an event represents the joint initiation of more than
one activity, it is called a "burst" event. An event is often represented graphi-
cally by a numbered circle (Figure 2-3); although any geometric f ~ u r will
e serve
the purpose.
Figure 2-3
Development of the Network 25
Figure 2-4
Definition:
NETWORK RULES
The few rules of networking based on the arrow scheme may be classified as
those basic to all arrow networking systems, and as those imposed by the use of
computers or tabular methods of critical path computation.
KULE I . Bcforc an activity may begin, all activities preceding it must be com-
pleted.
- . (Activities with n o ~rcdecessorsare self-actuating- whcn the
project begins.)
RULE 2. Arrows imply logical precedence only. Neither the length of the arrow
nor its "compass" direction on the drawing have any significance. (An
exception to this rule is discussed under "Time-scaled Networks"
below.)
R U L E 5. Networks may have only one initial event (with no predecessor) and
only one terminal event (with no successor).
Rules 4 and 5 are not required by all computer programs for network analysis,
as discussed in the appendix to Chapter 4. Hand computation on the network
does not require Rules 3 , 4 , or 5, but the network must not have loops.
EMPHASIS ON LOGIC,
Figure 2-58
- Deactivate
Procure pipe
Figure 2-5b
Development of the Network 27
INTERPRETATION OF RULES
COMMON PITFALLS
Figure 2-6a
28 1 I Basic Topics
First half of A
Figure 2-66
Networking rules 3, 4, and 5 are related to the procedures for coding networks
for computer analysis. Rule 3 involves another subtle problem that all computer
programs have in understanding a network. Consider the diagram in Figure 2-8a.
Develonrnent of the Network 29
Figure 2-8a
Figure 2-8b
w
Figure 2-10
One remedy calls for the introduction of a dummy and another event in series
with either activity A or 3 (Figure 2-10). Now the computer can distinguish be-
tween the activities by their different codes.
Note that the above solution does not change the logic of the network. Nor
would the logic be changed if the dummy had been placed at the other end of 3,
or at either end of A. If the reader feels that a change in logic has occurred, he
should review the section Interpretation of Rules.
Another way to correct duplicate activities is t o combine them (Figure 2-1 1).
This solution is simple and effective, but it may destroy some of the desired de-
tail in the network; the question of detail is treated in Chapter 3.
Another special restriction for computer analysis is Rule 5. To accommodate
this requirement it is common practice to bring all "loose ends" to a single initial
and a single terminal event in each network, using dummies if necessary. For ex-
ample, one may wish to network a current project that is already past the initial
event. In this case the network would have a number of open ended, parallel
paths at the "time now" point. These loose ends would be connected to a single
initial event by means of dummies, as shown in Figure 2-12.
When methods employing hand computations on the network (or certain
computer programs) are utilized, Rule 5 is not necessary.
A and B
Figure 2-11
Development of the Network 31
Figure 2-12
While the need for dummies in certain cases has been pointed out, it is preferable
to avoid unnecessary dummies. For example, consider the diagram in Figure
2-13. Evidently, activity D depends on C, B, and A. But the dependency onA
is clear without the dummy 2-4, which is redundant. Such dummies should be
eliminated to avoid cluttering the network and to simplify computations. (Some
computer services base their charges on the number of activities, including
dummies.)
In other cases it may be necessary to introduce dummies for clarity. For ex-
ample, suppose a particular event is considered a milestone in the project, a
point that represents a major measure of progress in the project. This point may
be assigned a scheduled or target date, which may be noted on the network as
shown in Figure 2-14. However, the ambiguity of events, especially merge or
burst events, can cause confusion about the target date notation. Does the date
represent the scheduled completion of activity A , activity B, activitiesA and B,
or the start of activity C? In these cases it may be desirable t o eliminate the pos-
sible misunderstanding by introducing dummies, as in Figure 2-15. In this exam-
ple it is now clear that the date refers only t o the completion of activity A. It is
Figure 2-13
32 I I Basic Topics
Figure 2-14
Figure 2-15
ACTIVITY DESCRIPTIONS
Thus far in this chapter, most activities in the illustrative diagrams have been de-
scribed by letter codes on the arrows. This has been done both for convenience
and to emphasize the logic of the network representations. In practice it is
much more common to print several descriptive words on the arrow. This avoids
the need for cross-reference with a separate list of activity descriptors.
The descriptions themselves must be unambiguous; they must mean the same
thing to the project manager, the field superintendent, the various subcontrac-
tors, and others expected to use the network. Descriptions should also be brief
and, where possible, should make use of quantitative measures or reference
points. Examples are shown in the following sample applications.
SAMPLE APPLICATIONS
A Machinery Installation
Consider a project involving the installation of a new machine and training the
operator. Assume that the training of the operator can begin as soon as he is
Development of the Network 33
0
INSTALL MACHINE INSPECT MACHINE
T R A I N OPERATOR
Figure 2-16
hired and the machine is installed. The training is to start immediately after in-
stallation and is not to be delayed for inspection of the machine. The inspection
is to be made after the installation is complete. One might attempt to network
this project as shown in Figure 2-16.
However, this network says that the inspection cannot begin until the opera-
tor is hired, which is a false dependency. To correct this representation in the
network a dummy is added, as shown in Figure 2-17.
HlRE OPERATOR
Figure 2-17
A Market Survey
Consider now a project to prepare and conduct a market survey. Assume that
the project will begin by planning the survey. After the plan is completed, data
collection personnel may be hired, and the survey questionnaire may be de-
signed. After the personnel have been hired and the questionnaire designed, the
personnel may be trained in the use of the questionnaire. Once the question-
naire has been designed, the design staff can select the households to be surveyed.
Also, after the questionnaire has been designed it may be printed in volume
for use in the survey. After the households have been selected, the personnel
trained, and the questionnaires printed, the survey can begin. When the survey is
complete the results may be analyzed. This project may be networked as shown
in Figure 2-18. Note that dummy 4-3 is essential, whereas dummy 6-5 is neces-
sary only if a computer is to be used.
questionaire
Figure 2-18
The network in Figure 2-19 represents a plan for the development and marketing
of a new product, in this case a new computer program.' Note that the dummy
5-7 is used to conform t o Rule 4. The dummy 2-4, however, is used to show
that activities 4-5 and 4-7 depend on activities 1-2 and 3-4, while activity 2-6 de-
pends only on activity 1-2. Another dummy is shown between events 0 and 1;
this dummy is not technically necessary and could have been omitted by com-
bining events 0 and 1. Note also that this network has two critical paths, de-
noted by the heavy activity lines.
The network in Figure 2-18 illustrates the fact that there are two types of activ-
ity dependency. Note that most of the activity dependencies are caused by the
nature of the activities themselves; for example, personnel cannot be trained
until they have been hued, and the questionnaires cannot be used in the survey
until they have been printed. Such dependencies among activities may be called
- natural, and this is the most common type of dependency.
Also note, however, that the selection of households is dependent upon the
design of the questionnaire, but only because one group of people is assigned t o
do both jobs (the "design staff' in the project description). This staffing limita-
tion, and the implication that the&@ staff could not do both iobs s@@
neously causes the two activities to be drawn in series (dependent) rather than
' i n parallel. A dependency of this type is not "'natural," but is caused by the
resource limitation. Thus, it may be called a resource dependewy. The re-
sources involved may be personnel, machinery, facilities, funds, or other types of
resources.
Usually it is best to include in the first network draft all resource dependen-
cies that are known and firmly established as ground rules for the project. These
Develo~rnentof the Network 35
firm dependencies represent significant factors in the planning phase of a project
and will often have major effects on the network and resulting schedule. How-
ever, if there is doubt about the number of resources available or how they
should be allocated among the activities, then resource dependencies should be
omitted in the first draft of the network, which would then be based only on
natural logic. In these situations the techniques of resource allocation discussed
in Chapter 7 should be employed.
TIME-SCALED NETWORKS
If a network is plotted on a time scale, similar t o a bar chart, the arrows become
vectors that represent time durations as well as project elements. Tie-scaled
networks have an advantage in p~esentingthe schedule for the project to maE-
agement personnel or others not familiar with networks. In effect, time-scaled
networks are merely extensions of bar charts.
An example of a time-scaled network is given in Figure 2-20. Compare it with
the same project network in Figure 2-18. Note that in the time-scaled version-
dashed lines are used not only to represent a dummy but also represent exten-
sions of arrows beyond their estimated time durations. Thus the dashed-line ex-
gnsions represent "float time" on that path,
-.-
which
-
will be further explained in
Chapter 4.
However, time-scaled networks also have some key disadvantages. It is the
nature of projects to change schedules frequently, almost constantly. Maintain-
ing accurate time-s-densome, especially w h e x
pencil-and-paper drawing methods are used. At each updating of the project
Train
Hire personnel personnel
/ I
questionnaire
Print
3
questionnaire
1
I I I I I I I I 1 I I
0 1 2 3 4 5 6 7 8 9 10
Time in weeks
ACTIVITY-ON-NODE SCHEMES
The complete reverse of the arrow scheme is the node sc- in which the
nodes represent the activities and the arrows are merely connectors, denoting
precedence relationships. The market survey project in the node format is illus-
~- ~
trated in Figure 2-21. The principal advantage of the node scheme is that it
eliminates the need for special dummies to correct false dependencies. This fea-
ture makes the scheme more efficient and, more importantly, easier to learn. In
the arrow and event schemes the most difficult aspect is learning to make the
proper use of dummies. In the node scheme all the arrows are dummies, in ef-
fect, and there are no subtle false dependency problems requiring the use of spe-
cial dummies.
One of the first proponents of the node scheme and, apparently, its originator
was J. W. Fondahl of Stanford University. Professor Fondahl developed a node
format in 1958, almost concurrent with the publication of the first PERT and
CPM reports (see history of networking methods and references in Chapter 1).
38 l 1 Basic Topics
Figure 2-21 Suwey network, node scheme (shape of node symbol is not significant).
However, the PERT and CPM reports received the earliest public attention and
the arrow format became the most popular scheme during the first decade of
network applications. Most of the computer programs for network analysis
would accept only the arrow (1-4 notation and logic. Later, in the mid-
seventies, commercial computer software that would accept the node scheme
began to appear. Since then there has been a noticeable shift in popularity to-
ward the node scheme. An informal survey by the authors in 1981 found that
users of networking methods at that time were about equally divided between
the arrow and node schemes.
PRECEDENCE DIAGRAMMING
An extension of the basic node scheme was first mentioned in Fondahl's 1961
report (Chapter 1, Reference 14), in which "lag" values associated with activity
relationships and "precedence" matrices were introduced. These concepts
gained further notice in the user's manual for an IBM 1440 computer program
for network processing, published around 1964. One of the principal authors of
that manual was J. David Craig.
As an example of how the precedence rules apply, consider the project net-
work in Figure 2-22. Upon reviewing this f ~ s draft
t of the network, let us as-
sume that the management is dissatisfied with the overall duration of 44 weeks
and seeks ways to shorten the time. They find that the times for drawings and
procurement are dictated by some complex iron castings, and that the other
h w l o p m e n t of the Network 39
Procure Fabricate
castings Assemble
3 2
Figure 2 - 2 3 Revised network with split activities. Total time is reduced t o 37 weeks.
hardware requires less time to design, prepare drawings, and procure. Thus, all
of the activities except the last one (assembly) may be split to form two essen-
tially parallel paths for the castings and other hardware. Figure 2-23 shows this
logic, resulting in a total project time estimate of 37 weeks. The revised network
in Figure 2-23 is converted to the node scheme in Figure 2-24.
However, assume that under further study it is recognized that the activities
are still not as discrete and separate as implied by the revised networks. In par-
ticular, management notes that the start of drawings on the castings does not
have to wait until all of the castings are designed (4 weeks). Actually the first
couple of castings can be designed in the first week and the drawing work can
begin with these. Likewise, some of the hardware procurement can begin after
the first two weeks of drawing work on the hardware. These facts can affect the
overall project schedule and it may be worthwhile to revise the network still fur-
ther in order to display the more detailed logic. (As an exercise, the reader may
sketch such a further revision, using the node scheme.)
In order to represent "overlapping" activities of the kind occurring in this ex-
ample, modifications of the node scheme were developed. The modifications
consist of defining precedence relationships among activities, which are illus-
trated in Figure 2-25. In addition, one may specify a "lag time" associated with
-
Design Design Hdwe Procure Fab.
casting$ other hdwe ---c dwgs hdwe hadwe
4 2 13 2
3
-
\ \ .
Figure 2-25a Finish-to-stan relationship. (Start of B must lag 5 days after the finish of A.)
OR m-7 ss=3
Figure 2-25b Start-to-stan relationship. (Start of B must lag 3 days after the start of A)
Figure 2-2- Finish-to-finish relationship. (Finish of B must lag 3 days after the finish of
A.1
Figure 2.25d Stan-to-finish relationship. IFinish of B must lag 45 days after the start of
A.1
any of the precedence relationships. which can be used to account for the over-
lapping times among activities.
The first relationship in Figure 2-25a is the only one allowed in PERT and
CPM, with the additional flexibility that a lag time is allowed. For example, the
start of "concrete forms stripping" (activity B), must lag 5 days after thefinish
of "pour concrete" (activity A). The lag of 5 days is required in this case to
allow the concrete to cure and strengthen before the forms are removed. (Whine
the lag times associated with the finish-start constraint are usually zero or posi-
tive, it is possible to use a negative time to allow activity B to start a specified
number of time units before activity A is finished. However, this same result can
Development of the Network 41
be achieved without the use of negative lags by using the next type of relation-
ship, start-to-start.)
The second relationship, start-to-start, is also used quite frequently. Suppose
activities A and B are "level ground for concrete slab," and "place mechanical
pipe," respectively. Then the diagram in Figure 2-25b indicates that "place me-
chanical pipe" may start 3 days after "level ground for concrete slab" starts.
The 3 day lag here is to allow the grading operation to get a convenient distance
ahead of the piping, which is following behind. Now, if the grading should be in-
terrupted for some reason, it is understood that the piping activity would also be
interrupted. This type of dependency is not shown explicitly in precedence
diagramming, but this does not pose a real problem because field supervisors are
adept at handling this type of situation without the aid of project networks.
The third relationship, finish-to-finish, is also frequently used. For example,
suppose activity A is "place electrical" (5 days) and activity B is "complete
walls" (15 days). Note that it takes 3 days of activity B work to complete the
output from one day of activity A. Therefore thefinish of "complete walls-B"
must lag behind the jinish of "place electrical-A" by 3 days because it will take
3 days of wall completion work to handle the last day of electrical work. This
relationship is shown in Figure 2-25c.
The fourth relationship shown in Figure 2-25d, start-to-finish, is not fre-
quently used. An example will be taken from the field of automative design to
illustrate that precedence diagramming is not restricted to construction work.
Suppose activity A is "design power train" (40 days), and activity B is "design
chassis" (30 days). The dependency relationship between A and B might be that
the last 20 days of the chassis design work depends upon the results that will be
obtained from the first 25 days of power train design work. Thus, 25 days after
the start of the power train, 20 days is required to finish the chassis design. This
implies that the finish of chassis design must lag 25 + 20 = 45 days after the start of
the power train design. This is shown in Figure 2-25d by the SF = 45 relationship.
The composite relationship shown in Figure 2-25e is required wherever a se-
ries of activities must follow each other. For example, consider the following se-
quential construction tasks:
Activity B cannot start until 2 days after A has started, and similarly, B cannot
fmish until 2 days after A has finished. This relationship is shown specifically in
Figure 2-25e. The lag of 2 days is chosen from experience as a reasonable sepa-
ration between the carpenters and electricians. If all four of these tasks work at
the same rate (complete same number of walls per day), then this same relation-
42 I / Basic Topics
Design
Hdwe Procure Fabricate
castings
dwgs hdwe hdwe
&.hdwe
3 13 2
6
I, 0 b
L=2 L =1
Assemble
4 2
Figure 2-26 Sample project converted to precedence diagramming network. Total time i s
reduced to 33 weeks.
ship would hold between activities B and C and between C and D. It is not diffi-
cult to visualize the savings in numbers of activities possible with precedence
diagramming in networking a construction type of project. Also, it will be seen
that representing a task by a single activity, rather than a series of activities, sim-
plifies project time and cost control.
Using these "precedence diagramming" rules in revising the network of Figure
2-24,, the management is able to show the overlapping activities in a more accu-
rate way without splitting the activities further, as shown in Figure 2-26. In
fact, there is one less node as compared with Figure 2-24, and it can be shown
that the project duration is further reduced to 33 weeks.
It is evident that in some situations precedence diagramming can be more effi-
cient than arrow or node schemes. Project managers may also l i e the fact that
certain key activities do not have to be split into two or more separate nodes.
In this example, the design work can be retained as a single activity. Advocates
of precedence diagramming feel that it is thus easier to understand and less con-
fusing than splitting activities. However, the method also introduces some com-
plexities of its own in the form of connecting arrows with several different def-
initions, and project time calculations that are not quite as straightforward as in
arrow or node networks.
The subject of precedence diagramming is covered further in Chapters 3 and 4.
SUMMARY
This chapter has been concerned with the translation of the project plan into a
series of interconnecting activities and events composing a network model of the
plan. A few rules were presented, some being required in order t o maintain ac-
curacy and consistency of network interpretation, and others being required by
the nature of data-processing procedures. The rules presented relate t o the ar-
Development of the Network 43
row method of networking. The next chapter continues the development of the
network, including the addition of activity time estimates and the attainment of
the desired level of network detail.
REFERENCES
1. GE 225 Application, Critical Path Method Program, Bulletin CPB 198B, Gen-
eral Electric Computer Deprtment, Phoenix, 1962.
2. Fondahl, J. W., A Noncomputer Approach to the Critical Path Method for
the Construction Industry, 2nd Ed., Department of Civil Engineering, Stan-
ford University, Stanford, Calif., 1962.
EXERCISES
1. Review the machinery installation sample network in Figure 2-17 and as-
sume that an activity consisting of "schedule inspector" must precede "in-
spect machine." Add the activity to the network without causing a false de-
pendency.
2. In Figure 2-27 find at least five errors or unnecessary symbols. State which
rule is broken in each case, and suggest how the error might be corrected.
Figure 2-27
3. Given the activities and relationships listed below, draw an accurate network
with no more than six dummies. Check your results by (1) numbering each
event (do not repeat any numbers) and determining that no activity or
44 l 1 Basic Topics
dummy has the same pair of identification numbers, (2) making sure that
there is only one initial and one terminal event.'
4. Using the' list of activity dependencies given below, draw an accurate and
economical (minimizing the use of dummies) network.
LOLL2
C3
Figure 2-28
Development of the Network 45
6. Assume that the following list of activity dependencies is correct. The dia-
gram in Figure 2-29, however, does not represent these dependencies prop-
erly. Correct the diagram using only one dummy activity.
Figure 2-29
The network was drawn this way because the planner felt that he would not
start activity D until B and C were completed, and also that he would not
start activity E until D was completed. If the true technological require-
ments on activity D are that only A must precede D, and no other activity
depends on activity D, how should this network be drawn?
10. Using the basic node scheme, draw the networks described in exercises 3,4,
and 6.
TIME ESTIMATES
A N D LEVEL OF
DETAIL
By applying the networking rules presented in Chapter 2, one may develop the
fust draft of the project network. The basic logic of the plan should be estab-
lished by the fust draft. The next step is to add time estimates to each activity
and refine the network as needed to display the desired level of detail.
In practice, the processes of time estimation and network refinement are
closely interrelated and are usually accomplished at the same time. For as one
begins to make time estimates, it is found that certain activities need t o be re-
defined, condensed into fewer activities, or expanded into more, in order to
represent the project accurately and at the desired level of detail.
As mentioned in Chapter 1, there are two methods of applying time esti-
mates: the single estimate method and the three estimate method. This chapter
wiU treat only the single estimate method. The three estimates and their asso-
ciated statistical treatment are considered in detail in Chapter 9. The three esti-
mate procedure may be useful in projects where the time values for each activity
may be uncertain and the estimator wishes to provide a range of time values.
Accuracy of Estimates
One of the most common first reactions of persons being introduced to critical
path methods is that the whole procedure depends upon time estimates made by
47
project personnel. Since these estimates are based upon judgment rather than
any "scientific" procedure, it is argued, the resulting CPM or PERT schedules
cannot be any better than schedules derived from bar charts or any other method.
While it is true that critical path methods depend upon human time estimates,
as all project planning schemes must, there are some significant differences in
how the estimates are obtained and in how they are used. To illustrate these
differences, consider how estimates for project times and costs are usually de-
rived. The process is similar in most types of industrial or construction projects,
so let us take a familiar example, the construction of a house. A builder's esti-
mate for a house may look something like this:
Cost Time
Estimate Estimate
Clearing and grading $ 1,920.00 -
Foundations 5,336.00 -
Framing 7,290.50 -
Approximately
Total $221'373*58 3 to 4 Months
The total cost was developed from detailed, item-by-item estimates. The total
t i e , however, was simply a gross estimate based on the builder's experience
with similar projects. Careful attention to costs, of course, is the home builder's
key to obtaining contracts and making a profit. He can afford to be less accu-
rate about time estimates because the contracts do not normally have time limi-
tations and the owner is not as concerned about the exact duration of the project.
But suppose the time were a critical factor, as it often is in industrial projects,
and suppose the accuracy of the time estimate were made important to the
builder's profit, through penalty clauses and other means. How could the
builder develop a more accurate estimate of the project duration? We would
expect him to break down the job into its time-consuming elements, to obtain
good time estimates of each element, and to sequence the elements into a plan
that would show which elements must be done in series, which in parallel, etc.
In principle we are saying that greater accuracy in time estimation can be de-
veloped in a manner similar to the development of accurate cost estimates-
through detailed, elemental analysis.
Critical path methods provide a disciplined vehicle for making detailed time
estimates, for graphically representing the sequence of project elements, and
for computing schedules for each element. Thus the network format effectively
utilizes more detail than does a bar chart, which is a particular advantage in
the use of time estimates and in schedule analysis. Human knowledge remains
the basic ingredient in all methods, but it is how the knowledge is applied that
determines the accuracy and power of the results.
Time Estimates and Level of Detail 49
Certainly another key factor in the accuracy of time estimates is who makes
them. A general rule in this regard is that the most knowledgeable supervisory
person should estimate each activity. This means, for example, that activities
that are the primary responsibility of the electrical subcontractor should be esti-
mated by the subcontractor's manager or supervisor most familiar with the job;
activities of the research department should be estimated by the research super-
visor responsible for and most familiar with the work; and so on. The objective
in obtaining time estimates should be to get the most realistic estimates possible.
It is characteristic of network planning to call meetings of all supervisory per-
sonnel at the time-estimating stage and to consider each activity for which they
are responsible. (It is also desirable for these personnel to participate in prepara-
tion of the first network draft. This is not always practical, though, if everyone
involved is not familiar with network principles). In addition to the psychologi-
cal advantages mentioned in Chaper 2, the participation of the key members of
the project team has major advantages. Whenever the subcontractors, suppliers,
inspectors representing the customer, etc., meet to discuss a project, the discus
sion will lead to questions of priorities in certain phases of the work, potential
interference of work crews, definitions of assignments of engineers, and many
other details of planning that might not have been explored until problems arose
during the project. These discussions often identify and resolve potential prob-
lems before the project begins-rather than tackling them as they actually occur,
which can result in the corrective action being expensive or perhaps impossible.
Here again the network merely serves as a cause for calling the meeting and
as a detailed agenda. Yet these thorough planning sessions around a network re-
sult in what is probably the major benefit of critical path methods as practiced
to date. This benefit is the project plan itself, in terms of its validity, its com-
prehensive scope, and its efficiency in the utilization of time and resources. This
is not to say the reader should stop here. There is more to be gained, and many
of the more experienced users are applying critical path methods and related
procedures to advance the science of project management in a variety of ways.
However, it appears that a majority of satisfied users of CPM and PERT have
gotten their money's worth out of the initial network planning effort. Follow-
ing through with the technique in the project control applications, whenever it
is done, has provided bonus benefits.'
The question of bias or "padding" of time estimates is, naturally, related t o
who makes the estimates and their motivations. It does not necessarily follow
that the most knowledgeable person is also the most objective. It is human
nature to try to provide a time estimate that will be accepted as reasonable but
will not likely cause embarrassment later. Thus, a certain amount of bias is t o
be expected in any procedure.
Nevertheless, it is generally felt by CPM users that the network approach
tends to help reduce the bias to a manageable level. Again, the increased de-
tail shown by a network plays a useful role. The smaller the work elements, the
more difficult it is to hide a padded estimate. Indeed, a certain amount of pro-
fessional pride is often noticeable in the estimator's attitude, which leads to a de-
gree of optimism in his figures. Another factor.favoring realistic estimates is the
recognition that biased figures will tend to make the activities involved form the
critical path, thus invoking concentrated attention of management and other
parties engaged in the project on the group responsible for those activities.
Only a limited amount of research on the subject of network time estimation has
been published. One of the more interesting studies, by Seelig and Rubin,' com-
pared the results of 48 R & D projects, some of which were "PERTed" and some
of which were not. The authors concluded that the use of PERT definitely did
lead to improvement of schedule performance but had no noticeable effect on
technical performance. Furthermore, they concluded that the improvement in
schedule performance was primarily a result of improvement in communication
among the project managers, which was brought about by the use of the net-
work method.
ESTIMATION METHODS
It is best to complete a rough draft of the total project network before any time
estimates are added. This procedure is conducive to concentration on the logic
of the activity relationships, which must be accurately established. When the
draft appears to be complete, the time estimates should be added to each activ-
ity. This step will constitute a complete review of the network, and will usually
result in a number of modifications based on the diagrammer's new perspective
of the total project network.
As soon as the estimates are completed, a simple hand computation of the
forward pass should be made (this results in the earliest activity start and finish
times, as explained in the next chapter). This is an important step, for it may
reveal errors or the need for further refinement before the preparation of the
final working draft of the project network.
Conventional Assumptions
The time estimate to be made for each actMty is the mean or average time the
activity should take, and the estimate is called the activity duration. This term
Time Estimates and Laral of Detail 51
is employed to imply that elapsed time of the activity expressed in units such
as working days, rather than a measure of effort expressed in units such as
man-days. Units other than working days, such as hours or weeks, may be
utilized, provided the unit chosen is used consistently throughout the network.
Estimates of activity duration do not include uncontrollable contingencies such
as fires, floods, strikes, or legal delays. Nor should safety factors be employed
for such contingencies.
In estimating an activity's duration time, the activity should be considered
independently of activities preceding or succeeding it. For example, one should
not say that a particular activity will take longer than usual because the parts
needed for the activity are expected to be delivered late. The delivery should
be a separate activity, for which the time estimate should reflect the realistic
delivery time.
I t is also best to assume a normal level of manpower, equipment, or other re-
sources for each activity. Except for known limitations on resources that cause
some activities to be resource dependent (discussed in Chapter 2), donot attempt
to account for possible conflicts between activities in parallel that may compete
for the same resources. These conflicts will be dealt with later, after the schedul-
ing computations have been made.
Fixed-Time Activities
Certain project activities require fxed time periods beyond the control of man-
agement. Examples include: legal minimums of 30 or 90 days for advance no-
tice for public hearings or other events, advance deadlines of media for receipt
of advertising copy, technical minimums such as the time to cure concrete or to
transport equipment by ship or barge. Often such activities become part of the
critical path and thus are important factors in the total project duration.
What can be done about such fured-time activities? Of course, the most im-
portant step is to recognize these time periods and deadlines early in the plan-
ning phase of the project, so that the preparatory steps are scheduled to avoid
missing the deadlines. Network planning methods help to identify such dead-
lines early and to plan properly to meet them.
Another consideration is to make sure that as much as possible can be ac-
complished in parallel with fmed-time activities rather than in series with them.
This may help reduce the total length of time on the paths containing the fxed
elements. In some cases hard, creative thinking may even uncover ways t o re-
duce or eliminate "fxed-time" activities. For example, a new product advertis-
ing campaign might be restructured to reduce dependence on long lead time
monthly publications, while shifting emphasis to weekly publications, radio
and television spots, or other media that can accept copy on shorter notice.
Considered early enough, even legal and technical limits can be modified some-
52 I 1 Basic Topics
times by redesigning the product or the project procedures, if the schedule im-
peratives warrant such fundamental revisions.
Erect scaffold
(IOMD, 5 W D )
Figure 3-1
The use of working days, which is a common time unit in construction projects,
results in computations of project duration which assume that no activities pro-
ceed on weekends and holidays. However, this may be incorrect. For example,
concrete may be cured and buildings may be dried out over nonworking days.
In such cases, time estimates in working days tend to result in an overestimate
of the project duration. When activities of this type are expected to take longer
than 5 calendar days, the overestimate can be corrected t o a certain extent by
a suitable adjustment of the working-day estimate. For example, a curing re-
quirement of 6 or 7 days can be estimated as 5 working days (assuming a five-
day work week). A curing requirement of 5 days, however, may actually take
5 working days, although it would likely run over a weekend and thusconsume
only 3 or 4 working days; in such instances, the estimator should employ the
project network to judge the likelihood of curing over the weekends and adjust
the working day estimate accordingly.
All time estimates in a network must be based on the same number of work-
ing days per week. For activities that will deviate from this standard, adjustments
must be made in the time estimates similar to the adjustment for curing activities
mentioned above.
Most commercial computer programs for network processing include calendar
dating features which automatically convert working-day schedules into calendar
dates, including allowances for weekends and holidays.
A C T I V I T Y REDEFINITION
Activities in Parallel
In the situation illustrated in Figure 3-2a several interrelated activities may begin
and end at approximately the same nodes.
Suppose that upon supplying the time estimates, howkver, it is realized that A
cannot begin until B has been underway for one day, and will not be completed
until one day after B is completed. Furthermore, Ccan be accomplished at any
54 1 I Basic Topics
Figure 3-Za
Figure 3-Zb
Time Estimates and Level of Detail 55
A, 6, and C
I1
Figure 3-22
tion as given in Figure 3-2b. From this figure it is clear that the total time re-
quired for all three activities is 11 days. Thus the condensed activity may be
represented as shown in Figure 3-2c.
Whether 3-2b or 3-2c is the "best" solution to the problem depends on the
project, the network objectives, the areas of responsibility involved, and other
factors which can be resolved only through the judgment of the project manager.
This is essentially the problem of the level of detail, which will be discussed fur-
ther. It should be noted here, however, that accuracy and detail are directly
related, and even when less detail is desired in the final draft of the network, it
is often useful in time estimations to sketch certain portions of the network in
greater detail.
Some project management systems use the condensation method shown in
Figure 3-2c in the computerized model of the project, while the supervisor in
the field monitors the actual progress of the work with a hand-processed net-
work in more detail (of the type shown in Figure 3-2b).
These activities-in-parallel situations, or "overlapping activities," occur fre-
quently in construction projects and in certain other kinds of work. The prece-
dence diagramming method introduced briefly in Chapter 2 is designed especially
for representing overlapping activities and should be considered when these rela-
tionships are expected to occur frequently in the project. To compare the
method, let's first illustrate the sample problem in the activity-on-node format.
See Figure 3-2d. In this case there is not much difference in network efficiency
or clarity; there are stiil five defmed activities.
Now consider the problem represented in a precedence diagram, Figure 3-2e.
(To analyze this network, review the precedence relationships defined and illus-
trated in Figures 2-25 and 2-26.) Note that Figure 3-2e shows only the three
Figure 3-2d
56 l l Basic Topics
Figure 3-20
Activities in Series
Let us look at another problem of network accuracy, this one arising in a por-
tion of a network in which the activities are drawn in series, as shown in Figure
3-3a. Suppose that upon inspecting this network it was realized that A and B
did not require a total of 17 days. Actually part of B could begin at least 2
days before A was completed. (This is similar t o the previous problem, since we
are saying that A and B are partly concurrent.) An erroneous diagram of this
type may be corrected in several ways. One way would be to split A at the point
that B begins (Figure 3-3b). Another way would be to simply absorb the com-
pletion of A in B, making sure that the activity descriptors were clear (Figure
3-3c). A third way, of course, would be to condense A andB (Figure 3-3d).
Figure 3 3 s
Begin A Complete A
Figure 3-3b
Time Estimates and Level of Detail 57
Figure 3 . 3 ~
A and B
15
Note that in each of the alternative solutions illustrated in Figures 3-3b, 33c,
and 3-3d, the total elapsed time for A and B is shown correctly as 15 days.
Again, the choice of a solution depends on what one wishes t o flustrate and con-
trol, and on such factors as the magnitude of the times involved and the feasi-
bility of defining the activity segments clearly.
Practical Example
The problems discussed above arise repeatedly in practical efforts t o draw accu-
rate networks. Therefore, it is worthwhile to review the points made in the form
of a small practical example. Consider the project of preparing a technical re-
port. The major activities include the original writing, calculations, and chart
sketches done by an engineer, typing and graphics work done by technical sup
port personnel, and fmal printing and binding done in the reproduction depart-
ment. The engineer might first draw a network and add time estimates as shown
in Figure 3-4a.
The author's reaction to this network might be that 31 days is too long. Her
deadline might be only 28 days away. Looking at her report outline, she may
Proof &
correct ,-, Print & bind
3 w
I I
6
Figure 3-4b Revised n e t w o r k Project duration is 26 days.
note that it divides easily into two parts: (I) the main text and charts, and (2)
the technical appendices. Consulting the typing and graphics departments, she
finds that they can readily handle the report in those two parts. Thus she re-
.
vised the network as shown in Figure 3-4b. The resulting total time of 26 days
allows for 2 days of errors in time estimates or unexpected delays.
NETWORK CONDENSATION
Figure 3-5a
L &M
Figure 3-Sb
Time Estimates and Level of Detail 59
Figure 3-6s
activities in series have been combined, and in one case two activities in parallel,
L and M, were combined. But all the dependency relationships in the original
diagram still hold. This is the most important in condensing networks, for
it is very easy to introduce false dependencies. (For a practical example, see
Figure 3-9.)
A somewhat different approach t o condensation is used by certain computer
routines that perform this function. This approach calls for the designation of
certain key events in the network which are not to be omited in the-condensa-
tion procedure. Then all direct and indirect restraints (groups of activities) be-
tween each pair of key events are reduced to a single restraint (activity). To il-
lustrate, consider the network of seven activities in Figure 3-6a. The triangles
denote the selected key events. Using the condensation process described above,
this network would be reduced to the two activities shown in Figure 3-6b.*
This particular procedure is vulnerable to the occurrence of "pathological
cases," in which the number of activities is not reduced or may even be in-
creased. Using the procedure on the network in Figure 3-7a, for example, pro-
Figure 3-7s
60 I I Basic Topics
u
Figure 3-7b
duced the network in Figure 3-7b. However, by selecting key events with this
possibility in mind, one can avoid most pathological cases.
Thus far, comments on the problem of the level of detail in a network have
been associated with questions of accuracy and economy of the presentation.
There are many other factors involved in determining the most appropriate level.
In considering any particular activity or group of activities with regard t o ex-
panding, condensing, or eliminating it, the diagrammer may ask himself several
questions to guide his decision:
1. Who will use the network, and what are their interests and span of control?
2. Is it feasible t o expand the activity into more detail?
3. Are there separate skills, facilities, or areas of responsibility involved in the
activity, which could be cause for more detail?
4. Will the accuracy of the logic or the time estimates be affected by more or
less detail?
Clearly, these questions are only guides t o the subjective decision that must
be made in each case. Generally, after working with one or two networks, a
person will develop a sense for the appropriate level of detail.
That there are no firm rules that may be followed in determininglevel of detail
is illustrated by the following hypothetical case. The project is the construction
of a house. If the network rules of Chapter 2 are followed, one could prepare a
complete network, as shown in Figure 3-8a, or one could take a more detailed
approach, as indicated in the portion of the network shown in Figure 3-8b.
These appear to be clear examples of too little and too much detail. But sup-
pose the house is one of a hundred identical ones in a large housing project
Three activities per house would thus result in a network of 300 activities, plus
Time Estimates and Level of Detail 61
Figure 3-8a
V
Figure 3-8b
other activities for roads, utilities, etc. Such a broad network may be very use-
ful in analyzing the over-all length of the project, the most desirable sequence of
construction, and other problems of general planning. Furthermore, since the
house construction in this case is a matter of mass production, it would be worth-
while to work out the construction schedule for one house in considerable de-
tail, for any bottlenecks in the schedule for one house would cause repeated
delays in all houses. Thus the detailed network treatment for a typical house
might well be justified under these conditions. Under most other conditions the
approaches illustrated above would indeed represent a useless extreme on the
one hand and an expensive, perhaps impractical extreme on the other.
Cylical Networks
In the house building case cited above, it was stated that both detailed and con-
densed networks may be useful if a number of identical houses are to be built.
It may be generally stated that whenever a project involves a number of cycles of
a group of activities, one should consider (1) developing a detailed network of
the group, (2) condensing the detailed network into a summarized version, and
(3) using the condensed network in the cycles that compromise the total project
network. The purposes of the detailed network are to develop an efficient plan
for the group of activities that will be repeated and to derive accurate time esti-
mates for the condensed version. The purpose of the condensed version is net-
work economy, since repetition of the detailed network would be costly in draft-
ing time and would unnecessarily complicate and enlarge the total project
network. Project types to which this principle would apply include multistory
buildings, bridges, pilot production of a group of missiles, and a series of re-
search experiments.
An example of the application of detailed and condensed networks in a multi-
story building is shown in Figure 3-9. Here the contractor worked out the de-
Excerpt from master network
Figure 3-9 Portion of network for eleven-story building project showing detailed and condensed versions of structural subnetwork. (Courtesy
Floyd D. Traver & Co., Atlanta.)
Time Estimates and L d of Dotail 63
tailed network using a time unit of hours in order to balance the crews and mini-
mize delays in the structural work on a floor. Then the condensed version was
repeated for each floor of the building in the total project network.
Figure 3-9 also illustrates that large, complex networks are sometimes difficult
to read. This is not a trivial matter, since one of the primary purposes of net-
works is to provide a more readable format for the project plan. An effective ap-
proach to improving network readability is to provide large labels for major sec-
tions of the network. An example is shown in Figure 3.10.
A. Complete the pour of floor slabs for three floors with the following con-
straints:
1. Complete the floors in order so that the crew for each activity is shown
to move from one floor to the next, with the exception of pouring
which is described below.
2. Start by placing bottom reinforcing steel. Once adequately underway
with bottom steel, start mechanical and electrical rough-ins. Place the
top reinforcing mesh once the rough-ins are sufficiently advanced. When
complete aUow one day for inspection and pour preparation. The pour
completes the work on a given floor.
B. Lead/Lag constraints:
la. Mechanical rough-in can start once the bottom reinforcing is two days
underway.
lb. Mechanical rough-in can be completed no sooner than one day after
the bottom reinforcing.
2. Electrical rough-in can start three days after bottom reinforcing, yet
cannot be completed until two days after bottom reinforcing.
3. Top reinforcing mesh can start once mechanical and electrical rough-ins
are two days underway. Top mesh must be completed two days after
the completion of mechanical rough-in and cannot be completed until
the same day as electrical rough-in.
Time Estimates and Level of Detail 65
4. The pours can be overlapped as long as one day of pour has been com-
pleted on the previous floor.
C. Estimated durations for each floor.
1. Bottom reinforcing 5 days
2. Mechanical rough-in 10 days
3. Electrical rough-in 3 days
4. Top mesh 3 days
5. Delay for inspection 1 day
6 . Pour 2 days
Let us first prepare an arrow network of this problem, taking just the activi-
ties in the first slab. To illustrate the time relationships more clearly in this
case we first use a time-scaled format with a separate arrow for each activity.
To show the dependency relationships we add dummy arrows labeled to corre-
spond with the lead/lag constraints given in the problem. See Figure 3-11. The
fact that some of the dummy arrows must go backward against time reveals that
this time-scaled diagram is not feasible as shown and that several of the activities
will need t o be delayed (shifted to the right on the network).
Time 0 2 4 6 B 10 12 14 16
I I I I I I I I
-.
Bottom
reinforcing0
5
r
I I 1 ..
Mechanical
rough-in
10
( l a ) I (2a),
<
r
-
\
(2b)
k.
r
lib).-.
..- /
/
Electrical /
/ '
rough~in /
3
Top mesh
3
I Logic
1 im~lied
Inspection
1
I Logic
!implied
Pour
2
(4)
+/
To pour 2nd floor
Figure 3-11 First floor slab arrow diagram o n t i m e scale w i t h some arrows going backward
against time.
66 l l Basic Topics
Time 2 4 6 B 10 12 14 16 18
I I I I I I I I I
Bottom
reinforcing
5
-------- --
Mechanical
rough-in
10
I
Electrical
rough-in
-------
3
Top mesh
3
I
i
To 2nd floor pour
Figure 3-12 F i r s t f l o o r slab a r r o w diagram o n t i m e scale w i t h backward arrows eliminated.
reflecting correct early start schedule (14 real activities plus 11 dummies).
Now, let us draw a feasible arrow network, again on a time scale. Using the
methods described earlier in this chapter, we subdivide the activities as necessary
in order to properly represent the dependency relationships. The result is Figure
3-12. The backward arrows are eliminated and we have a correct early start
schedule. However, the activities have been subdivided to the extent that the
network has become somewhat complex and tedious to read. It contains 14 real
activities and 11 dummies.
Now, let us go back to the original problem statement and network it using
precedence diagramming. Figure 3-13 accomplishes the purpose with 5 activi-
ties and 9 dependency arrows. In this notational scheme the dependency arrows
are coded as follows:
SS = start-to-start constraint
FF = finish-to-finish constraint
FS = finish-to-start delay
The reader should analyze this network for consistency with the problem
statement and with the arrow diagram in Figure 3-12.
Clearly the precedence diagram is easier to read with respect to the activities
Time Estimates and Level of Detail 67
I Bottom I
Mechanical
I I
I
I
I I
rough-in
I
I
I
I
1 st floor
Figure 3-13 First floor slab precedence diagram. I5 real activities plus 9 dependencies)
conventional dependency artwork.
SUMMARY
Although the preparation of the network is only the first phase in applications
of critical path methods, many users have reported that the greatest benefits
from the critical path concepts are derived from this phase alone. They felt that
preparing the network caused them to think through the project in a more com-
plete manner than ever before, forcing them to do a more thorough job of ad-
vanced planning. However, a great deal of useful information is included in the
completed network, and the proper processing and utilization of this informa-
tion as described in the following chapters can bring important additional bene-
fits not only to the project manager but also to the subcontractors and all other
groups engaged in the project effort.
68 1 / Basic Topics
REFERENCES
1 . Davis, E. W., "CPM Use in the Top 400 Construction Firms," Journal o f the
Construction Division, ASCE, March 1974.
2. Seelig, W. D., and I. M. Rubin, "The Effects of PERT in R&D Organizations,"
published as a Working Paper of the Research Program on the Management of
Science and Technology, No. 23066, Alfred P. Sloan School of Industrial
Management, Massachusetts Institute of Technology, December 1966.
3. Crandall, Keith C., "Project Planning with Precedence Lead/Lag Factors,"
Project Management Quarterly, June 1973.
4. Mark, E. J., "How Critical Path Method Controls Piping Installation Progress,"
Heating, Piping, and Air Conditioning, September 1963, pp. 121-126.
EXERCISES
Figure 3-15
9. Discuss how the level of detail used in a network may be influenced by the
purpose and readership of the network. Consider the viewpoints of differ-
ent levels of management, such as: the project superintendent for a high-rise
office building; the president of a television manufacturing firm that is
about to introduce a new unit for the retail market; a subcontractor for
computer programming in a two-year project to develop a management in-
formation system for a major bank.
10. Figures 3-12 and 3-13 are networks of the f i s t slab of construction problem
defined by Crandall. Extend the network to include the second and thud
slabs, using (a) the arrow method and (b) procedence diagamming.
BASIC SCHEDULING
COMPUTATIONS
At this stage in the application of critical path methods, the project network
plan has been completed and the mean performance times have been estimated
for each activity. We now consider the questions of how long the project is ex-
pected to take and when each activity may be scheduled. Answers to these ques-
tions are inferred from the network logic and the estimated durations of the
individual activities. These estimates may be based on a single time value, as de-
scribed in Chapter 3, which is basically the original CPM procedure, or it may be
based on a system of three time estimates, as described in Chapter 9, which deals
with PERT, the statistical approach to project planning. Regardless of which
estimation procedure is used, the scheduling computations described in this
chapter are the same, since they deal only with the estimates of the mean activ-
ity duration time. Since network logic is the underlying basis of these computa-
tions, different procedures are required for arrow and precedence diagrams. It
will be seen that the more extensive nature of precedence diagramming logic
leads to a more involved computational procedure. An understanding of these
basic scheduling computations is essential to proper interpretation of computer
outputs, and also to enable one to carry them out by hand when the occasion
demands. Readers interested in a more rigorous algorithmic formulation of
these computational procedures, essential to writing computer programs, are re-
ferred to Appendix 4-1 at the end of this chapter.
A11 basic scheduling computations first involve a forward and then a backward
pass through the network. Bosed on a specified project start time, the --
-- forward
Basic SchedulingComputations 73
-
pass computations proceed sequentially from the beginning to the end of the
project giving the earliest (expected) start andfinish times for each activity, and,
for arrow diagrams, the earliest (ex~ected) occurrence time for each event. The
modifier "expected" is sometimes used to remind the reader that these are esti-
mated average occurrence times. The actual times, known only after the various
activities are completed, may differ from these expected times because of devia-
tions in the actual and esfimated activity performance times.
By the specification of the latest allowable occurrence time for the comple-
tion of the project, the backward pass computations also proceed sequentially
from the end to the beginning of the project. They give the latest allowable start
and finish times for each activity, and, for arrow diagrams, the latest aZIowabZe
occurrence time %each event. After the forward and backwak pass computa-
tions are completed, the float (or slack) can be computed for each activity, and
the critical and subcri?ical -~ujhenetwt-rk-dete~-%ed.
- As mentioned in Chapter 3, it is often appropriate to adopt one working day
as the unit of time, so that the network computations are made in working days,
beginning with zero as the starting time of the initial project event. The conver-
sion of these computational results t o calendar dates merely requires the modifi-
cation of a calendar wherein the working days are numbered consecutively from
a prescribed calendar date for the start of the project. This procedure is dis-
cussed further in Chapter 11. For convenience, this chapter will use elapsed
working days for discussion purposes; it should be understood, of course, that
other time units than working days may be used with no changes in the compu-
tation procedures. In addition, it is assumed at the start that the project begins
at time zero and has only one initial and terminal event. These assumptions will
be relaxed later in this chapter.
The basic scheduling computations are also termed "time-only" procedures
because resource limitations are not explicitly considered, unless of course, they
are built into the network logic. The effect of resource limitations on actual ac-
tivity schedules will be considered in Chapter 7 which deals with this specific
problem.
The following nomenclature will be used in the formulas and discussion which
describe the various scheduling computations; for brevity, the modifier "ex-
pected" has been omitted from all of these definitions of time and float. Also,
these definitions and subsequent formulas will be given in terms of an arbitrary
activity designed as (i - j), i.e., an activity with predecessor event i, and successor
event j.
Dij = estimate of the mean duration time for activity (i - j)
Ei= earliest occurrence time for event i
74 l l Basic Topics
To compute the earliest start andfinish times for each activity in the project, the
forcvmd pass computations are initiated by assigning an arbitrary earliest start
time to the (single) initial project event. A value of zero is usually used for this
start time since subsequent earliest times can then be interpreted as the project
duration up to the point in question. The computations then proceed by assum-
ing that each activity starts as soon as possible, i.e., as soon as all of its predeces-
sor activities are completed. These rules are summarized below.
R U LE 1 . The initial project event is assumed to occur at time zero. Letting the
initial event be denoted by I , this can be written as:
RULE 2 . All activities are assumed to start as soon as possible, that is, as soon as
all of their predecessor activities are completed. For an arbitrary activ-
ity (i - 3 this can be written as:
ESij = Maximum of EF's of activities immediately preceding activity
(i - j), i.e., all activities ending at node i
RULE 3. The early finish time of an activity is merely the sum of its early start
time and the estimated activity duration. For an arbitrary activity
(i - j)this can be written as:
EF.. = ES.. + D..
ll ll Y
The above rules are applied to the simple network shown in Figure 4-la. In
the forward pass section, Figure 4-lb, the initial project event 1 is placed at 0 on
the time scale according to the first rule. Starting with El = 0, the early start
time of activity 1-2 is 0, and the early finish time by Rule 3 is merely
Basic Scheduling computations 75
The early start and finish times of activities 2-3,3-5,2-4,and 4-5 are determined
similarly, in that order. Proper sequencing of the activities so that the EF's of
all predecessor activities will be available when computing ES's of any follower
activity (use of Rule 2) is easily handled in hand computation on networks by
working along each path as far as possible, and then "back tracking" t o a new
76 l l Basic Topics
path that is then ready for computation. Special procedures required for tabular
computations, or the development of computer algorithms is taken up in Ap-
pendix 4-1.
The crux of the forward uass computations occurs at the merge event 5,
where it is necessary t o consider the early finish times for predecessor activities
3-5 and 4-5 to determine the early start time for activity 5-6, i.e.,
ES,,, =Maximum of (EF,,, = 9 and EF,,, = 7)= 9
Finally, the early finish time of the final network activity is
Thus, the early expected finish time for the entire project, corresponding t o
the earliest occurrence time of the project terminal event 6, is denoted by E, =
EF,,, = 12.
The forward pass network in Figure 4-lb has been drawn to scale on a time
base, not only as a convenient means of showing the earliest start and finish
times for each activity, but also to show the longest path through the network.
This graphical procedure is introduced here for illustrative purposes, but is not
practical for routine hand application. In Figure 4-lb, activities 1-2-3-5-6form
the longest path of 2 t 4 t 3 + 3 = 12 days duration. The path consisting of ac-
tivities 2-4-5 has two days of total path float, as will be discussed below; this
path float is indicated by the dashed portion of the activity 4-5 arrow.
The purpose of the backward pass is to compute the latest allowable start and
finish times for each activity. These conputations are precisely a "mirror image"
of the forward pass computations. First, the term "latest allowable" is used in
the sense that the project terminal event must occur on or before some arbi-
trarily scheduled time, which will be denoted by Ts. Thus, the backward pass
computations are initiated by specifying a value for Ts. If no scheduled date for
the completion of the project is specified, then the convention of setting the
latest allowable time for the terminal event equal to its earliest time, determined
in the forward pass computation, is usually followed, i.e., L = E for the termi-
nal event of the project. This was followed in the initial development of CPM,
and will henceforth be referred to as t h e m k convention, o ~ e r o - f r o a ?
convention.
One result of using this convention is that the float along the critical path(s) is
zero, while the float along all other paths is positive. When an arbitrary sched-
uled date is used for the project terminal event, the float along the critical path
may be positive, zero, or negative, depending on whether Ts is greater than,
equal to, or less than, respectively, the earliest occurrence time for the terminal
Basic Scheduling Computations 77
event. The zero-float convention has an additional useful property in that the
Intest allowable activity finish timegives the time to which the completion of an
activity can be delayed without directly causing any increase in the total time to
complete the project.
The zero-float convention is adopted in the illustrative example shown in Fig-
ure 4-lc, where the terminal event 6 is placed at time 12, i.e.,L, = E 6 = 12. The
latest allowable finish time for activities other than the final activity(s) are then
determined from network logic, which dictates that an activity must be com-
pleted before its successor activities are started. Thus, the latest allowable fmish
time for an activity is the smallest, or earliest, of the latest allowable start times
of its successor activities. Finally, the latest allowable start time for an activity
is merely its latest allowable finish time minus its duration time. These rules are
summarized below.
RULE 1. The latest allowable fmish time for the project terminal event ( t )is set
equal t o either an arbitrary scheduled completion time for the project,
Ts, or else equal t o its earliest occurrence time computed in the for-
ward pass computations.
RULE 2. The latest allowable finish time for an arbitrary activity (i - j ) is equal
to the smallest, or earliest, of the latest allowable start times of its suc-
cessor activities.
LFij = Minimum of LS's of activities directly following
activity (i - 12
RULE 3. The latest allowable start time for an arbitrary activity (i - 12 is merely
its latest allowable finish time minus the estimated activity duration
time.
LSij = LFij - Dii
These rules are applied in Figure 4-lc labeled Backward Pass. Statiig with
the final project event 6, we see that according to the zero-float convention, it is
placed at time 12 which is the earliest time for event 6 computed in the forward
pass calculations.
We next compute the latest allowable start time of activity 5-6 by applying
rule 3,i.e.,LS5,, =LF,,, - D,,, = 1 2 - 3 = 9 . Thecruxofbackwardpasscom-
putations occurs at the burst event 2. Here, the computation of the latest allow-
able finish time of activity 1-2 requires consideration of its two successor activi-
78 1 I Basic Topics
Among the many types of float defmed in the literature, two are of most value
and are stressed in this text; they are called total path float, or simply path float,
and activity free float, or simply activity float. Path float and activity float are
also referred to by some authors as total slack and free slack, their definitions
being identical to those given below.
Definition:
&h float, as the name implies, is the totalfloat associated with a path. For
a particular path activity, say ij, it is equal t o the difference between its earliest
and latest allowable start or finish times. Thus, for activity (i - j), the path float
is given by
Assume the zero-float convention is followed, i.e., let L t = E t for the terminal
event. Then the path float denotes the amount of time (number of working
days) by which the actual completion time of an activity on the path in question
can exceed its earliest completion time without affecting the earliest start or
occurrence time of any activity or event on the network critical path. This is
equivalent t o not causing any delay in the completion of the project. For exam-
ple, in Figure 4-lc the path float for activities 2-4 and 4-5 is two days. Thus, the
slack path (2-4-5) is two days away from becoming critical. Now, suppose activ-
ity 2-4 "slips" by starting a day late or taking a day longer to complete than
originally estimated. The result is that its completion time occurs at the end of
the fifth day instead of the fourth day, and the path float for the remainder of
this slack path is thereby reduced by one day. That is, the path float for activity
4-5 is reduced from two to one day. But note that this slippage does not effect
the earliest times for any critical path activity or event. Also note that if the
total slippage along the slack path 2-4-5 exceeds its path float of two days,
Basic Scheduling Computations 79
then the critical path is affected, and the duration of the project is increased
accordingly.
There is a subtle difference in the interpretation ofpathfloat when the zero-
float convention of letting L , = E, for the terminal event is not followed. Con-
sider Figure 4-ld where E , = 12 but L , = Ts= 14. Here, activity 2-4 has a path
float of four days; it can slip up t o this amount without causing the project com-
pletion to exceed its scheduled time of 14 days. However, a slippage of four
days will cause the early start time of the critical path event 5 to slip by two
days, and hence delay the completion of the project, but only up to its sched-
uled completion time of 14.
Merge point activities that are the last activity on a slack path (activity 4-5 in
Fig. 4-1) have what is called activity float, sometimes called free float. The
name follows from the fact that the specific activity is free to use this float with-
out effecting any other activity times in the network. This float concept is not
widely used, but it will be defined below and discussed briefly.
Definition:
Activity float is equal t o the amount of time that the activity completion time
can be delayed without affecting - the
.- earliest start or occurrence time of any
other activity or event in the network.
-
In a sense, activity float is "owned" by an individual activity, whereas path or
total float is shared by an activities along a slack path,
Again consider the slack path 2-4-5 in Figure 4-1, and assume the zero-float
convention is used. The last activity on this path, 4-5, has both apath float and
an activity g o a t of two days. If it slips by an amount of up t o two days, no
other network activity or event times are affected. However, this is not true for
activity 2-4 which has no activity flont. Here, any slippage is immediately re-
flected in a corresponding delay in the early start time of its successor activity,
4-5. Thus, when we say that activity 4-5 has an activity float and a path float of
two days, we are assuming that its predecessor will be completed by its emly
finish time.
80 1 1 Basic Topics
Now that the concept of float has been described, the critical path through a
network will be formally defined as follows.
Definition:
The critical path is the one with the least path float. If the zero-float conven-
tion o f letting Lt = E, for the terminal network event is followed, the critical
path will have zero float; otherwise, the float on the critical path may be positive
or negative. If the network has single initial and teminal events and no sched-
uled times are imposed on intermediate network events, then the critical path is
also the longest path through the network.
For the network in Figure 4-lc, the critical path, the one with least path float,
is 1-2-3-5-6. It is also the longest path through the network in this case. Its du-
ration is equal to 12 days, and it has zero path float since the convention of let-
ting L6 = E, = 12 was followed.
To illustrate the case where the zero float convention is not followed, it has
been assumed in Figure 4-ld that the scheduled completion time of the project
is 14 working days, i.e., L6 = Ts = 14. In this case, we see that the critical path
remains the same, i.e., 1-2-3-5-6, since it is still the path with least path float.
However, the float along the critical path is now positive, that is, two days, while
the float along the slack path 2-4-5 is now four days. In this case, a slippage up
to two days along the critical path will cause the critical path events t o slip a
corresponding amount. However, the critical path activities will not slip beyond
their latest allowable start and finish times, and in particular, the project end
event 6 will not slip past its scheduled completion time of Ts= 14 days.
For Figure 4-lc, the activities on the slack path (2-4-5) have the float values
shown in Table 4-1. The interpretation follows from the name. Activity 2-4 has
both path and interfering float of two days; if it uses its float, it "interferes," by
this amount, with the early times for the down path activity, 4-5. However, ac-
tivity 4-5 has no interfering float, but rather it has both path float and activity
(free) float of two days (assuming, of course, that activity 2-4 is completed at its
early finish time). Activity 4-5 can use itsactivity float of two days without "in-
terfering" withany other activity or event times in the network. .
Basic Scheduling Computations 81
Float Type
2-4 2 0 2
4-5 2 2 0
Battersby also defines independent float, which occurs only rarely in typical
networks. It is the amount of float which an activity will always possess no mat-
ter how early or late it or its predecessors and successors are. It is found by as-
suming a worst case situation. That is, all predecessors end as late as possible
and successors start as early as possible. If this time interval exceeds the dura-
tion of the activity in question, the excess is called independent float. It is illus-
trated in Figure 4-2, where it can be seen that activity 2-4 has an independent
la)
0 2 4 6 8 10
(c)
The interpretation is that it has this float "independent" of any slippage of pre-
decessor activity 1-2, and any allowable start time of successor activity 4-5. In
contrast to this, activity 4-5 in Table 4-1, has no independent float and hence
its float of 2 days is not "independent" of any slippage of its predecessor activ-
ity 2-4.
Critical path computer packages always list path (or total) float for each activ-
ity, they occasionally list activity (or free) float, and t o the best of our knowl-
edge, they never listany other forms of float. That is not to say that they have
no utility, e.g., in tasks such as resource scheduling, or computerized bar chart-
ing. However, these other forms of float are currently judged t o be very margi-
nal, and are not utilized in this text.
Although there are a number of obvious advantages to having the network drawn
t o scale on a time base as shown in Figure 4-1,the disadvantages of doing this by
hand, notably the inflexibility to incorporating network changes, preclude the
general use of this procedure. It has been found best in practice not to attach
any special significance to the length of the network arrows, but rather to de-
note the various activity and event times of interest by numerical entries placed
directly on the network. As an aid to making the scheduling computations
which give these numerical entries, and to display them in an orderly fashion so
that they can be easily interpreted, the authors have developed a system incor-
porating special symbol^.^ These symbols provide spaces on arrows and in event
nodes for recording computed times. The spaces are located logically to bring
activity earliest finish (and latest allowable start) times close together and thereby
facilitate the computation of earliest expected (and latest allowable) event times.
These symbols are used throughout this text t o make it easier for the reader to
follow. In practice, however, the authors omit the enclosures for LSij, Fii,and
E h , shown in Figure 4-3a; these numbers are merely written above a single line
activity arrow in the appropriate position.
The event identification number is placed in the upper quadrant of the node,
as shown in Figure 4-3a. The earliest event occurrence time, Ei, which is equal
to the earliest start time (ESli) for activity i - j, is placed in the left hand quad-
rant of event i. The latest allowable event occurrence time, Li, which is equal to
the latest allowable finish time (LFii) of activity i - j , is placed in the right hand
quadrant of event j. The lower quadrant might be used later to note actual event
occurrence times if desired. For each activity, the earliest time the activity is ex-
pected to be finished, EF, is placed in the arrow head and the latest allowable
Basic Scheduling Computations 83
Total float
Pp9
Free float
i
?!$ L$ 6, ECi
0, F"
'i
start time, LS, in the arrow tail. The estimated duration of the activity along
with a description of the activity is placed along the arrow staff. Path float is
placed in the bubble along the arrow staff. The lower portion of Figure 4-3a
points out how one reads the earliest and latest allowable start and finish times
for an activity. The detailed steps involved in carrying out the scheduling corn-
putations using these symbols is illustrated in Figures 4-3b and 4-4.
Begin with zero for the earllex srart time for the initial project evernand complte
, -
earlien finish timer for all succeeding sctlvitier For a typical activity, plme i t s Whereactivities merge, inrert in the l e f l quadrant
earliesrxan time imq. 23 days from project n a n l in the left quadrant of theevent Of the went SYmbOi rhe l a m * of the earlien finish
Flmbol. T k n add it%duration 171 t o theesriiest starttime to obmin ilr earlim timer written in the arrowhwd$of the merging
finish r i m 1301. Write 30 in rhe arrow head. mt~viTies.
Backward pass
Place the scheduled complerion time for the final went in the right quadrsnt of the y
P'OIB(I ler~u~rtal
Nenl spin bur olner wmm. Insert i.3e.d The atell allc*aole fine,, fvrv or r "bllm" fmm an n m t .
a ~ ~ 1nrr
N C W occ-rrence t me For a t)p cal rctrr I ) . r o n a L t onr al~ra!mor(I1 from ~ h r
r n t n in the r ght q~a6ranrof tlw event symbol the
lrrerr a,mn w o t ~~ n 1351
r 10 1 nta n the aten s lo*aole acts t i *an 1 n e ,281.
.ma1 ert of b t m a. ovablr act r i w rton limes
W'r In 28 n me a m w m
Figure 4-3b Steps in scheduling computations using special activity and event symbols.
84 l 1 Basic Topics
F.28- 23 = 5 = 35 - 30
A C T I V I T Y (FREE1 FLOAT
Figure 4-4 Steps in path float and activiw float computations using special activity and
event symbols.
Figure 4-5 Illustrative network employing the special activity and event symbols showing
f o r w r d pass computations only.
Basic Scheduling Computations 85
computations have been added. With a little practice, the computations made
on this network can be completed in two to three minutes. With an allowance
for an independent check on these computations, the total time is still less than
that required to fill out the input forms required to run this problem on a com-
puter. This holds true for networks of any size. The computer is only economi-
cal when the network is to be updated periodically, or when a variety of other
computations is requested.
In Figure 4-6, the earliest and latest allowable activity start and fiiish times
are clearly displayed to aid in the making of resource allocation checks, the de-
termination of activity schedules, the conducting of time-cost trade-off studies,
etc. For example, consider activity 2-5. Its earliest start and finish times are
readily observed to be 6 and 7, respectively, and its latest allowable start and fi-
ish times are 11 and 12, respectively. The path float is F 2 , = LF,, - EF,, =
12 - 7 = 5 days, while the activity float is only AF,, = E, - EF2, = 11 - 7 = 4
days. This activity illustrates quite well the basic difference between path float
and activity float, the latter occurring only at the end of a slack path, i.e., at a
merge event. If the completion of activity 2-5 is delayed up t o 4 days, the
amount of its activity float, no other activity or event time in the network will
be affected. In particular, the earliest expected time for event 5 remains at 11.
If the completion of this activity is delayed by an amount exceeding its activity
float, but not exceeding its path float, then the earliest expected time for event
5 and the early start time for the following activity 5-8 will be increased. How-
ever, no critical path activities or events, such as event 8, will be affected. Fi-
nally, if the completion of activity 2-5 is delayed by an amount which exceeds
Figure 4-6 Illustrative network employing the special activity and event symbols showing
completed computations.
86 l 1 Basic Topics
its path float of 5 days, then the project completion time, i.e., the earliest ex-
pected time for event 8, will be increased by a like amount.
According to the previous definition of the critical path, it is made up of ac-
tivities 0-3-7-8 in the illustrative network shown in Figure 4-6. It has the least
amount of path float, which is zero in this case, because the convention of let-
ting L8 = E8 = 15 was followed. This is also the longest path through the net-
work. In addition to determining the critical path through the network, we can
identify various subcritical paths which have varying degrees of path float and
hence depart from criticality by varying amounts. These subcritical paths can be
found in the following way, which is suggestive of how a computer would handle
this problem.
1. Sort the activities in the network by their path float, placing those activi-
ties with a common path float in the same group.
2. Order the activities within a group by early start time.
3. Order the groups according to the magnitude of their path float, small val-
ues first.
The first group comprises the critical path(s) and subsequent groups
comprise subcritical paths of decreasing criticality.
Application of the above procedure to the network in Figure 4-6 gives the re-
sults shown in Table 4-2 below.
Earliest Latest
03 0 2 0 2 0
3-7 2 10 2 10 0 critical path
7-8 10 15 10 15 0
3-4 2 7 3 8 1
4-5 7 11 8 12 1 a "near critical" path
5-8 11 14 12 15 1
0-1 0 2 5 7 5
1-2 2 6 7 11 5 third most critical path
2-5 6 7 11 12 5
06 0 1 6 7
path having most float
6-7 1 4 7 10
CRITICAL PATH FROM FORWARD PASS ONLY
The above procedure for locating the critical path(s) is based on a knowledge of
path float, which requires the backward pass for computation. While this pro-
cedure is necessary to find the slack along subcritical paths, the critical path(@
can be determined from the results of the forward pass only. This is quite useful
in the early stages of planning and scheduling a project, when it is desired to de-
termine the expected project duration, and to determine the critical path activi-
ties with a minimum of computation. The following steps which make up this
procedure are based on the assumption that the forward pass computations have
been completed, and the resulting EF's and E's have been recorded on the
network.
1. Start with the project final event, which is critical by definition, and pro-
ceed backwards through the network.
2. Whenever a merge event is encountered, the critical path(s) follows the ac-
tivity(~)for which EF = E.
To illustrate this procedure, let us trace the critical path of the network
shown in Figure 4-5, on which only the forward pass computations have been
made. First we start at event 8 for which E = 15. The critical path is then along
activity 7-8 since E F = E = 15 for this activity, while EF is only 14 along the
other path, activity 5-8. In this manner, the critical path can be traced next to
event 3, and hence to the initial network event 0.
1. The network contained only one initial event, i.e., one event with no pre-
decessor activities.
2. The network contained only one terminal event, i.e., one event with no
successor activities.
3. The earliest expected time, E, for the initial event was zero.
4. There were no scheduled or directed dates for events other than the net-
work terminal event.
These assumptions were made because they simplify the computational pro-
cedure and its subsequent interpretation, and at the same time they do not se-
riously restrict the usefulness of the procedure. However, occasions will be
pointed out where it would be of some value to relax these assumptions; hence,
88 I I Basic Topics
Conventions:
A scheduled time, Ts, for an initial project event is interpreted as its earliest
expected time, i.e., Ts = E for initial project events.
A scheduled time, Ts,for an intermediate (or terminal) project event is in-
terpreted as its latest allowable occurrence time.
To illustrate how projects with multiple initial and terminal events and sched-
uled event times are handled, consider the network shown in Figure 4-7. The
"main" project in this network has events numbered 101 through 109. This
project, which starts with event 101, produces an "end" objective signified by
event 109. However, a by-product of this project is that it furnishes an output
for a second project whose events are numbered in the 200 series. For example,
the objective of the main project might be to develop a new rocket engine, the
completion of which is denoted by event 109. Event 210 mtght signify the de-
livery of a key component from a second project that has other end objectives.
Activity 108-211 might be the preparation and delivery of a report on the test-
ing of this component which took place in the main project. The scheduled
occurrence time of event 21 1 is thus quite important t o the second project, and
is independent of the main project.
Two events from the second project are pertinent to the main project network
shown in Figure 4-7. First, event 210, which initiates an activity preceding event
106, is scheduled to occur 8 units of time after the start of the first project.
Hence, if one sets E = 0 for event 101, then E = 8 for event 210, since the latter
Basic Scheduling Computations 89
Figure 4-7 Network with multiple initial and end events and scheduled event times.
is one of the initial events in the network. Event 211 of the second project is
scheduled to occur 14 units of time after the start of the first project. Hence,
since event 21 1 is a terminal event in this network, one sets Ts = L = 14 for
event 211. Finally, the main project is scheduled to be completed in 20 time
units, thus Ts = L = 20 for event 109. Thus, the network computations are
started with the following times specified.
Event 101: E=O
Event 109: L =Ts=20
Event 210: E = Ts = 8
Event211: L = T s = 14
Since early start times are now specified for both of the initial events in this
network, the forward pass computations can be carried out in the conventional
manner. These computations indicate that the early finish time for the final
event of the main project is 18, i.e., E = 18 for event 109. The early finish time
for the secondary project is 15, i.e., E = 15 for event 211. Thus, the schedule
can be met on the main project but not on the secondary project, unless the lat-
ter is expedited in some way.
Since all terminal events have scheduled completion times, the backward pass
computations are initiated by setting L = 20 for event 109, and L = 14 for event
211. The critical and subcritical paths through the network can then be deter-
mined as given in Table 4-3.
The critical (least float) path through the network has a path float of - 1. One
90 I I Basic Topica
210-106 -1 103-104 1
106-108 -1 104-109 1
108-211 -1
106-109 2
101-102 0
102-103 0 102-107 3
1 W-105 0 107-108 3
thus expects t o be one unit of time late in meeting the scheduled time of 14 for
event 211, the termination of the secondary project. With regard to the main
project, one notes that all paths leading to the terminal event 109 have path
float of at least one time unit.
Multiproject networks can be quite useful in analyzing the effects of one proj-
ect on another, and thus offer a means of settling disputes which frequently arise
in such a situation. For example, it is clear from Figure 4-7 that one way of
alleviating the negative slack situation on the critical path would be to move up
the schedule for event 210 so that it occurs on or before the late start time of 7
for activity 210-106. In this way the secondary project could help in solving its
own scheduling problem. If this could not be done, then the only remaining
remedies would be to reduce the duration of either activity 210-106 or 108-211
by one or more time units. It is also clear from Figure 4-7 that the current
schedule for event 210, i.e., Ts = 8, does not produce the most constraining path
to event 109, and hence does not fuc the earliest completion time of the main
project.
Another method of handling multiple initial and end events is taken up in
exercise 4 at the end of this chapter. This procedure is illustrated in Figure 3-16
where trt-o essentially separate projects are tied together by activity 40-80, which
has a time estimate of 40 days. In essence, this activity constrains the comple-
tion of one project to precede the other by 40 days. Thus, a scheduled date
placed on event 80 in one project can force a scheduled date, or latest allowable
time, 40 days earlier on event 40 of the second project. This procedure elimi-
nates the second terminal event.
case, however, there will be two candidates for the latest allowable time f o r t
event in question. The choice is usually governed by the foflowingconven
91
however, other conventions may be adopted in certain project management
puter packages.
The latest allowable time for an intermediate network event on which a sche
uled time, T s , is imposed, is taken as the earlier (smaller) of the scheduled
Ts, and the latest allowable time, L , computed in the backward pass.
For example, suppose activity 103-105 in Figure 4-7, which involves eart
moving, was scheduled to be completed by time 7 to insure completion prio
the ground freezing. In this case, L for event 105 would be taken as 7, i.e.,
smaller of the scheduled time of 7 and the regular backward pass time of 9.
introduction of this scheduled time only affects the path float for activities 10
102-103-105 by reducing it from 0 t o -2, a change which is quite important
planning and scheduling these activities. Since this now becomes the path wi
the least float, it forms the new project critical path. While it starts at the initi
project event, it terminates at the intermediate event 105 on which the sched
uled time was imposed, without going through the entire project. This is a cha
acteristic result of introducing scheduled or directed times on intennediat
events; the computations clearly show up the most constraining scheduled datek
in the project.
I
NETWORK TIME-STATUS UPDATING PROCEDURE
Table 4-4. Status of Project Activities at the End of the Fifth Working Day
NOTE: all times given are at the end ol the stated working day.
been so noted by a flag marked 5 to denote that the time of the update is the
end of the fifth working day. Only one of the four paths being worked presents
a problem, i.e., activity 3-4. At report time, event 3 has occurred, but activity
3-4 has evidently not started. To avoid this problem, it would be desirable to in-
clude in progress reports the intended start time of all activities whose predeces-
sor activities have been completed. If this information is not given, then some
assumption must be made to complete the update calculations. The usual as-
sumption, which is the one adopted in Figure 4-8, is that the activity will start
on the next working day, i.e., at the end of the fifth working day.
Having an actual, or assumed, start time for the "lead" activities on each path
in the network, the forward pass calculations are then carried out in the usual
manner. The original times are crossed out, with the new updated times written
P
OeMfeS IlatYV 0f
acflvity at the end
of the 5th work day
nearby. These calculations indicate that the critical path has shifted t o act
3-4-5-8, with a slack of minus two days. Assuming we were scheduled t
I
3
plete the project in 15 days, the current status indicates we are now two d
hind schedule, and appropriate corrective steps are in order.
An alternative updating procedure is as follows; it has the advantage
can be carried out by a computer program that has no special updating
ity. First, add a dummy activity preceding the initial project event, and ass
to it a duration value equal to "time now," that is, the number of elapsed wo
ing time units from the beginning of the project to the time of the pr
date. Second, change the duration times of activities that are complete
tially completed, to the number of time units of work remaining. N
the forward pass calculations in the conventional manner. It will pr
same results obtained by the method illustrated in Figure 4-8 above.
Key
PRECEDENCE DIAGRAMMING
Definitions:
ss,,
Start-to-start constraint Finish-to-finishconstraint
I
Finish-toltart constraint
Figure 4-10
SF..I, =SF.'I +SF."
8,
Startto-finish constraint
dence diagramming. It will also point up an important anomaly that can occur,
and needs an explanation.
0 4 8 12 16 20 24 28 32 Time (days)
(a1 ~equentiaiarrowdiagram I
Time (days)
Figure 4-11 Arrow and precedence networks t o illustrate splitting vs. n o splitting; activi.
ties are shown a t their early start times.
98 l l Basic Topics
11 = 4 day?, of float, which is also depicted by activity 7-9 in Figure 4-1 le. The
middle electrical activity (5-6) in Figure 4-1 l e a p p e m to have an additional path
float of 4 days, or a total of 8 days. This attribute is not shown at all in Figure
4-1 1d because it depicts only the beginning and end points of each activity, but
not intermediate subactivities such as 5-6. Closer examination will show, how-
ever, that any delay in the start of activity 5-6 exceeding 3 days would cause the
finishing crew to run out of work, and hence the critical path would be delayed.
This problem is shared by both arrow and precedence diagrams, and the user
should understand this. It does not, however, present a real problem in the ap-
plications since the job foreman generally has no difficulty in the day-to-day
management of this type of interrelationship among concurrent activities. It is
generally felt that it is not worthwhile t o further complicate the networking and
the computational scheme to show all interdependencies among activity seg-
ments, since these tasks can be routinely managed in the field.
A very important difference between Figures 4-1 1c and e, other than the 4
day difference in the project durations, lies in the electrical task, which is repre-
sented by 3 subactivities in both diagrams. In Figure 4-1 1c these 3 subactivities
are expected to be conducted without interruption. However, in Figure 4-1l e
this is not possible. Here, the last day of the electrical task (6-7) must follow a
4 day interruption because of the combination effect of successor constraint SS1
depicted by activity 5-8, and predecessor constraint FF1 depicted by activity
3-6. These constraints require events 5 and 6 to be separated 7 days in time,
while the intewening electrical activity requires only 3 days to perform. This
forced interruption will henceforth be referred to as splitting of the electrical
task.
If necessary, splitting can be avoided in several ways. First, the duration of
the electrical task could be increased from 5 to 9 days. But this is frequently
not desirable in projects such as maintenance or construction because it would
decrease productivity. The second way to avoid splitting would be to delay the
start of the electrical task for 4 days, as shown in Figure 4-1 lg, where it is as-
sumed that activity splitting is not allowed. At fist, it may seem that there is no
difference between these two alternatives, but this is not so. Reflection on Fig-
ure 4-1 lg shows that delaying the start of the electrical task to avoid splitting
will delay the start of the finish work, and hence the completion of the project is
delayed by 4 days. But increasing the duration of the electrical task will not
have this effect. Actually, we have described an anomalous situation where an
increase of 4 days in the duration of an activity on the critical path (starting 4
days earlier and thus running 4 days longer), will decrease the duration of the
project by 4 days, from 22 to 18. If you are used to dealing with basic arrow
diagram logic (FS= 0 logic only), this anomaly will take some getting used to.
It results from the fact that the critical path in Figure 4-1 1g goes "backwards"
through activity 56,and thus subtracts from the total duration of this path. As
Barie Schaduling Computations
a result, the project duration shifts in the reverse direction of a shift in the
b
I
tion of such an activity. That is, the project duration decreases when the
ity duration increases, and increases when the activity duration decreases.
anomalous situation occurs whenever the critical path enters the
an activity through a finish type of constraint
through the activity, and leaves through a
The precedence diagram in Figure 4-1
cal, since ES = LS and E F = L F for each task. While it
task has float in Figure 4-1 lg, this is not true since splitting is not allowed.~b -
splitting is a constraint not explicitly incorporated in the arrow diagram logic. 1
Critical Path Characteristics
iI
Wiests describes the anomalous behavior of activity 5-6 in Figure 4-1 1g pict
esquely by stating that this activity is reverse critical. Similarly, in Figure 4-1 d
and e both framing and electrical are called neutral critical. They are critical b -
cause their LS = ES, but they are called neutral because their LF >EF, and t e
project duration is independent of the task duration. A task is neutral critic
when a pair of start time constraints result in the critical path entering and exi -
ing from the starting point of the task, or apair of finish time constraints entkr
and exit from the finish point of a task. These situations could also be referre
to as start or finish critical. In Figure 4-1 Id and e, the framing and electric
tasks are both start critical, while finishing is normal critical. That is, a shift i
the duration of the finishing task will have a normal effect on the project dur -
tion, causing it to shift in the same direction. Wiest suggests that precedenc(e
diagram computer outputs would be more useful if they identified the way i/l
1
t
I
which tasks are critical. The author suggests that the following nomenclature
considered for this purpose:
To conclude this discussion, it should be noted that the critical path always
starts with a job (or a job start), it ends with a job (or a job finish), and in be-
tween it consists of an alternating sequence of jobs and precedence arrows. Al-
though the critical path may pass through a job in any one of the many ways
listed above, it always moves fonvard through precedence constraint arrows.
Hence, any increase (decrease) in the lead-lag times associated with SS, SF, FF,
or FS constraints on the critical path, will always result in a corresponding in-
crease (decrease) in the project duration.
Following the suggestion of stating the nature of the criticality of activities on
the critical path, for Figure 4-1 Id this would consist of the following alternating
activities and precedence constraints: Framing (Start CriticalSC); SS2; electri-
cal (Start Critical-SC); SSl; finishing (Normal Critical-NC). Similarly, for Fig-
ure 4-1 1f it would be: Framing (NC); FFl; electrical (RC); SSl; finishing (NC).
It should be noted here that electrical is labeled reverse critical (RC), which puts
the manager on notice that any shift in the duration of this activity will shift the
duration of the project in the reverse direction. As stated above, it is reverse
critical because its predecessor constraint is a finish type (FFI), and its successor
constraint is a start type (SSl).
Obviously the forward and backward pass computational problem becomes more
complex with precedence diagramming, and it calls for establishment of some-
what arbitrary ground rules that were unnecessary with the unique nature of
basic arrow diagram logic. In the computational procedures to follow, we will
assume that the specified activity durations are fixed, e.g., because of the pro-
ductivity argument cited above. This assumption can be relaxed, of course, by
varying the activity durations of interest, and repeating the calculations. Regard-
ing task splitting, three basic cases will be treated.
Figures 4-1 l g and e represent Cases 1 and 2, respectively. The effect of not
allowing splitting (of the electrical task) is a 4 day increase in the project dura-
Basic Scheduling Computations 101
tion. Here, the choice must be made between the (extra) cost of splitting {he
electrical task, and the cost of a 4 day increase in project duration. Case is 4
provided to allow the project manager to take the possible time (project duratidn)
advantage concomitant with splitting on those activities where it can be tojer-
ated, and to avoid splitting on those activities where it cannot be accommodated.
The computational procedure for Case 1 is reasonably simple and will be e-
scribed below. The procedure for Case 2 is considerably more complex; i is 1
given in Appendix 4-2. The computational procedure for Case 3 merely amou ts
1
to the application of the Case 1 or the Case 2 procedure to each activity in tu n,
depending on whether the activity is designated as one where splitting is ot
allowed, or is allowed, respectively. 1
Computational Assumptions
0 12 FF5 7 19 19 28 FF7
Critical
FS 7
Key:
- 28 39 35 42
ES EF
constraint
'22 3, 5 55 3 FF 5
durations
LS LF
Figure 4-12 Example network with forward and backward pass times shown, and the nota-
tion of the critical path-no splitting allowed.
activity will always be found below it in the ordered list. The two step computa-
tional procedure is then applied to each activity working the list from the top
down. When the computations are performed by hand on a network, this order-
ing is accomplished automatically by working one path after another, each time
going as far as possible. Again, this is the same procedure required t o process an
arrow diagram.
The following two steps are applied to each project activity, in topological se-
quence. The term called INITIAL TIME is set equal to zero, or to an arbitrarily
specified project scheduled start time.
Basic Scheduling Computations 1q3
I
STEP 1 . Compute ESi, the early start time of the activity (19 in question. t
is the maximum (latest) of the set of start times which includes t e
INITIAL TIME, and one start time computed from each constra' t
going to the activity (13 from predecessor activities indexed by (i).
INITIAL TIME
1 ~+sSQ~- D~J
STEP 2. EFi = ESi + Dj
The following two steps are applied to each project activity in the reverse ord
~
of the forward pass computations. The term called TERMINAL TIME is s
equal to the project duration, or to an arbitrarily specified project
completion time.
STEP 1. Compute LFi the late finish time of the activity (i) in question. It
the minimum (earliest) of the set of finish times which includes
TERMINAL TIME, and one finish time computed from each
straint going from activity (i), to successor activities indexed by
LS' - FS$
all i
LSi - SSrj + Di
LFj - SFij + D l
Activity A
ESA = (INITIAL TIME = 0) = 0
EF,=ESA+DA=0+12=12
Activity B
i
INITIAL TIME = 0
ESB=MAX E S A + S S A B = 0 + 3 = 3
A
EFA +FFAB
-DB=12+5- 10x7
EFB=ESB+ D B = 7 +l o = 17
Activity D
INITIAL TIME = 0
ESD = MAX 1.7
ESB+SFBD-DD=7+(2+10)12=7
Activity C
i
INITIAL TIME = 0
ESc=MAX E S A + S S A c = 0 + 3 = 3
A, D
ESD +SFDc - D c = 7 + ( 7 + 14)-
EFc=ESc + D c = 10+ 1 8 ~ 2 8
etc.
The backward pass calculations are as follows, wherein the TERMINAL TIME
is set equal to the project duration, determined from the forward pass calcula-
tions to be 42, i.e., the E F time for the last critical path activity G.
Activity G
LFG = {TERMINAL T I ME = 42) = 42
LSG=LFG-DG=42- 10=32
Activity I
LFI = {TERMINAL TIME = 42) = 42
LSI=LFI - D 1 = 4 2 - 7 = 3 5
Basic Scheduling Computations
'P"
Activity H
i
Activity F
LFF=MIN
G ,I
L S F = L F F - D F = 3 5 -1 1 = 2 4
etc. I
From the computational results shown in Figure 4-12, the critical path co -
i
sists of activities A-B-D-E-F-G. The nature of the criticality of each activity is
indicated at the top of Figure 4-12, along with the critical constraints betwe n
each pair of activities. Activities A, E, and G are normal critical, activities B a d
F are rwerse critical (noted by the reverse direction cross-hatching), and activi y
D is only finish time critical. The duration of the critical path, 42, is also note ,
with the net contributions of the activity durations being (12 - 10 + 0 + 9 -
11 + 10) = 10 and the contributions of the constraints being (5 + 12 + 0 + 7 +
8) = 32, for a total of 42 time units. The earlyllate startlfinish times for each c-
tivity have the conventional interpretations. For example, for the critical acthr-
1
ity E, both the early andlate startlfinish times are 19 and 28; the activity has o
slack. But for activity H, the early startlfinish times are 24 and 35, while t e
late startlfinish times are 28 and 39. In this case, the activity has 4 units of -
tivity slack or free slack, because the completion of activity H can be delayed p
to 4 units without affecting the slack on its successor activity I.
To illustrate the use of computers for these computations, the complet d
basic schedding computations for this network are shown in Figure 4-13, usi g
a program written by K. C. Crandall. The upper portion of this figure giv s
times in elapsed working days, while the lower portion is given in calendar dat .
The latter assumes that start times denote the beginning of the day, and fin' h
times the end of the day. For example, activity A has a duration of 12
corresponding to an early start date of 3 August and an early finish date
August. This computer run assumes, of course, a 7 day work week. The
information is very conveniently displayed in bar-chart form in Figure
The upper portion of this figure gives the early-start activity schedule,
lower portion gives the late-start schedule. A study of this figure will
OWNER: HODER TEXT - THIRD E D I T I O N COtJTRACTOR: I nil AN E X C E L L E N T CONTRACTOR
-
\
THIS ACTIVITY
THIS ACTIVITY
THIS ACTIVITY
* CCCC
DDDD
EEEE
----
THIS
THIS
ACTIVITY
AC
- T-I V -
ITY
S FFFF THIS ACTIVITY
I GGGG THIS ACTIVITY
HHHH THIS ACTIVITY
1111 THIS ACTIVITY
A C T I V I T Y SCHEDULE L I S T I N G - PAGE 1
Figure4-13 Time and date computer outputs for the basic scheduling computations on the network s h o w n in Figure 4-12--no splitting
allowed.
OWNER: MODER TEXT - THIRD E D I T I O N CONTRACTOR: I A n AN EXCELLENT CONTRACTOR
3 A U 0 8 1 16:55:11
,.-,
RUN NO.
,.-- .
I
TEST CALCULATED ON PACKAGE BY K C CRANDALL tlODIFICATION 3AUG81 17:04:38
CALCULATION 3 A U 0 8 1 17:17:11
SYMBOLS USED ARE: <*'. C R I T I C A L PATH i <O> WORK DAY i ':-* TOTAL FLOAT i <.> HOLIDAY- UEEKEND i r-> UPDATE DATE
AUG 8 1 SEP 8 1
* M A THS
I I S A C T I V I T Y .A' I***********
BBBB T H I S I S A C T I V I T Y '8. ******tat*
cccc THI S I
S ACTIVITY -c. ooooooo~~~~~~oooao--
DDOD THIS 1s A C ~ I V I ~ Y .D. ************
EEEE T H I S I S A C T I V I T Y .E. *ttt****l
FFFF THIS I S A C T I V I T Y .Fm ttttt*ttllt
GGGG T H I S I S A C T I V I T Y .Gm tttt*t*t*I
HWHH T H I S I S A C T I V I T Y .H. 00000000000- - - -
1111 THIS I5 A C T I V I T Y -1. 00D00D0---
** CPM L A T E STCIRT A C T I V I T Y BARCHART t ** PAGE: 1- 1
SYMBOLS USED ARE: <*5 C R I T I C A L PATH i CWr UOPK DhY i .:-> TOTAL FLOAT i <.' HOLIDAY- WEEKEND i \^;.UPDATE DATE
AUG 81 SEP e l
1 3 1
34567890123~561L190123456789011234567890123
MTWTFSSHTUTFS5MTUTFSSMTWTFSSMrUrFSSMTUTFSS
---------------------------------------------------------.-
LABL DESCRIPTION CALNDR DAYS -> 10 20 30 40 50 60 70 80 90
---------------------------------------------------------------------------------------------.-.-------------------.....~----~~~~--
A111A T H I S I S ACTIVITY .A m a***********
PPBB T H I S I S ACTIVITY .Be *****I****
CCCC T H I S I S hCTIVITY .C. *Illi**tll*~XIfXl*
DDDD T H I S I S ACTIVITY .D. f*ttt*tl*ttt
EEEE T H I S I S ACTIVITY .Em V%****I**
FFFF T H I S I S ACTIVlTY .Fm ****lX*Ifl*
~ G G OT~IS I
S ACTIVITY .G. 1*1*111**11
HHHH T~IS IS ACTIVITY -H- t*r***t**t*
1111 THIS IS ACTIVITY .Im *8*****
Figure 4-14 Bar-chart computer outputs for the basic scheduling computations on the network shown in Figure 4-12-no splitting allowed.
-
S
108 1 I Basic Topics
the information given is identical to Figure 4-13, but in graphical rather than nu-
merical form.
0 12 3 17
LS LF Project network
Figure4-15 Example network with forward and backward pass times shown--splitti
allowed.
cal path, yet its start time has 5 units (20-15) of float, and its finish time
h t s (38-31) of' float. The critical nature of activity F lies in the fact tha
&d-subactivities (8-10 and 10-15 in Figure 4-16) are critical. This fact is noted
at the top of Figure 4-15, where the critical path is shown to contain F(UR
i.e., activity F has a midportion that is reverse critical. The latter occurs
its predecessor constrains its finish time (FF7) and its successor
start time (SS8).
Comparing Figures 4-12 and 4-15, we note that the p-ct
IessT42-38) when splitting is allowed. This results from the
is required to split, because its late start time plus its
than its early finish time. That is. '
Thus, there must be a 4 unit idle time between the two segments of activity
Figure 4-16 Arrow diagram equivalent to the precedence diagram shown in Figure 4-15--rplitting allowed.
Basic Scheduling Computations 1111
indicates that none are remired t o split because, in each case, their late start
times plus their durations equals or exceeds the early f i n i s h w e (LS + D 2 EF).
Another difference in Figures 4-12 and 15 is found in their critical paths. In
Figure 4-12, it is a single path, with a duration of 42 units. In Figure 4-15, there
are two critical paths, each having a duration of 38 units. These paths are shown
at the top of Figure 4-15.
To illustrate the use of computers for these splitting allowed computations,
the completed basic scheduling computations for this network are shown in Fig-
ure 4-1 7. The upper portion of this figure essentially gives the results shown in
Figure 4-15 in elapsed working days, and in the lower portion in calendar datks.
The results given in Figures 4-15 and 4-17 are identical. From the above discbs-
sion, it is clear that the equivalent arrow diagram in Figure 4-16, contains more
information about the subactivity schedules than is shown in either Figures 4-15
or 4-17. To recapture this information, the precedence diagram computati&s
are given in bar-chart form in Figure 4-18. Note how the two portions of this
figure give identical activity breakdowns, and earlypate startlfinish and float
times. For example, the peculiar critical nature of activity F was discussed
above. In Figure 4-16, note that the middle 4 units of activity F are critical
(zero float) with startlfmish times of 24 and 28. This is shown in the upper por-
tion of Figure 4-18 by the critical symbol (*)placed on days 25,26,27 and 28.
Also, the last 3 units of F are noted with the noncritical symbol (0), followed by
7 units of slack noted by the slack symbol (-), exactly as shown on the arrow
diagram in Figure 4-16. To recapitulate for activity F with splitting allowed, the
bar chart indicates that itsfirst four units can be started as early as the 16th ddy,
and they have 5 days of float. The middle 4 days are critical and must be per-
formed on days 25 through 28. Finally, the last 3 units have an early start on
the 29th day, with 7 days of float. This figure does indeed contain a large
amount of information with the advantage of having all subactivities shown by a
single bar (line). A longer time will be required to instruct users how to inthr-
pret this chart, however, the benefit/cost ratio appears t o favor its more wide-
spread use in the future.
PAGE 1
-H'"
-I
A C T I V I T Y SCHEDULE L I S T I N G PAGE 1
Figura 4-17 Time and date computer o u t p u t s for the b a s i c s c h e d u l i n g c o m p u t a t i o n s on the network shown in Figure 4-15-splitting allowed.
OWNER: MDDER TEXT - THIRD E D I T I O N CONTRACTOR: I M AN EXCELLENT CONTRACTOR
SYMBOLS USED M E : CR
i*:,I T I C A L PATH i s.01 UORK DAY i ':-' TOTAL FLOAT i C.> HOLIDAY- UEEKEND i <-> UPDATE DATE
AUG 6 1 SEP 8 1
1 2 3
345678701234567C9012345678?01123456789
bTUTFSSMTUTFSSWrUlFSSMTUTFSSUTUTFS5HTY
less efficient than computations made directly on the network. A tabular pro-
cedure is included in this text primarily because of its value in helping to under-
stand the logic of computer procedures used t o carry out the basic scheduling
computations. Anyone planning to program a computer for this purpose should
study these tabular procedures.
The computational problems resulting from the introduction of multiple ini-
tial and terminal network events, or the introduction of scheduled times on key
milestone events have been treated in this chapter. Their effects on the compu-
tational procedures are trivial; however, occasions may arise where they can be
profitably applied. The problem of network time status updating was also con-
sidered. Again this results in a trivial modification of the basic scheduling com-
putations, but it is an important procedure in the control phase of project man-
agement. Finally, the computational procedures associated with precedence
diagrams is given, for the cases where splitting of activities is or is not allowed.
In this procedure, activities are treated in their totality; early and late start t i e s
are given for the beginning segment, and early and late finish times for the end-
ing segment of each activity.
After having developed anow and precedence diagram procedures in this
chapter, it is clear that each has some significant advantages over the other. The
uniqueness and simplicity of the arrow or node diagram are very desirable prop-
erties. However, the compactness of the precedence diagram, 9 activities in Fig-
ure 4-15 vs. 25 activities in Figure 4-16, is also a significant advantage for pre-
cedence diagrams. The latter advantage will be greatest in construction type
projects where concurrency of activities is the rule rather than the exception,
and least in some developmental type projects where concurrency tends t o be
the exception. On this basis, one might conjecture that the use of precedence
diagramming will undoubtedly grow in the 19809, but not to the point of com-
plete replacement of the arrow diagram.
REFERENCES
1. Battersby, A., Network Analysis for Planning and Scheduling, St. Martins
Press, Inc., New York, 1964, Chapter 3.
2. Crandall, K. C., "Project Planning With Precedence Lead/Lag Factors," Proj-
ect Management Quarterly, Vol. 4 , No. 3, Sept. 1973, pp. 18-27.
3. Fondahl, I. W., A Noncomputer Approach t o the Critical Path Method for
the Construction Industry, Dept. of Civil Eng., Stanford University, Stanford,
Calif., 1st Ed., 1961, 2nd Ed., 1962.
4. Fulkerson, D. R., "Expected Critical Path Lengths in PERT Networks," Op-
erations Research, Vol. 10, No. 6, Nov.-Dec. 1962, pp. 808-81 7.
5. IBM, Project Management System, Application Description Manual (H20-
0210), IBM, 1968.
6. Moder, J . J., "How to Do CPM Scheduling Without a Computer," Engineer-
ing News-Record, March 14, 1963, pp. 30-34.
Basic SchedulingComputations 115
EXERCISES 1
I
1. a. In Figure 4-6, suppose an activity 7-5 must be added to the netLork
which requires 1 time unit to carry out. Will this change any of the
times computed in the basic scheduling computations? I
b. What time value for activity 7-5 would cause it t o just become critical?
c. Suppose the project represented by Figure 4-6 is the maintenance,of a
chemical pipeline in which activity 0-6 represents the deactivation of the
line. To minimize the time the line is out of service, when would you
schedule this activity? 1
~
2. Redraw the network shown in Figure 4-7 and perform the network cohpu-
tations using the following scheduled times.
a. The main project is scheduled to start at time zero.
b. The activities leading t o event 210 are scheduled t o be completed 12
days after the start of the main project.
c. The scheduled time for the completion of activity 108-211 is 20days
after the start of the main project. I
d. The scheduled time for the completion of the main project (event 109) is
also 20 days. I
3. a. In exercise 2 what is the critical path?
b. In exercise 2 what is the effect of assigning a scheduled time of 16 t o
event 106, or a time of 12 t o event 106?
4. It is possible t o modify the network in Figure 4-7 so that the correct basic
scheduling computations can be carried out by the simple procedurd de-
scribed at the beginning of this chapter. The required modifications are in
the form of dummy type activities with suitable time estimates. For exam-
ple, the addition of an activity 101-210 with a time estimate of 8 would
eliminate the multiple initial events. If the main project had a scheduled
completion time of 17, i.e., Llo9 = 17, what activity and time estimate
would eliminate the multiple end events? I
5. A reactor and storage tank are interconnected by a 3" insulated procesd line
that needs periodic replacement. There are valves along the lines and at the
terminals and these need replacing as well. No pipe and valves are in stock.
Accurate, as built, drawings exist and are available. The line is overhead and
requires scaffolding. Pipe sections can be shop fabricated at the plant. Ade-
quate craft labor is available.
You are the maintenance and construction superintendent responsibl forL
this project. The works engineer has requested your plan and schedule for a
116 1 1 Basic Topics
review with the operating supervision. The plant methods and standards
section has furnished the following data. The precedents for each activity
have been determined from a familiarity with similar projects.
Symbol Activity Description Time (Hrs.) Precedents
A Develop required material list 8 -
B Procure pipe 200 A
C Erect scaffold 12 -
D Remove scaffold 4 I,M
E Deactivate line 8 -
F Prefabricate sections 40 B
G Place new pipes 32 F. L
I Fit up pipe and Valves 8 G. K
J Procure valves 225 A
K Place valves 8 J. L
L Remove old pipe and valves 35 C. E
M Insulate 24 G, K
N Pressure test 6 I
0 Clean-up and start-up 4 D, PI
a. Sketch the arrow diagram of this project plan. Hint: at least three
dummy arrows are required.
b. Make the forward pass calculations on this network, and indicate the
critical path and its length.
c. For obvious reasons, activity E "Deactivate line" should be initiated as
late as possible. What is the latest allowable time for the initiation of
this activity?
d. List the various network paths in decreasing order of criticality.
6. The network plan in exercise 5 is subject t o criticism because failure t o pass
the pressure test could result in several problems. How would you network
this project t o avoid this criticism, and what is its effect on the expected
project duration?
7. Update the network given in Figure 4-6 based on the following activity
progress report submitted at the end of the fifth working day.
Activity Start Time Finish T i m Modifications
0-1 1 3 -
1-2 5 - -
0-3 0 2 -
3-4 3 - -
3-7 2 - -
0-6 5 - -
5-8 - - Activity duration
estimate increased to
four days for 5-8.
l
a. Compute the earlyllate startlfinish times for each activity, assuming that I
no splitting is allowed, the ES time for the project is zero, and the LF for
the project completion is 27 (let L F = EF = 27, called the zero slack con-
vention). Note that INITIAL TIME = 0 must be utilized to obtain the
I
correct ES time for activity C, and the TERMINAL TIME = 27 is re-
quired to obtain the correct L F time for activities F and G. I
b. Re eat part (a) for the case where splitting is allowed on all activities.
i
c. Id ntify the critical path in parts (a) and (b), note the differences in the
co puted times, and indicate the type of criticality for each activity.
d. Is $putting of much significance in this network?
12. In thd section called "Arrow versus Precedence Method" in Chapter 3, a
projeclt is diagrammed in two forms. The arrow diagram is shown in Figure
I
118 1 I Basic Topics
3-1 2 in the form of an early start time bar chart. The equivalent precedence
diagram is shown in Figure 3-1 3.
a. Compute the earlyjlate startjfiiish times for each activity in Figure 3-13,
assuming splitting is allowed. Compare your results with the arrow dia-
gram in Figure 3-1 2.
b. Repeat part (a) assuming no splitting is allowed, and compare the results
with part (a).
c. Draw the precedence diagram for the entire project.
d. Compute the earlyllate starttfinish times for the network in part (c), as-
suming splitting is allowed.
e. Repeat (d) assuming no-splitting is allowed.
f. Compare your results in parts (d) and (e), and compare them with the
bar-chart output from K. C. Crandall's computer program (reference 2),
given below in Figure 4-20.
JUNE JULY
1972 1972
1 5 10 15 20 25 30 35
1
2
BOT R E I N F I R S T FLR
M E C H ROUGH I S T F L R
**XXX ----- **
3 E L E C ROUGH 1 S T F L R
*tt
*- +*t*t
xx-.- -----
.---- ----- -
4 TOP MESH F I R S T FLR x--- --xx- ----- ----- ---
XX--- ----- ----- ----- --
5
6
POUR F I R S T F L R
B O T R E I N SECOND F L R XXXXX ----- -----
M E C H ROUGH Z N D F L R
E L E C ROUGH 2 N D F L R
T O P MESH SECOND F L R
POUR S E C O N D F L R
BOT R E I N THIRD FLR
M E C H ROUGH T H I R D F L R
E L E C ROUGH T H I R D F L R
TOP MESH T H I R D FLR
POUR T H I R D F L R
* C R I T I C A L PATH
X N O N - C R I T I C A L SCHEDULE
- SLhCK (FLOAT)
Figure 4.20 Computer bar chart of precedence network.
eakh activity.
D F
Test & debug SF Documer t
program program
6 12
A
system specs. - B
program
-
8 12
C E
Collect Run
system data prograrl
4 6
APPENDIX 4-1
ALGORITHMIC FORMULATION
OF BASIC
SCHEDULING COMPUTATIONS
1. Number the initial project event (event with no predecessor activities) with
1. (If there is more than one initial project event, they should be num-
bered consecutively in any order.)
2. Delete all activities from the initial event(s) and search for events in the
new network that are now initial events; number these 2 , 3 , . . . , k i n any
order.
3. Repeat step 2 until the terminal project event(s) is numbered.
The network originally given in Figure 4-5 is reproduced in Figure 4-21; it has
its events numbered in topological order. The information describing this net-
work is also given in topological ordered matrix form. Each entry in the matrix
corresponds to an activity in Figure 4-21. For example, in the row labeled initial
(predecessor) event 1, we see entries in columns 2,4, and 7. These are the final
(successor) events of the three activities bursting from event 1. The entries of 2,
2, and 1 give the estimated duration times of their respective activities, 1-2, 1-4,
1 - 2 2 1 0
2 - - 4 2
3 - - - 1 6
4 - - - - 5 8 2
5 7
6 - - - - - -4 3 11
7 - - - - - - - 3 1
8 - - - - - - - 5 10
9 - - - - - - - - - 15
'
Latest Event
Time, L, 0 7 11 2 8 12 7 10 15 -
Figure 4-21 Arrow diagram and matrix representation of a project netwbrk.
s
Algorithmic Formulation of Basic Scheduling Computations
and 1-7. ashes have been placed in the lower left hand portion of this
starting w'th the diagonal cells, to denote that activities corresponding
cells are n t possible in a topologically ordered matrix. Blanks in the upper rjght
hand port.on of this matrix indicate that whiie the corresponding activity is bos-
sible, it is Cot present in the particular network represented by the matrix. 1
the computations by using the matrix in Figure 4-21 to carry
of the earliest and latest event times given by equation
El = 0 in the first row of the column giving the Eils.
entries in the column headed by j = 2. There is
activity in the network precedes event 2. We
in the last column of this same row, E l =
in the second row of the Ei column.
we reach column 6, which is the
E, + D 3 , , = 7 and Es t D,,,
E 6 = Max (E, t D , , , = 7 , E , + D 5 , , = 1 1 ) = 1 1 .
i=3,5
e and latest activity start and finish times and the total
float can ow be computed in a straightforward manner using
through (7 . These results have been given previously in Table 4-2
different e ent numbers) and hence will not be repeated here.
illustrated in Figure 4-21 readily
START I
t
Count number of activities
ending in each mode
1
Activity EST is the maximum of:
a) node 111 early time
bl Activity's earliest xheduled
+
start time or its actual stan time
Activity EFT =
activity EST+ duration
(done by date subroutine)
I
NN = activity's successor
+
node number JJJ
+
b) activity's EFT
1
which the activity entered
the solution pet
SetJ=J+l
in the network?
Figure 4-22 F l o w diagram of logic for the basic forward and backward pass calculations.
Algorithmic Formulation of Basic Scheduling Computations 125
BACKWARD PASS
I
Set all node late times
t o required project
completion date
Set I = l + l
This algorithm, which allows activity splitting, is applied in the same manner as
described above for the algorithm where no splitting is allowed. That is, it is ap-
plied to each project activity in topological sequence, with the same definitions
of the terms INITIAL TIME and TERMINAL TIME. There is one major differ-
ence, however, and that is the requirement to "evaluate" each activity for com-
putational purposes, to see if splitting is potentially required. In this evaluation,
an activity need only be considered as having a maximum of two segments, even
though it can be shown that an activity can subdivide into many segments. For
the precedence diagram network in Figure 4-15, it is shown in Figure 4-16 that
activities B, D and F split into 3 , 3 , and 4 segments, respectively. However, only
two segments need be defined in either the forward or backward pass calcula-
tions to follow.
If an activity is "split" during the calculation process, it is necessary to note
the number of days in the first segment as it could impact the early start of fol-
lowers of the split activity. That is, in those cases where there is a start-to-start
constraint and the first segment of the predecessor has fewer days than required
by the start-to-start relation, the follower cannot start until after a portion of
the second segment is complete. In this case, the start of the follower will be
delayed by the amount of the idle time between the split segments of the
predecessor.
The issue is then to know easily when an activity is "split." There are two
cases that can force splitting; both set the early finish of a follower at a date
126
Algorithm for Basic Scheduling Computations 127
later t h the early start of the follower plus its duratiop. The fust, and bb far
GiiG :ommon. case is when a finish-finish factor determines the earlv finish
of follo :r ( j ) . This situation occurs in Figure 4-1 l e where FF= I
framing ~delectrical causes EF = 11 for electrical, which is greater than
D=2+ = 7. The result is that electrical is split into two segments with ad idle
gap of - 7 = 4 time units. The last segment has a duration of 1 to preberve
the con uity of work flow, since FF = 1, and the first segment has a durbtion
of5- 1 4. The duration of the first segment will be designated by orj, alnd is
comput as follows, for the case where EFj is set by EFi + FFil:
The r ond situation where an activity can be split during the forward tera-
tion inv ves the SFij factor. When this relationship exists between two a tivi- i,
ties, t h e redecessor can cause the follower to have an early finish greater than
ESi + D The EF of the follower in this case is:
The i
lowers 1
factors.
!
ual value of aj is important in the evaluation of the early start o fol-
activity (0,when the relation to such followers involves start-to start
4s in all network evaluations, the forward iteration uses local Aaxi-
mums t establish early start and finish values. When the relation
tivities :ludes start-to-start factors, the potential value for the
followe s related to the early start of the predecessor and
of prog is required to have been completed on the
progres! SSij) may be greater than the number of
of the :decessor, and if this is true the potential early start of the follbwer
must a( bunt for the additional time units still remaining to be accomplihed.
This is me by the following equation: Potential ESI = EFi - Di + SSiP
evaluati I effectively creates a pseudostart for the predecessor, as though
were nc ulit segments, and the potential early start of the follower will be
on the >per number of completed time units on the predecessor. This ditua-
tion occ rs in Figure 4-15 at activity F. Here, the E f i = 31 time is set bk the
F h F= factor between activities E and F, i.e.,
31. Th results in an a~ value of 4 for the initial
DF-A F = 11 - 7 = 4. But the SSFG = 8 factor between activities F
calls for he first portion of activity F to have a duration of 8; hence
lem req ring a pseudo early start. If activity F started at its ESE = 15
ran for time units, then it would have to be interrupted for 5 time
128 I 1 Basic Topics
the last portion of F could be started and run for the remaining 7 time units.
This interruption is required in order to satisfy the FFEp= 7 factor. The 5 time
unit delay is accounted for in the pseudo early start calculation for activity F,
when evaluating the early start time of activity G. That is, ESG = EFp - DF +
SspG= 31 - 11 + 8 = 28, which is 5 time units greater than taking ESG = ESF +
SSFG=1 5 + 8 = 2 3 .
The backward iteration evaluates late starts and late finishes and has the same
complication as the forward iteration in that activities can also split during these
calculations. Basically, an activity splits when its late start is set less (earlier)
than the late finish minus its duration, that is, LSi < LFj - Di. The situation is
completely analogous to the setting of early finish in the forward iteration.
Once again the computational procedure must recognize this situation and re-
cord the duration in the second segment (Pi) which is thereby created.
The complete computational algorithm for the case where activity splitting is
allowed is as follows.
STEP 1. Compute the early start time (ES,) of the activity (j)in'question. It
is the maximum (latest) of the set of start times which includes the
INITIAL TIME, and one start time computed from each start-time
constraint of the form FSij and SSii, going to activity j, from prede-
cessor activities indexed by i.
PNITIAL. TIME
IEF, + FSii
1
(for each FSii constraint)
I
ES, = MAX
all i
EFi - Di + SSij (for each SSi, constraint with
cui < SSii)
t
STEP
I
ESi + SSii (for each SSii constraint with
cui 2 SSU,or where cii
was not required)
1
2. Compute the early finish time (EFi) of the activity ( I ] in question.
It is the maximum (latest) of the set of finish times which includes
the early start time plus the duration of the activity j in question
(ESi + Dj), and a finish time computed from each finish-time con-
straint of the form FFii or SFii, going to activity j, from predecessor
activities indexed by i.
Algorithm for Basic Scheduling Computations 129
STEP 3. If EFi > ESi + Dj, then compute a for activity j as follows:
Apply the following 3 steps to each project activity in reverse topological orddr.
~
STEP I . Compute LFi, the late finish time of the activity (i) in question. It
is the minimum (earliest) of the set of finish times which inclu es
the TERMINAL TIME, and a finish time computed from each fin'sh-
time constraint of the form FSii or F&i, going from activity i, to
successor activities indexed by j.
I
LSi - FSii (for each FSii constraint)
LSj + Dj - FFii (for each FFij constraint with
LFi= MIN
alli P j < FFii)
I
LFj - FFij (for each FFij constraint with
Pj 2 F h , or where
Pi was not required)
STEP 2. Compute LSi, the late start time of the activity (z) in question.
is the minimum (earliest) of the set of start times which includes
latest finish time minus the duration of activity i (LFi - Di), anh a
start time computed from each start-time constraint of the form idsij
or SFii, going from activity i, to successor activities indexed by j. 1
130 l l Basic Topi-
I
LFj - SFli (for each SF constraint
Pi 2 SQ,ii, or where
Pi was not required)
STEP 3. If LSi < LFi - Di, then compute 0 for activity i as follows:
Example Problem
The example previously given in Figure 4-15 shows the results of applying the
above algorithm during the forward and backward pass calculations, for the case
where splitting of activities is allowed. Some of the calculations are shown be-
low for the forward pass.
Activity A
EFA=EsA+DA=o+12=12
~ unnecessary since EFA= 12 is not greater than ESA +
Computation of c r is
DAz12)
Activity B
ESB = MAX
INITIAL TIME = 0
ESA+SSAB=0+3=3
} =3
EFB= MAX
A I
(Since EFB > ESB+ DB, calculate crB)
EsB+DB=3+10=13
}=I7
EFA+FFAB=12+5=17
Algorithm for Basic Scheduling Computations
Activity D
EFD = MAX
B I ESD+DD=O+12=12
}=I5
ESB+SFBD=3+(2+10)=15
a D = D D- ~ ~ ; , = 1 21-0 = 2
- -c
Activity C
ESc = MAX
INITIAL TIME
ESA+SSAc=0+3=3
=0
} =3
EFc = MAX
D IESc+Dc=3+18=21
EF,-DD+SFDc=15-12+(7+14)=24
( Y ~ = ~ < S F ; ) ~ = ~ .
(Since EFc > ESc + Dc, calculate ac)
o l , = ~SF:^
~ = 18- 14=4
etc.
A portion of the backward pass calculations are as follows:
Activity I
LSI=LFI- D 1 = 3 8 - 7 = 3 1
(Computation of PI is unnecessary since LSI = 31 is not less than LFI - D I
Activity F
Activity C
LFc=MIN
F, H
i
TERMINAL TIME = 38
LSF+DF-FFCF=20+11-5'26 '26
LFH - FFcH = 3 5 - 3 ~ 3 2
Note: Middle equation was required since OF = 3 < F k F = 5 .
LSc=MIN {LFc - D c = 2 6 - 1 8 = 8 ) = 8
I
F, H
(Computation of Oc is unnecessary since LSc = 8 is not less than LFc - Dc = 8 )
etc.
These computational results are shown in Figure 4-15. The two critical paths
through this network are shown at the top of the figure.
PROJECT
COST CONTROL
From the preceding chapters it should be clear that PERT/CPM and precedence
diagramming are time-oriented methodologies. They permit the development of
time-based plans and schedules for projects in great detail, and the monitoring of
actual versus planned times. The basic procedures described in these previous
chapters have, in fact, often been termed "time-only" methods because they do
not explicitly consider possible constraints on the available resources (e.g.,
money, men, and equipment) which may be needed for completion of project
activities. While specific resource requirements (e.g., number of men) are im-
plicitly assumed in deriving the time durations associated with activities in the
network diagram, resources available are ignored.
Although the developers of CPM included a provision for activity time/cost
trade-offs, the scheme was used only as a means of determining the "best" (in
terms of minimum total cost) activity times for use in scheduling the project.
That scheme, which is decribed in Chapter 8, was not designed for complete
project cost control and is not in any sense a cost accounting/control system.
In spite of the time-only orientation of the basic PERTICPM scheduling
methodologies, it was recognized very early on that by adding activity costs to
the network diagram a potentially powerful means of improving project cost
planning/control could be obtained. Conceptually, this addition was not diff-
cult, since none of the basic network scheduling rules were changed. For ex-
ample, consider the simple activity-on-node network in Figure 5-1, previously
shown as an arrow diagram in Figure 4-6. In addition to time durations for each
$1000- Total cost
c-Activity number
4 t D u r a t i o n . weeks
activity, the estimated total cost of performing the activity is shown beside each
node. The total activity cost is assumed to be spread evenly across activity dura-
tion, so that a per period cost can be calculated for each activity. Performing
the basic scheduling computations on this network will produce the earliest and
latest start and fmish times for each activity as shown in Table 5-1, which also
summarizes the duration and cost data for each activity.
If all activities are assumed to start at their early start (ES)times, and costs
are summed cumulatively across time periods, the ES cumulative cost curve
shown in Figure 5-2 will be obtained. Similarly, by starting activities at their
late-start times the LS curve shown will be obtained. If the activity costs are
the total costs associated with this project the region between these two curves
0 5 $1400 $700
0 0 1000 500
0 6 0 0
2 7 6400 1600
2 3 2500 500
2 2 8000 1000
1 7 1800 600
6 11 0 0
7 8 800 200
10 10 3500 700
11 12 4200 1400
Project Cost Control 135
i
is the area of possible project budgets. A schedule to achieve a particular bu get
in this region can be determined by starting activities at specific times bet een
their ES and LS times. For example, in some cases it may be desirable to h ve a
relatively straight line of cumulative costs from project start to fmish (i. . a
uniform rate of expenditure). This can be approximately achieved by jughhg
the scheduled start times of activities within their allowable limits. arehere
also other, more systematic, procedures for choosing the activity start times
which meet such a uniform rate of maximum per-period expenditure constr8int.
These procedures are covered in Chapter 7, which discusses limited-resohrce
scheduling procedures. These procedures can be applied t o the cost planhng
problem by treating money as a type of resource whose availability by lime
periods is limited.
As this simple example illustrates, the network and critical path
computations can be used as vehicles for producing useful
project costs. In this case the information produced is
However there are also other important questions having
which can be answered with the use of network-based
discusses some of these procedures, which deal primarily with the folloviring
basic questions:
While in theory the concepts of cost control based on the project network are
not complex, the design and implementation of a practical cost control sys-
tem is not readily accomplished. The fundamental problems facing the system
designer may be classified as (1) those related to organizational conflicts, and (2)
those related to the necessary efficiency of the system. The basic organizational
problem is the conflict between the project approach of network cost control
and the fundamental approach of cost accounting procedures found most in in-
dustry. This conflict is manifest particularly in the design of input and output
phases of network control systems. The input to a network-based system re-
quires the development of an activity accounting procedure by which actual ex-
penditure data are coded to provide association with activities (or groups of ac-
tivities) in the project network. The output from the system likewise must
be project-oriented to provide project summary reports, organized by time pe-
riod, areas of responsibility, and technical subdivisions of the project.
The efficiency of the system is a problem because network-oriented systems
lend themselves to major increases in the amount of detail available to the mana-
ger. The level of detail is both the promise and the inherent hazard of such sys-
tems, and it is one of the primary tasks of the system designer to achieve the
level of detail that provides the greatest return on the investment in the system.
A network-based cost control system can easily require routine input data in
quantities and frequencies that project personnel find extremely burdensome.
Unless the requirements are reduced and the procedures simplified, the system
will come to an early death. Similar dangers lie in the design of the data process-
ing and output phases of the system. The use of precedence diagramming, which
often reduces the number of network activities by 50 percent or more, offers
some promise here.
Activity Accounting
Basic CPMIPERT systems gained acceptance rapidly because the critical path
concept filled a generally recognized need for improved, formal procedures for
project planning and scheduling. In the cost control area, however, formal ac-
Project Cost Control 137
1
counting procedures were established long before the beginning of PERT/ PM.
Thus, one of the greatest obstacles t o the use of network-based cost co trol,
has been the difficulty of developing a network-based system compatible
the established accounting system.
Generally speaking, accounting systems in organizations engaged in pr 'ect-
type endeavors are designed to plan budgets and to report expenditures 0th
by organizationalunit and by project. However, the emphasis is on the orga iza-
tional unit accounts (section, department, division, etc.), inasmuch as the objec-
J
tives of the accounting system are summaries of expenditures by the funct~onal
elements of the organization. Where the accounting codes also permit su
ties by project, the project summary represents the lowest level of
reporting available to the operating management. The purpose
path approach, on the other hand, is to provide more detailed
control within the project.
Cost data, like time data, must be applied to project
and recording of expenses both by cost item and by
means that a more elaborate system is required. Not
and figures to deal with, but there are many typical
application of cost data to a project network:
I
1. Electronic testing gear is purchased for use in several activities in the roj-
ect. Should the cost of the gear be assigned entirely to the purch sing
activity, when the expenditure actually occurs, or should it be alloc ted
over the activities involving use of the gear?
2. What cost, if any, should be assigned to the curing of concrete? App oval
of shop drawings? Negotiation of a subcontract?
3. Should overhead be included or only direct costs? If overhead is inclu ed,
is it computed the same way for all activities?
4. How should the costs associated with project management be show , as
activities or as overhead?
1
Such questions arise largely from the fact that basic time-oriented net
and the list of project cost items represent two different sets of data.
the sets largely overlap, many elements of the project which involve costs have
not been shown in the network. This is particularly true of
other overhead expenses. Certain other activities involve no
sume time and perhaps should account for a portion of the
ous answers to these activity accounting problems have
will give some examples of cost control systems
counting later. But first it is important to review
cost control and to understand the concepts of work breakdown structure
and work packages.
138 l 1 Basic Topics
HISTORY OF PERTICOST
As noted earlier, the idea of collecting costs on the basis of network diagram ac-
tivities was recognized very early as a potential means of improving project cost
control. A few manual procedures and computer programs to answer the 4 cost
questions listed earlier were developed by individual CPM and PERT users in
the period 1959-62. In 1962, a major boost to the interest in network-based
cost control was provided by agencies of the U.S. Government. The Department
of Defense and the National Aeronautics and Space Administration jointly is-
sued a manual entitled DOD and NASA Guide, PERTICost Systems Design:
which emphasized the cost control aspects of "PERT-type systems." Several
companies and agencies in the aerospace field had already been working with
various PERT Cost procedures and computer programs, but the DOD and NASA
Guide served to formalize the interest of the government and thus to inititate
active development of the procedures throughout the aerospace industry. By
mid-1963, the use of PERT/Cost procedures had become a requirement in cer-
tain military research and development projects.
One of the key features of PERTICost was the utilization of a "Work Break-
down Structure" (WBS) to show the hierarchy, or levels, of tasks within a proj-
ect, and the definition of "work packages" at the lower or basic levels of work.
The WD-NASA Guide described these concepts as follows:
The DODNASA Guide suggested that the basic work packages might be
formed by the same individual activities, or groups of activities, used in the
PERTICPM network. Figure 5-3 shows, for example, an illustration from the
Guide of the level-by-level WBS and use of network activities as work packages.
The specification of network activities as the basic cost control unit was
widely misinterpreted as meaning that individual network activities should al-
ways comprise work packages. This created numerous problems with respect to
the acceptance of PERT/Cost. There was belated recognition of the fact that it
was often impractical for contractors to budget and report costs by PERTICPM
Project Cost Control I 139
Structural
161 Elm? mg 70735
161 M n h . mg. 2M637 Summary
161 Mb. 1A321
161 T ~ & W 1T626
C h a r s numberla" activtier
for w a r t package coding
Figure 5-3 Sample work breakdown structure showing accounting identification cc 's.~
. . . the design group intended to make clear that the work breakdown mc-
ture, not the network, was the basis for cost planning and control. In tro-
spect this was far from clear. Confusion arose because many defensl :on-
tractors as well as other government agencies were developing theil )wn
versions of PERTjCost. Several of these versions called for the use of :RT
networks in the budgeting and reporting of costs by network activities re-
quirement that resulted in the collection of vast amounts of very detaile :ost
information.
By 1964 more than ten variations of PERT/Cost existed throughout OD
and NASA, most of which called for costing of PERT network activiti~ and
the submission of detailed cost information on a monthly basis. Contr tors
recognized the impracticality of these systems and created their own P KT/
Cost groups to prepare reports for DOD. These groups operated sepa tely
140 l 1 Basic Topics
from management teams responsible for the actual planning, scheduling bud-
geting and measurement of program performance. Government auditors de-
cided that PERTICost groups were a legitimate overhead expense that could
be charged to the government. Many contractors considered PERT/Cost as
the basis for negotiating higher overhead rates. . . .
DEVELOPMENT OF ClSCSC
The simplified criteria developed by the Air Force in 1964 were subsequently
developed into an improved set of criteria which were issued under DOD in-
struction 7000.2 "Cost/Schedule Control System Criteria (C/SCSC)." These
criteria retained the advantages of some of the essential elements of PERT/Cost,
and yet also reflected current industry practice. As Fox notes:5
I t became clear from the PERT/Cost pilot tests that cost planning and control
could be based on a system that was used on most large commercial develop-
ment and production programs. This cost information could be based on a
WBS that subdivided the program or project according to the manner in which
work responsibility was assigned. Project work was traced down through sev-
eral levels of work definition to the point where short-term work packages
could be identified as the basis for planning and controlling manpower. Bud-
gets were then established for each short-term work package. Costs were
estimated at every level of the WBS, to arrive at a total cost estimate for the
program or project. As a contractor began a development program, actual
manhours and costs were assigned to the work packages. As work was com-
pleted the contractor could compare estimates of cost for short-term work
packages with the actual man-hours and cost required to accomplish the work.
Thus the contractor would keep a constant check on whether work was cost-
ing more or less than was estimated.
1.
2.
3.
4.
5.
It represents the units of work at levels where work is performed.
It is clearly distinguished from all other work packages.
It is assignable t o a single organizational element.
It has scheduled start and complete dates.
It has a budget of assigned value expressed in terms of dollars, an-
hours or other measurable units.
6. Its duration is limited to a relatively short span of time, or it is ub-
divided by discrete value milestones to facilitate the objective meashe-
I/
ment of work performed.
7. It is integrated with detailed engineering, manufacturing or o her
schedules.
I
In an attempt to increase the flexibility of its cost accounting requiremknts
the C/SCSC Guide included new provisions for establishment of "cost accouhts.3
and clarified the establishment of organizational responsibilities for elemends of
the WBS. As the Guide states:
As noted earlier, an effective cost control system not only permits the establksh-
ment of realistic budgets or plans, but also includes provision for rnonitoiing
actual costs. This is done by measuring expenditures against budget and idehti-
fying variances so that corrective action may be taken when required. ~ i h c e
schedule progress is also often monitored by measuring actual activity time her-
formance against estimated times, this means that two separate streams ofi in-
formation, time data and cost data, are flowing to the project managers. The
collection, manipulation, and analysis of even one of these two streams of
data typically present significant problems for management. For example in I
the case of direct labor costs, these are typically recorded on weekly time cards
which require the distribution of each individual's time over the activitied in
which he participated that week. If a network-based cost approach like PEAT/
Cost is used, employee activities must be defined in terms of, or coded t o kor-
respond to, specific network activities. Requirements such as this can add sig-
nificantly to the paperwork burden of project personnel, and can be an impor-
tant factor in the acceptance or rejection of the system.
It is interesting to note the C/SCSC provisions for data collection and rep
ing, since they are directed at easing some of the problems stemming from
added requirements of time and cost progress reporting. The CjSCSC objec
is an integrated timejcost progress monitoring/control system. That is, it dro-
vides information about project time and cost performance from a single data
collection stream. The particular data collected is based on the WBS strucdure
and utilizes the three key cost performance measures.
The key cost measures, defined in (a), can be summarized as:
Actual Cost of Work Perfomzed (ACWP) is the amount reported as actu
expended in completing the particular work accomplished within a &en
time period.
144 1 I Basic Topics
Although C/SCSC requires the collection of these costs by cost account level,
these costs can be collected at any level of effort (i.e., project task, subtask,
work package, etc.). These cost measures are utilized in establishing both cost
and schedule (time performance) variances as follows:
Cost variance = BCWP - ACWP
Schedule/Performance variance = BCWP - BCWS
The use of both cost and schedule variances calculated in this fashion provides
an integrated costltime reporting system which measures cost performance in
relation to the work accomplished, and ensures that both time scheduling and
cost budgeting are constructed upon the same data base.
Figure 5-5 shows a popular graphic report from such an integrated time/cost
Millions
of dollan
percent
overrun +:::-,/-%---/
-
+I5'
0 /
,----I
- I
I
Overrun
Percent
- 1
underrun
Months
behind
+2
+I
-
+3 -
- ,------
__------ < I
Months behind
Months 0 /-- I
ahead -1 - I
1 1 1 1 1 1 1 1 1 1 1 I I I I I
J F M A M J J A S O N D J F M A M
1981 1982
costs have consistently exceeded budget for the past several months.
!
tween the Value of Work Completed curve at that point in time, and the ud-
geted Cost curve. For example, at the current report date, work budget d at
$2.3 million has been completed. But that same amount of work was orig' ally
scheduled t o have been completed about the middle of August, which eans
that the project is about 2; months behind schedule. The "Months Be 'nd"
Curve at the lower part of the figure is a running tally of the number of m nths
behind. It shows that the project has fallen farther and farther behind sche ule.
Engineering
Fabricationlaa'y
Test'inspect
Evaluation
2 4 6 8 10 Months
Figure 5-6 Planned schedule and costs of major tasks, prototype development project.
These cost measurement concepts are also useful for cost control at the task,
subtask, or work package level. For example, Figure 5-6 shows the major tasks
of a planned 10-month prototype development project. Total project costs are
estimated at $1.865 million. Of this, $765,000 is engineering work. Assume
that the project has been under way for 3 months and we wish to know how the
engineering work is progressing.
A separate schedule of the project engineering work is shown in Figure 5-7,
which indicates that 9 major subtasks are involved. The veritcal dashed line in
Figure 5-7 indicates the report date; as can be seen, 3 tasks have been completed,
5 have been started and are in progress, and 1 has not yet been started as of the
reporting date.
Figure 5-8 shows the type of information which might be collected on the
engineering subtasks at the end of the 3rd month, using the cost measures de-
fined earlier (BCWS, BCWP, ACWP). This report shows that each of the 3 com-
pleted tasks has experienced a cost overrun, ranging from slight ($500) in the
case of Material Tests to substantial ($13,000) in the case of System Design.
Given this information, the status of the 5 tasks currently in progress is of
considerable interest. Their status is summarized in Figure 5-9, which interprets
the significance of the cost measure relationships and projects total engineering
costs at completion, based upon progress to date. As can be seen, engineering
work is generally behind schedule and over cost. If the present rate of progress
continues, total cost for these tasks will be $812,000 instead of the originally
estimated $765,000.
The cost measurement concepts illustrated by these examples represent an
important step towards the development of effective, implementable cost con-
trol procedures in project management. While these procedures are today used
primarily on government-related projects, they are equally applicable to private
R o i e a Cast Control
System design
I
Subcontract specs
I
Material tests I
I
Specs review
Drafting
II 1 - 1
Fablass'y support
I
I
Fablass'y process $130 K
I
I
Test support
I I $loOK
1
Engineering release
and review
I I I I I I I I
1 2 3 4 5 6 7 k
Total planned costs - $765 K
Figure 5-7 Major engineering subtasks, prototype development project.
Subcontract specs $132 $82 $84 Behind schedule and over cost
Specs review 22 15 15.5 Behind schedule and over cost
Drafting 97 59 59 Behind schedule but within cost
Fabrication/assembly process 100 63 67 Behind schedule and over cost
Test support 21 21 21 On schedule and within cost
449
Estimate t o complete: -X 765 = $812 K
422
Summary: Engineering work is behind schedule and a cost overrun is occurring.
Figure 5.9 Status summary of engineering subtasks in progress and estimate to complete.
sector projects. The evidence suggests that more and more private-sector com-
panies are voluntarily adopting these procedures.
~l
1
1
Heater Site
Tanks
house
(1000) (2000) (3000)
I
Other
Piles Ducts
frame structures
(1100) (1400)
1
Reinforce Base &
I
Reinforce
I
Walls
base klcker walls
114541
(1451) (14521 (14531
OBS Structure
(OBS level 0)
co
(OBS level 1)
(General site)
Supervisor L
Testing)
Supervisor K
(OBS level 2)
(Garage)
-----
Pile Pile Pile
(OBS level 3)
(21111 I22111
shows a WBS format report for the Heater House portion of the project; Figure
5-12(b) shows an OBS format report for the tank superintendent areas of
responsibility.
As actual cost and schedule data are collected in periodic update cycles, new
activity schedules are produced and the following calculations and operations
occur:
Figure 5-13 is a sample updated activity schedule for a portion of the project,
and shows the type of information produced for each activity, including work
package and organizational section codes. Figure 5-14 is a Slippage Barchart,
Project Cost Control I
li
51
which shows graphically the original and current schedule for each activity, re-
flecting the updated information on project completions, duration changes, nd 1
changes in network logic.
Figure 5-15 shows Schedule Performance reports produced after an upd te,
organized by WBS and OBS format. In both reports the actual and forebast
I
schedule performance is compared t o the baseline schedule. Predicted schedule
overruns for each portion of the project, based on the latest data, are indicated
on the right side of each report.
Figure 5-16 is an integrated C/SCSC-type Cost Performance Report produced
1
after an update, organized by WBS and summarized t o Level 1. It shows the dur-
rent and cumulative values of BCWS, BCWP, and ACWP for the elements of lhe
WBS separately and in total, as well as the original and latest estimates of cost at
completion. Figure 5-17 shows similar information for the tank superintendedt's
areas of responsibility of the OBS. Figure 5-18 illustrates the type of detailed
cost information available for individual work packages upon request. Schedule
information can also be displayed for each work package.
The cost performance index shown at the bottom of the Cost performaice
Report (Figure 5-16) is calculated as follows:
BCWP
Cost Performance Index = CPI =-
ACWP
Values of the CPI greater than 1.0 indicate costs below budget. The ~ c h e d l l e
Performance Index also shown in Figure 5-16 is calculated as:
1
BCWP
Schedule Performance Index = SPI =-
BCWS
Values of the SPI greater than 1.0 indicate completions ahead of schedule. $he
ARTEMIS system utilizes these indices in combination with its four-color grabh-
ics capabilities to produce three summaly reports for top level managemint.
The first of these, shown as Figure 5-19(a), indicates the movement of the Cost
Performance Index over time and shows at a glance whether the CPI is abovk or
below budget or trending in an unfavorable direction. Similarly, the redbrt
shown as Figure 5-19(b) indicates the movement of the Schedule Performahce
Index over time. The third top level report (Figure 5-20) plots CPI against SPI
over time to show at a glance whether project performance is currently fador-
able, unfavorable or marginal, and whether there are any short- or long-term
trends in any of these categories.
The ARTEMIS example used here is a good example of a complete netw
based cost control system. For example, it utilizies CPM network activitiek as
basic building blocks for the work packages; and it uses periodically-updatedin-
formation from the CPM schedules to produce time-related cost informadlon
I
METIER/ARTEMIS I
DEnONSTRATION O F AN EARNED V h L U E SYSTEM
CONTRACT NUMBER : 1 / 0 6 / 1 9 3 2
0-
A C T I V I T Y SCHEDULE PACE I
*.-=
.-. =-======
UASTE DISPOSAL PLANT
===-= =---==== =-=== *.- .....
RUN DATE: I-JUL-79
.==m=.-.
I
PREC SUCC PROJECT UORK DURA EARLIEST EARLIEST LATEST LATEST TOTRL
ACT. ACT. DESCRIPTION SECTION
-
..-
..
. --- ---- ----
PACKAGE TlON START
----- FINISH
- -----
START
---
..
FINISH
---..-
FLOAT
----- FE.
88 COMPLETE R E I N F BASE TANK 5 1
2-
- Z COMPLETE R E I N F RASE TANK P I
20 FORM-~ING WEAn TANK P I
130 S T R I K E UALLS (TANK P 2 )
210 S T R I K E Y I L L S DUCT B
258 FORM DUCT 'e' (TANK P 2 )
2L2 B A C K F I L L DUCT B
132 FORM (TANK P 2 ) ROOF SOFFIT
134 COMMENCE F I X REINF TO ROOF CEN
I56 CONC R I N G BEAM TLHK P 1 1 1 )
262 COMPLETE F I X REINF TO ROOF DUC
158 S T R I K E RE TANK P 1 1 1 ) AND FORM
264 CONC ROOF DUCT
370 DELIY
266 DELAY
$60 COWCRlNGBEAHTANKPL(2)
372 S T R I K E FORM SOFFIT DUCT A
268 S T R I K E FORM ROOF DlJCT .AY
24 F I X FORM TO CTR BASE TANK P i
I62 STRIKE FORM RE TANK P I ( 2 I
-. .--.
.
136 COMPLETE F I X R E I N F TO ROOF FEN
270 B A C K F I L L DUCT A
164 FORB RING BEAH TeNK 5 1 1 1 )
138 CONC ROOF CENT DUCT
158 DELAY
DELAY
S T R I K E FORM CENT DUCT
S T R I K E FORM CTR DUCT ROOF
DELAY
CONC CTR BASE TANK P I
B A C K F I L L CENT DUCT
EXC T R I M h B L I N D TANK P 2
EONC R I N G BEAM TANK S i ( 1 )
COMMENCE EXC T R I M AND B L I N D HH
S T R I K E RB TINK S I ( 1 I AND FORM
S T R I K E FORM CTR BASE TANK P I
COMPLETE EXC TRIM LIND B L I N D HH
COMMENCE R E I N F B I S E S E 4 U DUC
CONC R I N G BEAM TANK 5 1 1 2 )
COMMENCE EXC TRIM b B L I N D HH D
F I X FOR?! CTR BASE TANK S I
F I X SCREED b CONC I N C L BASE TA
COMPLETE R E I N F BASES E b U DUC
<<<
?'4 1,8 ,
m
2"
k
4,
3 84
88 Eg ZSP
tl /I
ggg Zli
h, 4,
E&S 81
;;; Z!
C I 6 1 .
= I Y1,1
D I Eii
e l 31,
g i g E ,,l
u, 8
- 8 ..1
:~
m
e
X
2:;
=,, ,
+I(
08,
-8,
!j
gg
q
$4;
5EE
aae
_
=
11
.. ,,
sfl gG 53: ii
I I Basic Topica
SCHEDULE PERFORMANCE REPORT
METIER/ARTEMIS : -------------------
---------------.----========
DEMONSTRATION OF AN ERRNED VALUE SYSTEM
CONTRACT NUMBER ; 1/08/*932
L E V E L i SUMMARY : S I T E O P E R A T I O N S
COMPANY : X Y Z COMPANY
B I 1 I 11 I I I I 1BBmI~)sBB~UIBBBI I I I I
K I I I I1 I I I I IFFFFFFFFFFFFFFFFFFFFFFI I I I 4
-- - - -- -
SUMMARY
. .~
- .- --- -- -
........................................................................................
CURRENT PERIOD : CUMULATIUE TO DATE AT COMPLETION
.
........................................................................................................
HEATER HOUSE : 13473 11889 15800 -1584 -3911: 64996 54643 66461 -10353 -LO1B : 1789b4 169227 -111263 :
TANKS : 22996 22166 18324 -850 3822; 103176 102854 ID5446 -622 -2592 : 488i20 409139 -iiOi9 :
S I T E OPERATIONS I PO40 2880 888 840 2592; 7,694 56605 56820 -1089 -215 : 107848 109196 -1448 :
m~~atr~a~~aira*a*rat~a~8;~a~~~~raaiaarai~rrrsttataa~aia1aa~::r:tr~:a~*:rra:*:r~r**a:~***:::~~aasf;xs**aata8arir~rtrt**a:*~****:
TOTAL PROJECT SUMMARY ; 18509 36914 34412 -1595 2502; 286IL6 114102 21D728 -I2064 -4626 : 774932 7976h2 -22730 :
t~rtatf:aaaaaas:a:~aat1~tt:tt11:~t~~~li~~ta~a~tt~atr1a~s~:1:aa::~~1:1i~:ti~:~iaa1r~~~::a*t:a*:*11rxx:~*1~1axm~mma:~:::1:ta:~***8*:
CURRENT TOTAL BUDGET = $774932 ESTIMATED F I N A L TOTAL COST = 1797662
.................... .
.........................
COST PERFORMANCE INDEX =O.98
SCIIED PERFORMANCL INDEX ~ 0 . 9 9
PRODUCED BY I E T I E R I A R T E I I I S
REINFORCE BhSE ( P I )
R I N C BEAM <PI>
REINFORCE YALLS ( P O
REINFORCE BASE ( P 2 >
R I N G BEAM (P2>
REIHFORCE UALLS ( P 2 )
REINFORCE B R M (51)
RING B E M (SIP
REINFORCE UALLS ( S t )
REINFORCE BASE ( 5 2 )
R I N C BEAM (S21
REINFORCE BRSE ( C I >
R I N G BERM (CI)
REINFORCE YRLLS ( e l >
REINFORCE BRSE < C 2 >
R I N C BEAM (C21
REINFORCE UALLS (C2)
:
~ O T ~- LSUPERVISOR : 21039 i2741 14496 -9298 - 1755: 30118 @b712 28776 - 3 6 -2064 : lbOO4O 167755 - 7715 :
s
f
CURRENT BUDGET = S 160040 E S T l M l T E D F I N h L COST = S 167755 0-
Figure 5-17 Cost performance report organized by OBS (for reinforced works supervisor. tanks area).
HETIER/ARTEflIS :
DEMONSTRATION OF AN EARNED VALUE SYSTEM REPORT PERIOD : OCT-1979
CONTRACT NUMBER -
1/08/1932
DATES :
-----
BUDGET DATES : START = 12-JUL-79 FINISH F lb-NOU-79
CURRENT DATES : START i 17-JUL-79 FINISH i E9-NOU-79
COST INFORMATION
--.
----.---....
CURRENT BUDGET : Sll97b.00 ACTUAL COST TO DATE : SWb91.20 REUISED ESTIMATE : Sl2293.lZ
ACTUALS TO ACTU4I.S TO
COST BUDGET BUDGET DATE DATE FORECAST FORECAST
CODE MANHOURS * MANHOURS S MANHOURS S
PRODUCED BY M E T I E R / A I T E H I S
Figure 5-18 Sample of detailed cost information for individual work package.
I
Project Cos3 Control I 61
CPI = BCWPIACWP
MetierIArtemis graphics
Run date: 10 - Aug - 7 J
1.5 -
1.4 -
= 1.3 -
-3
8
1.2 -
m
.= 1.1 -
z
1.0 .
L
5
0
0.9 -
0.8 -
0
0.7 -
0.6 -
0.5 l Ml lJ l s l Nl lJ l Ml M
l ~ J l s l Nl l J l l l li dl ~
0.0 2.0 4.0 6.0 8.0 10.0 12.0 14.0 16.0 18.0 20.0 22.0 211.0
Project timescale XYZ proidkt
1.4 -
- -
-L
Y)
1.3
2 1.2 -
'0
.-
;E 1.1 -
1.0. Y
2
0.9 -
P
3 0.8 -
-J
0.7 -
0.6 -
0.5 I I I I I I I I I I ~ ~ I I ~ ~ I I I I I
M J S N J M M J S N J M
0.0 2.0 4.0 6.0 8.0 10.0 12.0 14.0 16.0 18.0 20.0 22.0 2h.O
Project timescale XYZ p r o j k t
Figure 5-19(bl Project schedule performance index over time.
162 1 I Basic Topics
1.2
1.1 -
-
-+-'- I
0
AU
5 1.0 Ni-2>
\ M
P,F
D/'~
0.9 -
0.8 -
.'.
MT----<~
'' .
O.'
- Unfavorable \
\
Marginal
0.6 - '\\,AP
0.5 I I I 1 I I
0.5 0.6 0.7 0.8 0.9 1.0 1.1 1.2 1.3 1.4 1.5
Figure 5-20 Combined costlschedule performance index plotted monthly, April-March.
such as the distribution of work package costs over time. It is not necessary to
have such close interlinkages between the CPM scheduling and the cost moni-
toring portions of the overall system, as pointed out earlier in this chapter.
However, as these interlinkages are reduced in number and frequency the po-
tential benefits of improved accuracy and reliability of the information pro-
duced will correspondingly decline.
SUMMARY
have been at an accelerated pace over the past few years and show no signs o f
abating. With the increasing economies of data processing equipment and skr-
vices, and continuing pressures of inflation and high interest rates, there can be
little doubt that network-based cost control systems will be developed and dti-
lized even more widely in the next few years. I
I I
REFERENCES
1. For the network in Figure 5-1, assume that it is decided t o plan that all db-
1 I
tivities will begin at the ES times, except for the following activities, which
are scheduled t o begin at the times listed below: II
Schedukd
Activity Stan
A 3
D 5
H 9
C 4
G 5
l1
Compute the planned cumulative costs for the project and plot the results
I~
on Figure 5-2.
~~
164 l l Basic Topics
2. Using the methods given in Chapter 7, schedule the activities in Figure 5-1
such that the project duration is minimized, subject t o the constraint that
the planned weekly expenditures never exceed $2,500.
3. The ARTEMIS Cost Performance Report shown in Figure 5-16 provides
data on the 3 major elements of the Waste Disposal Plant project (Heater, -
House, etc.). Using the information provided in this report, summarize the
performance status of each of the 3 major elements in the current period,
over the total period to date, and what is indicated as likely at completion.
4. The text lists several problems inherent in the design of network-based cost
control systems having to do with activity accounting procedures. How do
these problems appear to be handled in the ARTEMIS system?
COMMENTS ON
PRACTICAL APPLICATIONS
One might say that critical path methods are applicable to the management of a
project from the cradle to the grave. At each of the stages in the life of a project,
there are a number of areas related to the practical applications of critical path
methods that are not covered in the other chapters but are deserving of atten-
tion. This chapter will treat several of these topics, from the project proposalto
the project updating and control phase.
Special attention is given to techniques in the construction industry, in wdch
many firms employ network methods. Concluding the chapter is an introduc-
tlon to the organizational aspects of project management.
I
specification. It may turn out that this plan requires the use of certain time
saving features which add unexpected costs, or risks, to those which would nor-
mally be required to complete the project tasks. For example, if performance
time is extremely critical, "crash" time performance of critical path activities
may be required. In addition, it may be necessary to perform certain activities
concurrently, which would normally be performed in series. The added risks of
the expedited plan over the normal plan must, of course, be considered in pre-
paring the proposal cost estimate.
If the proposal requires consideration of alternate completion times and costs,
then the time-cost trade-off procedures described in Chapter 8 may be appro-
priate in arriving at project costs. Similarly, if the project under consideration
will be competing for a Tied set of resources, then the procedures discussed in
Chapter 7 may be applicable. It may turn out that the proposed project sched-
ule dovetails nicely with the phasing out of current projects, or it may put an
extreme burden on certain critical resources. This type of analysis may greatly
influence the profit margin that management places on the project, or influence
the decision of whether of not to submit a bid on the proposed project.
A number of firms jn various industries are now using critical path methods
routinely, in varying degrees of detail, in preparing project proposals. One large
metal-working firm requires that all internal proposals for capital expenditures
over $25,000 be accompanied by a CPM network showing the project plan and
schedule. Some advertising firms submit to prospective clients networks of
proposed promotional campaigns, showing how the activities involved in product
distribution, space advertising, television and radio commercials, surveys, and
other facets of the campaign are to be coordinated. The implementation of a
computerized management system has proved to be a type of project that is
difficult to schedule and control; now it is not unusual for project networks
to be submitted to management, along with flow charts, proposed report for-
mats, and other elements of proposed projects, and for the networks to be
updated weekly or biweekly to maintain status control over such implementa-
tion projects.
CONTRACTUAL REQUIREMENTS
As mentioned in Chapter 1 and elsewhere, the use of network methods has been
boosted greatly by contractual requirements that network methods be used to
report the plans and progress of projects. This has been particularly true in the
two largest project-oriented industries, aerospace and construction. In the aero-
space industry, where a major customer is the U. S. Government and its various
military and space agencies, the accommodation to network requirements was
widespread and relatively quick. Contractors in the aerospace industry are ac-
Comments on Practical Applications 1167
2 . Level of Detail. The best way to specify the desired level of network
detail is to specify a range of the number of activities to be included. The
range selected, however, should be based on practical experience with the
type of project involved.
3 . Graphic Format. If a particular network format is desired, such as the
activity-on-arrow or the activity-on-node format, this must be specified.
As mentioned above, the best way to do this is t o refer to an available text
and adopt the terminology used in that text to write this specification.
One may also elect to have progress reports submitted in the network for-
mat rather than in computer reports. This may also be specified.
4 . ComputerReport. If computer reports are to be required, the data de-
sired on the reports should be spelled out, item for item. The desired
sequences (sorts) of the reports should also be specified, taking care not
t o require more reports than will actually be used. (See Chapter 11 for
more complete discussion of computer methods.) Normally two output
sorts, one by I-J or activity number and one by total float, should be
adequate.
5 . Updating. As described in Chapter 11 some updating procedures give
misleading or erroneous results. Therefore, it may be necessary to refer-
ence or to fully describe the updating calculation required. The frequency
of updating reports, number of copies desired, whether revised networks
are required, and similar details should be mentioned. In this connection,
it should be noted that a requirement to maintain a network on a time
scale may increase the updating cost.
6 . CostReporting. If the network is also to be used for reporting the cost
of work completed, the specific means of allocating all costs to activities
and of determining the percent completion on activities must be fully
detailed.
IMPLEMENTATION
Generally speaking, the implementation of critical path methods involves the six
steps outlined in Chapter 1 and summarized as follows: (1) planning, (2) time
and resource estimation, (3) scheduling, (4) time-cost trade-offs, (5) resource
allocation, and (6) updating and controlling the project.
However, it should be emphasized that the full application of all the tech-
niques presented in this text is not required in order to accomplish these steps
and obtain worthwhile improvements in the plan and conduct of projects. Nor
is tke size of the project a critical factor in the practical economic implernenta-
tion of critical path methods. Networks sketched on the backs of envelopes
have proved to be useful ways of quickly analyzing and communicating the plan
of a small project, such as the preparation of a technical report. The use of addi-
Comments on Practical Applications 169
tional techniques, such as the PERT statistical approach and time-cost trade-o s k
may also be applied in concept, if not in full detail, to relatively small projects.
Thus, the implementation of critical path concepts can be considered a matter
of routine management practice, rather than an investment justified only for
large or complex projects. II
The implementation of network planning and control techniques should take
place after a preliminary study has been made to determine how the project
tasks are to be broken down and assigned to key personnel within the organiza-
tion or to subcontractors. In large projects, particularly in the aerospace indus-
tries, this preliminary study is quite important; it fust requires that the overall
mission and performance goals of the system be refined to the satisfaction of the
systems engineer. Then, the functional analysis of the system can begin, which
will lead to the design requirements for the proposed system configuration. The
establishment of the base-line design requirements is a major milestone in the
systems engineering portion of a program definition study. It is at this time that
the formal application of network methods can be made most effectively.
I
Utilizing Personnel Effectively
The preparation of the project network is a job for the key management of tke
~
project, the person or team of persons who know the most about the objectives,
technology, and resources of the project. To conserve the valuable time of these
personnel, the networking effort should be a concerted and concentrated one,
not a secondary activity that becomes drawn out and perhaps never completed.
There is a period of time that management must devote to planning, and the
network should be used as a vehicle for, an aid to, and a documentation of this
valuable effort. Technicians can relieve much of the load on the project man-
agement by transcribing sketches into legible networks, by making computa-
tions, and by making preliminary analyses of the schedule. For this reason,
many organizations have trained young men and women as part-time or full-time
critical path analysts.
Ii
Working with Subcontractors
When subcontractors play a major role in a project, they should play a majbr
~
role in the critical path planning, scheduling, and control. In some cases this
may require group meetings to develop the network and time estimates. How-
ever, in many instances it is not practical to call in a group of people unfamiliar
with network theory and expect them all to contribute effectively to the early
draft of a network. In these circumstances it may be better for the prime con-
tractor to develop the rough draft as far as possible, then call in the subcon-
tractors to comment and add time estimates to their particular areas. It is often
170 1 I Basic Topics
possible for a person to read and effectively criticize a network, even though he
may not have the training or experience to develop a network originally. One
may also elect to hold short courses in network preparation, then ask each sub-
contractor to develop a subnetwork of his portion of the project. The feasibility
of this approach depends not only on the size of the project and the scope of
interest of the subcontractors, but also on how complex are the interrelation-
ships among the various areas of responsibility.
Incidentally, one of the important side effects of critical path applications is
the fact that it brings the subcontractors and the prime contractor together to
meet and discuss the project. The group generally discovers technical problems
and begins to work in advance toward solutions of these as well as in coopera-
tion on the planning and scheduling of the project.
PROJECT CONTROL
Once a project is underway, the critical path network and schedule should serve
as a guide to the accomplishment of every activity in proper sequence and on
schedule. It is in the fundamental nature of projects, however, that activities
will seldom start or finish exactly as scheduled. Therefore, updating the plan
and schedule is an important link in the critical path concept. There are no
rigorous or standard updating procedures in general use, except where com-
puter programs are involved. The procedures offered here are suggestions regard-
ing the general approach, with some specific recommendations for particular
circumstances.
There are four functions performed in the process of updating the schedule
alone (without regard to cost revision). These are:
Item 2 simply requires the erasure of previous notation and replacement with
the new. The other changes may be categorized as Progress Notation and Re-
vised scheduling.
Progress Notation
A field supervisor or other person close to the actual progress of a project should
be assigned the responsibility of making progress notations directly on a copy of
the network. This is the most reliable way to maintain accurate records for in-
Comments on Practical Applications
supervisor to make these routine daily or weekly notations also helps insure that
the network serves its purpose as a detailed schedule of work.
I
I
Exactly how the notations are made is not particularly important, as long as
they are clearly understood and complete. To be complete it is necessary only
that both the actual start and the actual finish of each activity be recorded.
Percent completion notes are not normally required, except where cost control
data are involved.
On the working copy of the new network used to make these notations, it is
J
often useful to use colored pencils for the notation, using a different cola f o r
each updating period. Then when converting the notes t o computer idput
forms, the person doing the encoding knows to pick up only the green date$, or
whatever was the color of the most recent period.
1
If the node scheme is used, the actual start and finish dates may be marke on
the left and right sides of the nodes, respectively. If the network is computed
manually, the node symbol may be designed to allow spaces for the actual dites
to be recorded.
Revised Scheduling
a specific delay will affect other portions of the project. With this information
plainly visible, it is not always necessary to erase and recompute. Recomputa-
tion of the backward pass is not necessary at all if no changes are made in the
network logic or in the estimated activity duration times. If the scheduling
computations are made by computer, then the revision procedures specified by
the computer program must be used.
Time-Scaled Networks
A "time-scaled" network is one in which the arrows and nodes are located by a
time scale along the horizontal border. With the time scale, the length of each
activity arrow (or its shadow projection on the horizontal scale) represents the
activity's estimated duration. The location of the arrow represents its scheduled
start and finish times. Similarly, the location of each node represents its sched-
uled occurrence time. The arrows and nodes may be located by their earliest
times, latest times, or at selected times between these. Slack is customarily in-
dicated by dashed lines.
The obvious advantage of time scaling is the visual clarity it provides for the
analysis of concurrent activities. Time-scaled networkshave revealed problems of
concurrency (such as the intended use of a test facility by two groups at the
same time) that were overlooked in the analysis of the schedule data in the
tabulated form of a computer output. Time-scaled and condensed networks
are also advantageous in presentations to top levels of management, since the
schedule is communicated more quickly and more emphatically by the graphical
technique.
The disadvantage of time-scaling is not so obvious but is nonetheless impor-
tant. Using manual methods, the maintenance of time-scaled networks through
updating and revision periods is expensive. A change in one time estimate or a
delay in the actual progress on one path can change the location of a number of
succeeding arrows and nodes, necessitating the redrawing of a large portion of
the network. Under contracts that require frequency network revisions, the use
of time-scaled networks could keep a tec cian or draftsman busy almost full-
time, and the networks could be delayed days or weeks in reaching the con-
tracting agency.
Many attempts have been made to simplify network revision, so that t i e -
scaled networks could be quickly and economically updated. Listed below are
some of the materials and techniques that have been tried.
i
174 1 I Basic Topics
Figure 6-2 Time-scaled network with resource summary. Activities arescheduled to limit
designer requirements to two and welders to four.
and cost economics of the project that the time-scaled network should also be
used to monitor the project progress. As mentioned above, however, project
monitoring with time-scaled networks is practical, only if there are relatively few
activities and the project management is centralized enough that copies of the
network do not have to be distributed. An example is the overhaul of electric
utility equipment where the network is set up in a "control room" where the
project supervisors gather to discuss changes, revise schedules, etc.
Computer software has advanced to the point that time-scaled charting by
computer is much more practical than manual methods in many applications.
This trend can be expected to continue. At this writing, however, it is still
advisable to be cautious about the expense of maintaining time-scaled networks.
Since the construction industry is one of the major users of network methods,
it is well t o consider some of the practical "tricks of the trade" in construction
applications. In an informal survey of firms for the third edition of this text in
1980-81, the authors found that network practitioners in the construction
industry varied widely in their level and style of network use. The larger engi-
neering and construction management firms tended to have planning and sched-
uling departments with trained personnel and computer systems (or frequent
Comments on Practical Applications 175
access to an outside computer service). The smaller firms often employed sched-
uling consultants on a project basis, sometimes on their own initiative but more
often because the project owner or architect required network-oriented plbns
and progress reports. Smaller scale homebuilders, paving contractors, subcbn-
tractors, and other types of firms may not use the techniques at all or may hgve
had only limited exposure via a general contractor.
The practices of some of the scheduling consultants was of interest beca se 1
of their full-time, professional attention to network methbdology and tdeir
variety of applications. Two examples of such firms are illuminating.
I
DDR International is a consulting firm based in Atlanta, Georgia that special-
izes in construction planning and scheduling for general contractors, owners, dnd
architects.' DDR uses computer processing of networks only when required by
the client, which is seldom. Rather, they employ time-scaled networks to c n-
vey both the sequence and the schedule aspects of project plans. Networks L e
I
prepared on tracing paper with translucent mylar labels for activities. The lablels
have adhesive backing that permits moving them around on the chart at will.
The activities are placed on the time scale according to "scheduled" starts ratKer
than ES or LS times. Updated progress is denoted directly on the network, in-
cluding notation revealing the ahead or behind schedule status of each path. The
activities are not rescheduled, however (meaning a revision in the network), tin-
less a significant change is made in the project plan or schedule.
A major purpose of the DDR technique is to keep the schedule from becoIn -
ing too complicated for client personnel, including managers, field supervisoks,
subcontractors, and architects. Computerized analysis and their tabular reports
are considered objectionable for this reason. The most essential facts of the plhn
and schedule can best be communicated, according to the consultant, by time-
scaled networks based on agreed-upon "scheduled" start times for each activity.
Forward and backward passes are made manually to identify the critical path,
but the computations are not otherwise documented.
For an example of this kind of network presentation, see Figure 6-3. No e It
that the format appears to be activity-on-arrow,sinceeachactivityisrepresentkd
by a time-scaled bar. However, the bars are interconnected by dependency lines
following the activity-on-node or precedence method. The network is actually a
precedence diagram, and leadbag factors are sometimes employed. DDR pdr-
sonnel feel that precedence diagramming of this type is "two or three timks
more effective" than the arrow format.
DDR consultants occasionally assist their clients in resource leveling, whe e
one. two, or three crews of given type may need to be scheduled. This is alwais
1
done manually, usually as the network is prepared originally. They do not offer
network-integrated cost control systems, but they do produce cash requirements
schedules and earned value reports, such as those shown in Chapter 5.
Hanscomb Associates, Inc. is a large international engineering and constru
176 1 I Basic Topia
\\
\
!
8 [\
I
I'
FIRE M
*.
PROTECTION PIlPllC r l l t P l O l l C l l O " 1~1~111C111011
'\
7 '\
A
\
..
_ ~~~_.
..
..
._-
._-
..
..
..
..
.___
! 7
........................................................... 2
TAROET
DES(OI1-I-
1 -- DOMlEWTS S M W h E
.lS,*I~ 11111'1C111~11 l1lC.10" COY*,", ...............
4 JAMSOFI COUNTY JAlL BUlLMNO P'
m u m E D FOR
PRElOLE AND PATRICK 1
Figure6-3 Continued 1
178 1 I Basic Topics
tion management firm. They provide a wide range of semices for the construc-
tion industry, only one of which is project planning and scheduling. Several of
the offices of the firm maintain specialists in network methods. Each office is
independent, however, in the methodology employed. Some favor computer
methods and some favor manual methods. At this writing, the Chicago office of
the firm preferred computer methods, using one of the most advanced and flexi-
ble software packages. The Atlanta office never used computers, favoring time-
scaled network presentations instead. As with some other consultants, the
specialists at the Atlanta office of Hanscomb explained that an overriding con-
sideration in their practice was the communication of clear and essential facts
to their client. To avoid confusion or excessive detail they do not even make
forward and backward passes; the critical path and near critical path is revealed
by the time-scaling process when the network is prepared. For an example of a
Hanscomb (Atlanta Office) network, see Figure 6-4. The network is based upon
"scheduled" start t i e s for each activity, not necessarily ES or LS times. The
flags denote significant start dates or key delivery dates. The solid portion of
the bars denotes completed work.
According t o a senior project manager at Hanscomb, general contractors "do
not want and will not pay for computer outputs." They also do not allocate
resources, employ time-cost trade-off methods, or apply a network-integrated
cost accounting ~ y s t e m . ~
In both of the above examples the consultants stress the necessity for clear
communication with the project management and field personnel, unencum-
bered by details or sophisticated calculations that may confuse the most im-
portant facts of the schedule. They also stress economy and efficiency in
methodology. Other practitioners, however, employ some of the most advanced
computer systems and exercise a greater degree of control over the construction
process. The variation depends upon the types and sizes of projects, the skills
and styles of project managers, the preferences of the consultants (if involved),
and other factors.
While this text deals primarily with network techniques as they apply to plan-
ning, scheduling, and controlling projects, it is important to recognize that
successful project management encompasses a broader body of knowledge. In-
deed, it appears that the development of network methods as a distinctly differ-
ent approach to planning and controlling projects has helped to focus manage-
ment theorists and educators on other differences in projects as compared with
other forms of endeavor. The term "project management" (synonymous with
"program management" in government parlance) has now become a recognized
subdivision of management theory. Libraries often list a number of titles under
180 1 I Basic Topics
the subject of project management, usually in the 658.4 series of Dewey Decimal
codes. Courses are offered in the subject by universities, business firms, and
government agencies.
In addition to the quantitative and graphical methods that aid in project
management, the broader subject now encompasses the human and organiza-
tional aspects that distinguish project-oriented endeavors from the more con-
tinuous or process-oriented endeavors. The successful management of projects
is recognized as requiring different supenrisory skills, different definitions of
authority and responsibility, different criteria for the selection and evaluation
of personnel, different operating policies, and other aspects of management.
The reader who wishes to study these topics in greater depth is referred to other
texts, such as Galbraith? Kerzner? and art in.^
Nevertheless, it is well worthwhile here t o identify and comment briefly upon
some of the key issues in the human and organizational aspects of project man-
agement, in order to introduce the reader to the broader subject and to help
place network methods in perspective.
Type of Business
One of the first factors governing the role of project management in any situa-
tion is the degree of project orientation characterizing the business of the
organization. Here we use "business" to mean the overall line of endeavor,
whether it is run by private enterprise, governmental, educational institutions, or
others. At one end of the spectrum are the businesses that produce a continuous
stream of products, goods, and services. Of course these businesses include
manufacturing, mining, chemical processing, financing, insurance, hospitality,
health care, and many others. These businesses tend to be characterized by high
volumes of repetitive operations, which lend themselves to high degrees of effi-
ciency in the use of labor, materials, and facilities. For want of a better term, let
us categorize these businesses as the "process" type.
At the other end of this spectrum are the project-oriented businesses. Major
examples are the construction industry and research and development. As de-
scribed in Chapter 1, these endeavors are characterized by limited repetition,
uniqueness, and defmed time limits for goals or results.
Between the two ends of this spectrum there are many businesses that consist
of both process and project features simultaneously, or which shift back and
forth from a process mode to a project mode. Examples include job shop manu-
facturing, where product changes occur frequently; advertising and sales pro-
motion, where the goals and the methods undergo frequent revision; and any
business that is frequently expanding, adding facilities, changing products or
services, or developing new concepts while also producing a volume of products
or senrices.
Comments on Practical Applications 181
Organizational Structures
Manager
I
Manufacturing
r I 1
I I
Department
level
For these reasons the traditional structure is not likely to be suitable for
project management unless the project is very large and expected to live for
several years, and the sharing of resources with other projects is unnecessary or
undesirable.
The line-staff structure is much more common, especially where both process
and project activities exist together. As pictured in Figure 6-6 (adapted from
Kerzner5), the project leader or manager is in a staff relationship to the line
managers. In this position the project manager temporarily employs the re-
Comments on Practical Applications 183
General
manager
Project
manager
I
Manufacturing
manager manager manager
Figure 6-6 Typical line-staff organization. Solid lines represent formal authority; dashed
lines represent informal authority or liaison.
sources of the mainline departments to carry out the project. (See also Youker7
and Stuckenbruck?)
The key to the effectiveness of the line-staff structure lies in the balance of
authority between the project and department managers. In some cases the
project manager is only a coordinator whose prime responsibilities are to at-
tempt to "influence" the department managers to keep up their schedules on the
project and to keep the general manager informed of the status. As explained
by Kerzner and Galbraith, project managers in this role must depend on their
personal competence and their political or interpersonal skills in order to be
effective. (To illustrate this relationship graphically, one might revise Figure 6-6
to place the project manager's box below the level of the functional managers.)
More about this coordination role will be mentioned in the next section.
In some cases, more clearly defined authority may be assigned to the project
manager. Personnel, equipment, and facilities may be temporarily but fully re-
assigned from the departments to the project. Martin calls this the "partially
projectized management" scheme. In these situations the personnel have a
"home" t o return to when the subject is done, and their merit reviews and career
plans continue to be managed by the functional department heads.
Obviously the line-staff approach has some strong advantages:
1. Resources are effectively shared, thus minimizing losses due to idle time or
duplicate effort.
2. Important technical skills continue to be developed and maintained in the
line departments.
3. The project manager can concentrate on the product of the project with-
out being distracted by support functions.
2. The general manager's skills are crucial in setting up the proper degrees of
authority and in adjudicating conflicts that arise through the project.
3. Projects conducted under this structure tend to overrun schedules and
cost estimates, due to the lack of clear priorities and full authority for
execution.
General
Manager
Functional
units
+
E
&
-
2
E
.-a
0
L
technical training and guidance, and merit reviews. At any one time, a tech-
nician is also assigned to a project and receives specific task direction from the
project management.
Thus the technical staff person has two bosses, which would appear to be a
confusing weakness in the structure. However, practitioners of matrix manage-
ment point out that the multiple boss situation is common; it begins from the
time one is born with two parents, and continues through school days and even
into traditional corporate and government organizations. Even the production
line supervisor in a single-product plant is aware of the separate authorities of
his department manager, the quality control manager, the personnel director,
the union steward, and perhaps others. Thus the two-boss arrangement in a
matrix organization is not unique nor necessarily confusing. (See ~leland.")
The project manager in a matrix enjoys the advantage of more clearly defined
authority and responsibility. He or she should not have to cajole or influence
functional heads in order to carry out the project tasks. The matrix does require
that the project and functional leaders have a mutually cooperative relationship,
but the matrix structure itself can enhance that relationship by its equal recogni-
tion of both sides of the organization, thus providing a unifying set of goals for
the organization as a whole.
Other advantages of the matrix are:
Clearly, the matrix structure is most appropriate for operations that are pre-
dominantly project oriented, such as engineering and construction firms, re-
186 1 I Basic Topics
search and development organizations, and the like. However, the matrix has
also found wide application in some process businesses for a variety of purposes.
For a more complete discussion see Cleland.lo
The reader is reminded that this review of the organizational aspects of
project management is offered as a brief introduction to the subject. More com-
prehensive treatment is provided in other texts.
REFERENCES
Resource allocation is probably receiving more attention today than any other
aspect of PERT/CPM. One reason for this is the worldwide inflation spiral since
the oil crisis of 1973-74, which has pushed the cost of resources required for
project execution higher and higher (thus making them relatively more impor-
tant). Another reason is that soaring interest rates have significantly increased
the cost of borrowing money, which directly affects many large plant construc-
tion and capital investment projects. Slippage of such loan-financed projects can
have a devastating impact on project budgets and cost expectations.
Another reason lies in the continued advances in computer technology over
the past two decades which have made more cost-feasible the application of
sophisticated solution procedures that are often necessary when resource limita-
tions enter the project scheduling picture.
The basic PERT/CPM procedures which produce a detailed project schedule
are limited in the sense that resource availabilities are not considered in the
scheduling process. Those basic procedures implicitly assume that available
resources are unlimited and that only technological (i.e., precedence) require-
ments constrain job start/finish times. One consequence of this is that the
schedules produced may not be realistic when resource constraints are con-
sidered. For this reason the basic time-only PERT/CPM forward-backward pass
procedure has been called by some seasoned users, "a feasible procedure for
producing nonfeasible schedules."
It is important to note in discussing the subject of resource constraints here
192 11 I Advanced Topics
that timelcost trade-off procedures are not included. Those procedures typi-
cally assume unlimited resources, are basically different from the procedures
discussed in this chapter, and are covered in the Appendix to Chapter 8. Of
course, alternative project durations and costs could be covered in the context
of simulation of alternative critical resource levels and their associated costs.
Such an approach is possible with the procedures discussed here, but it requires
extensive computational resources.
Resource constraints, while increasingly important, also unfortunately com-
plicate and alter some of the basic notions of PERTICPM. For example, the
longest sequence of activities through the project when resource availabilities
are constrained may not be the same critical path determined by the basic time-
only PERTjCPM approach. Another difference is that with the basic time-only
procedures there is one unique Early Start time (ES) schedule, while under
resource constraints many different ES schedules may exist. To understand
these differences it is necessary t o look at how limited resources affect sched-
ule slack (float).
V
k Duration, days
I
I
Ib) I f jobs C and G
each require a
1 J
&---{
crane, but only one
is available, and jobs
l&l---+ =A
E and F each FI---~
require a bulldozer
but only one is
available.
B
------
I I I I I I I I I I I I 1 1 1 1
I)
5 10 15 18
from the one shown here, would be another ES schedule for the resource-
constrained case.
MULTIPROJECT SCHEDULING
I
Time
I
Time
L
Time
Resource 1 Resource 2 Resource 3
Figure 7-3 Example of rnultiproject scheduling interactions.
RESOURCE LOADING
One of the main advantages of the network model for project planning is the
ease with which information about resource requirements over the duration of
the project can be generated. The only condition for obtaining this information
is that the resource requirements associated with each project activity shown on
the network be identified separately.
For example, Figure 7-4 shows the same network as Figure 7-1 with man-
power requirements of two different types indicated above each activity. By
utilizing these resource requirements in conjunction with both an early-start
(3. 1)
Activity no.
k Duration, days
schedule (such as shown in Figure 7-2(a)) and a late-start schedule (not shown)
the protides of resource usage over time as shown in Figure 7-5 are obtained.
These profdes are commonly called resource loading diagrams. Such diagrams
are extremely important in project management; they highlight the period-by-
12 -
- Resource A
10-
8-
-
4 - I
-----J
@= 2- I
e 1-
I
I
.-z 0 ' " ' I I I I I I I I I I I I I
3
C 5 10 15 18
a, Days
e
Resource B
Days
11 1 total units
avg. daily requirement = = 6.2 unitslday
18 days
198 11 I Advanced Topics
ES Schedule L S Schedule
1 5 5 3 3
2 5 10 3 6
3 5 15 3 9
4 9 24 3 12
5 9 33 5 17
6 9 42 5 22
7 9 51 5 27
8 9 60 5 32
9 6 66 9 41
10 5 76 10 51
11 5 76 9 60
12 5 81 9 69
13 5 86 9 78
14 6 92 6 84
15 4 96 6 90
16 5 101 7 97
17 5 106 7 104
18 5 11 1 7 111
Figure 7-6(s) Early and late start schedule requirements of resource A, network of Figure
7-4.
Days
Figure 7-6(b) Cumulative resource requirements of resource A, network of Figure 7-4.
Resource Constraints in Project Scheduling 199
5 1,000.000 -
3
4.rn
C
C
8
-
+
0
w
E,
C
w
.-
-
4-
2 /
/
/
5
U /
/
0 65 165 200
t
Start
t
Project
time duration
Figure 7-7 Cumulative requirements curves for hypothetical concrete pouring example.
The use of this average for estimating resource criticality, as in the previous
example, will lead to a conclusion that concrete is not a constraining resource.
But this is misleading; this average is clearly a lower level of usage than is really
required, because the usage is projected over the entire project duration instead
of the shorter period of actual need. A better measure of the average require-
ment is given by Line 11, which is drawn from the start of the ES curve to the
total cumulative requirements level at the end of the ES curve. The average
requirement given by the slope of this line is calculated as:
1,000,000 cu. yds.
avg. daily requirement over actual use period =
(185 - 65) days
= 8333 cu. yds./day.
Praject end
start Days
Figure 7.8 Illustration of resource lower bound calculation from cumulative resource
requirement curves.
The task of scheduling a set of project activities such that both precedence rela-
tionships and constraints on resources are satisfied is not an easy one, even for
projects of only modest size. The difficulty is increased if simultaneously some
objective such as minimum project duration or minimum total cost is sought.
Resource Constraints in Project Scheduling 203
There are two general methods of applying heuristics in project resource alloca-
tion problems. A serial scheduling procedure is one in which all activities of the
project are ranked in order of priority as a single group, using some heuristic,
and then scheduled one at a time (i.e., serially). Activities that cannot be started
at their early start time are progressively delayed until sufficient resources are
available.
In parallel scheduling, all activities starting in a given time period are ranked as
a group in order of priority and resources allocated according to this priority as
long as available. When an activity cannot be scheduled in a given time period
for lack of resources, it is delayed until the next time period. At each successive
time period a new rank-ordering of all eligible activities is made and the process
continued until all activities have been scheduled.
Even though the parallel method requires more computer time to reorder the
eligible activities at each time period, it appears to be the more widely used of
the two methods, being employed in a number of commercially-available com-
puter programs for project scheduling. The only published research comparing
204 11 I Advanced Topics
RESOURCE LEVELING
-
(31 Delay Gone per~od
Z R Z 1116
K.
.critics1 activity
Figure 7-lola) Comparison of Burgess leveling criterion for neiwork of Figure 7-4.
1
: :
'2
"
[---J-t-c n
Before leveling
/IESschedule)
' (After
'
leveling
L-l
L-----A %---
L-J
Days
g
'5
m 9 -
10-
E! 8- ,----t
m
s
f
7 -
6.
I I
E! 5 -
C
, 4-
3 -
I
S 2-
1 - L-1
1 1 1 1 1 1 1 1 1 1 \ 1 1 1 1 1 1 /
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Days
Figure 7-10lbl Resource profiles before and after application of Burgress procedure.
ever, this can be done only at the expense of increased variability in the level of
resource B, with a corresponding increase in the total sum of squares.
Burgess' ideas are utilized in a recent paper by Woodworth and who
present a multiproject approach in which the sum of squares smoothing criterion
is applied to each resource sequentially, across all projects. Although the authors
do not make it explicit, the procedure would presumably be applied to resources
in some descending order of criticality (i.e., most critical resource first, etc.).
208 11 f Advanced Topics
The process of resource leveling as illustrated above will smooth the profiles
of resource demand to the extent allowed by available activity float. But this
process does not always produce satisfactory schedules if the amounts of avail-
able resources are tightly constrained. The final profiles of resource usage in
Figure 7-10(b), for example, show levels that might still exceed the maximum
amount of resources available. What would happen, for instance, if the amounts
of Resource A and B were limited to, say, 6 and 7 units per day, respectively?
The answer to this question requires the use of the second category of pro-
cedures mentioned previously, called fixed resource limits scheduling. Also
often called constrained-resource scheduling, or limited resource allocation,
these are techniques designed to produce schedules that will not require more
resources than are available in any given period, with project durations which are
increased beyond the original critical path length as little as possible.
An example flow chart of this type of scheduling procedure is shown in
Figure 7-11. The procedure will be applied to the same sample network of
7START
Calculate initial early start (ES) and late start (LS) time for each activity
in the project, and set time now equal to 1, i.e., T = 1.
f
Determine the initial eligible activity set (EAS), i.e., those activities with
all predecessor activities scheduled.
1
Fmm among the members of the current EAS, determine the ordered
-scheduling set (OSS) of activities, i.e., activities with ES 5 T , ordered
according to LS with smallest values first and within this characteristic,
according to least activity duration first.
t
Consider the activities in OSS in the order listed and schedule those
activities for which sufficient resources are available for the duration of
the activity. A s activities are scheduled update the level of resources
available, and update the members of EAS.
t
Have all activities been scheduled,
i.e., is EAS an empty set?
t
No
yes -m
Set T new = T old +1 and compute new ES times for the updated
EAS. I
~ - - - -- -.
Figure 7-4 that we have been using, but with the amounts of Resource types A
and B available limited to 6 and 7 units per period, respectively.
The procedure involves a parallel approach (stepping through time, period-by-
period). First a set of activities is defined whose predecessors are all scheduled;
this is called the Eligible Activity Set (EAS). Then, only the activities in the
EAS with ES less than or equal to some time value T are considered. These
activities are ordered with least slack first and, within this criterion, with short-
est duration first. This ordered list of activities is referred to as the Ordered
Scheduling Set (OSS).
The bookkeeping for this scheduling procedure can be simplified by ordering
the activities in the OSS according to their late start time (LS) instead of by
slack. The minimum-LS ordering is identical t o the ordering obtained by using
minimum slack, as shown in Reference 4. However, an advantage is that the LS
values do not change from time period t o time period, whereas slack values con-
tinuously decrease for an activity that is ready to be scheduled in a given period
but is not scheduled.
The complete schedule shown in Figure 7-12 can be obtained by continuing
ACTIVITY Time
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
L ~ Y ~ I O ~ A ~ ~ ~ $ B P B B B ~ ~ B G
u n a s r i g n e d $ $ $ ~ 4 a 3 P ~ 2 2 $ 3 3 ~ 4 4 4 14 11
1 1 1 1 1 0 0 0 0 i x t 1 o o
0 0 0
level of^ 1 f f I f f f f j # I I i f ? # i i f I f i
" n a a i g n e d % 5 5 $ # $ $ d B 4 4 $ $ $ d p l $ 5 5 3 3 3
1 1 1 2 2 5 5 5 5 4 4 4 3 4 4
Figure 7-12 Application of basic scheduling procedure to network of Figure 7-4.
210 11 I Advanced Topics
the above procedure as indicated in Figure 7-13. The final schedule shows that
project completion is delayed 4 days past the early finish time of 18 days com-
puted for this project without regard to limits on available resources.
The procedure illustrated by this example represents a potentially powerful
general approach to a broad class of scheduling problems. The procedure can be
applied to multiple project problems as well as single projects. For the multi-
project case, project start and end dates for each project are necessary. This in-
formation is used to compute total activity slack (float), or the equivalent late
start times, to permit determination of the order in which various activities
are considered for scheduling. It should also be emphasized that the number
of resources being considered is not limited by this procedure but only by the
capacity of the computing system being used. The basic approach illustrated
by this simple example is, in fact, essentially how the majority of heuristic-
based constrained-resource scheduling systems operate, including some large
commercially-offered computer programs. However, the basic steps indicated
here are often embellished considerably to permit more realistic simulation of
the numerous variations followed in the actual practice of scheduling project
activities. Some examples of these embellishments will be given later.
If a heuristic other than minimum slack had been used for ordering the activities
in the OSS,a different schedule might have been produced for the example net-
work. The min-slack heuristic was used here because it has been found, in sev-
eral studies, to generally produce the best results. For example, a 1975 study4
comparing the 8 rules shown in Table 7-1 showed that the minimum slack rule
generally outperformed the 7 other rules, as shown in Figure 7-14. These results
were based on a sample of small (i.e., 27-activity) multiresource problems for
which the optimal solution, in terms of minimum schedule duration, could be
calculated. A different study which involved larger networks fronl actual prac-
tice ranging in size up to 180 activities showed that either a Late-Start (equiva-
lent to min-slack) or Late-Finish heuristic was most effective for both parallel or
serial allocation procedures.10 However, that study also concluded that the
choice of allocation procedure (i.e., parallel or serial) was of greater significance
in some cases than the choice of scheduling heuristic.
Although individual studies such as the two cited above have indicated the
general best-effectiveness of a particular heuristic, or type of heuristic, it must be
emphasized that all such studies have also shown that no one heuristic-or com-
bination of heuristics-always produces the best results on every problem. This is
perhaps the greatest disadvantage of heuristics: Rules that perform well on one
problem may perform poorly on another, and vice-versa. In practice, even with
more sophisticated procedures, it is not possible to absolutely guarantee in ad-
T- 1 T = 12
EAS: A B EAS: I E F
ES. 1 1 ES: 12 12 12
LS: 1 5 Ls: 10 11 11
OSS: A 8 DSS: 1 E F
Schedule A i n periods 1-3 and remove i t Schedule I i n periods 12-15 and remove it
from EAS. from EAS.
Schedule B i n periods 1-5 and remove i t Schedule E and F i n periods 12-14 and
from EAS. remove them from EAS.
Add C. D, and G t o EAS. Add J and H t o EAS.
T=2 T = 13
EAS: C D G EAS: J H
ES: 4 4 6 ES: 16 15
LS: 4 9 10 LS: 14 14
0%: None-No activities can be rched- DSS: None-No activities cmn be sched-
"led. uled.
-
S~ncem8nlmum ES 4, r k l p T = 3 and go t o
T=4.
Since minimum ES = 15, skip T = 14 and
gotoT=15.
T =4 T = 15
EAS: C 0 G EAS: J H
ES. 4 4 .6 ES: 16 15
LS: 4 9 10 LS: 14 14
OSS: C D OSS: n
Schedule C i n periods 4-9 and remove i t Schedule H i n periods 15-19 and remove it
from EAS. from EAS.
A D D I t o EAS. T-16
t5: 10
EAS. D G I
LS: 14
ES:
LS:
ncc.
5
9
n
6
.- --
10
05s: J
T =6 T = 17
EAS: D G I EAS: K
ES: 6 6 9 ES: 18
Ls: 9 10 10 LS: 16
OSS: D G 055: Nona-no sctiviries can be sched-
Schedule G i n priods 6-9 and remove it uled.
from EAS.
Since D can be scheduled no sooner than T=18
perlod 10 because of resource con- EAS: K
straints, t o go T = 10 = ES of I. ES: 18
LS: 16
T = 10 OSS: K no activities can be sched-
EAS: D I uled since K can be
ES: 10 10 scheduled n o sooner
LS: 9 10 than period 20 because
oss: D I of resource constraints,
Schedule D i n perrods 10-11 and remove it go t o T = 20.
from EAS.
T=20
Add E and F t o EAS.
EAS: K
T = 11 ES: 20
EAS: I E F LS: 16
ES: 11 12 12 OSS: K
Ls: 10 11 11 Schedule K i n periods 20-22 and remove it
OSS: I from EAS.
No actbvitier can be scheduled. All activities have been schaduled. STOP.
Figure 7-13 Details of bssic scheduling prwadure applied to network of Figure 7-4.
212 11I Advanced Topics
Minimum Activity Slack MINSLK Schedules first those activities with lowest
activity slack time (total float).
Minimum Late Finish Time LFT Schedules first those activities with the
earliest values of late finish time.
Resource Scheduling Method RSM Priority index calculated on basis of pair-
wise comparison of activity early finish
and late start times. Gives priority to ac-
tivities roughly in order of increasing late
finish time.
Greatest Resource Demand GRD Schedules first thoseactivities with greatest
resource demand in order to complete po-
tential bottleneck activities.
Greatest Resource Utilization GRU Gives priority t o that group of activities
which results in the minimum amount of
idle resources in each scheduling interval.
Involves an integer linear programming
logarithm.
Shortest Imminent Operations SIO Schedules first those activities with short-
est durations in an attempt to complete
the greatest number of activities within a
given time-span.
Most Jobs Possible MJP Gives priority to the largest possible group
of jobs which can be scheduled in an in-
terval. Involves an integer linear program-
ming logarithm.
Random Activitv Selection RAN Priority given t o jots selected at random,
subject to resource availability limits.
- - - - -- -
Note: The MINSLK rule has been shown equivalent t o a minimum-late-start-time rule.
Percentage of
problems for
which optimum
GRD
RAN
GRU
MJP
SIO
(a) Percent of problems for which optimal minimum duration solution was obtained.
(Optimal vs. nonoptimal totals include problems in which one ormore heuristic sequencing
rules produced a minimum duration solution.)
RSM 1 6.8% 1 J
RAN
GRD
Performed relatively worse
than a random rule
SIO
MJP 16.1% 1 1
(b) Percent increase above optimal duration.
*These programs vary widely with regard to approaches used in scheduling under resource
constraints Some, such as the McAuto "MSCS" package, allow the user t o choose from
among several available heuristic rules or even create his own. Others utilize one or more
built-in heuristic rules without allowing any user choice.
214 11 I Advanced Topica
Is c o n of schedule< Calculate c o n
b e n previous schedule?
Reschedule active
..
NO
Bookkeeping routine:
i=i+ 1 recalculate tentative
schedule for remaining jobs
freed up are available for assignment to the critical job. This reschedule routine
has essentially the same effect as a "look ahead" feature might have. However,
instead of actually looking ahead to predict the needs of critical jobs (which
would be difficult in the limited resources cases, since activities are not always
scheduled at their ES date), the model changes previous decisions as it moves
along from day to day by "taking back" resources that were assigned to jobs
in earlier periods which do not need them as much as the critical jobs.
If neither of the special subroutines (borrow resources or reschedule active
jobs) is successful, a minimum resource level schedule is attempted before the
start of the critical job is postponed. Then, after all possible jobs are scheduled
on day d , the add-on unassigned resources subroutine is called. In this procedure
a list of unused resources is compiled. A list of active jobs requiring these re-
sources that are not at their maximum allocation levels is also compiled, in
ascending order of slack. The assigned levels of these jobs is then increased,
until either jobs or resources is exhausted.
Whenever the program iterates to a new day (i.e., day d + I), the augment
critical jobs subroutine is tried. With this feature jobs previously scheduled and
still active are examined. If any of these is critical and has a resource level less
than its maximum-and if resources are still available-that job's resource alloca-
tion is increased as much as possible up to the maximum.
As the program moves from day to day it also updates all critical path data,
i.e., early and late start and finish times, and job slack. The importance of this
step is apparent, since a job's criticality may be changed through actions taken
by the model. For example, when resources are increased to a critical job the
resultant duration decrease might cause it to gain positive slack and become
noncritical.
When all jobs have been scheduled over all days, the cost of the schedule is
computed, including daily overhead expenses, due date bonuses or penalties,
and resource costs based on the assumed available levels. Depending upon the
cost of the schedule compared with previous schedules, the procedure is either
terminated or a new set of available resources is tested.
SPAR-1 is able to accommodate projects of several thousand jobs, and several
dozen resource types, under a variety of special assumptions, such as job split-
ting, shift or nonshift scheduling, variable resource limits, and single or multiple
projects. The results obtained from SPAR-1 on small tests problems have shown
that in some cases it gave nearly optimal results. However, no heuristic-based
program, irrespective of its complexity, can guarantee to yield an optimal proj-
ect schedule, or even consistently best results from problem to problem, as
noted earlier.
Analytic procedures, such as linear programming, can yield optimal solutions
consistently, but are restricted to relatively small projects with few special con-
ditions. For this reason, and in spite of their limitations, heuristic procedures
Resource Constraints in Project Scheduling 217
appear to offer, for the foreseeable future, the best approach for scheduling
realistic-sized projects under conditions of limited resources.
OPTIMIZATION PROCEDURES
Linear programming (LF') was first proposed as a method for solving the con-
strained-resource scheduling problem in the early 1960s. Numerous formulations
of the problem were proposed but found to be impractical except for solving
small problems of only a few activities. Wiest described the use of those early LP
formulations on the constrained-resource problem as "akin to using a bulldozer
to move a pebble."20 Wiest showed that a 55-activity network with four re-
source types would require more than 6,000 equations and 1,600 variables.
Later researchers improved on these early formulations and solved somewhat
larger problems. In recent years, with the increasing capability and decreasing
cost of computers, some researchers have once again begun to investigate the
use of linear programming procedures, either alone or in combination with
other approaches. An example of the latter type of approach is that of Patter-
son and Huber,14 who combine a minimum bounding procedure with integer LP
to reduce the computation time required in arriving at a minimum project dura-
tion. Essentially, their approach involves starting the optimization procedure off
with a "good" lower bound solution, to reduce the domain of possible solutions
over which the LP algorithm must search. The "minimum bound" they use to
initiate the search procedure is simply an estimate of the minimum project dura-
tion implied by the tightest resource constraint, i.e., if the cumulative resource
requirement of that resource is 80 units, and if 8 units per day are the maximum
available, then the minimum project duration = 8018 = 10 days. They tested this
approach on a series of small problems ranging in size up to about 20 activities
and 3 different resource types, with encouraging results, compared to those of
other LP approaches.
Another recent approach is that of ~ a l b 0 t . I ~He uses both integer linear
programming and implicit enumeration in formulating and solving resource-
constrained project scheduling problems in which job performance time is a
function of resource allocation, and total cost is used as an objective function.
His reported computational experience indicates that the methodology can
218 11 I Advanced Topler
23 60 0.20 0.07
27 60 0.76 1.02
35 57 2.61 19.17
43 3 5.84 60.75
233
A number of different branch and bound procedures for the project schedul-
ing problem have been developed by various researchers. One of the more effec-
tive to date is that of Stinson, et al., described in Reference 17. The details of
this procedure, which is designed for minimizing project duration, are sum-
marized in Appendix 7- 1, and illustrated on a small sample problem. An optimal
solution for the familiar example problem used throughout this chapter (net-
work of Figure 7-4) is also presented there.
To give some indication of the capabilities of the B&B approach, Stinson's
procedure produced the results shown in Table 7-2 for a sample of 240 artifi-
cially-generated test problems. Out of the total of 240 project-type problems
attempted (job-shop scheduling problems were also solved), optimal solutions
were found for 233, or 97%. The program was terminated short of optimality
for the 7 unsolved problems. In each case computer memory demand, not com-
putation time, was the limiting factor, with 500K bytes of memory storage on an
IBM 370-155 allocated. A representative 4-resource problem in the 43-activity
class is shown in Figure 7-16, with the optimal activity start t i e s .
Act No. Dur. Re& Ree Opt. Start Act No. Dur. Re+ Req. Opt Stan
1 0 0 0 0 0 0 22 5 2 6 6 1 48
2 4 3 2 4 2 0 23 1 3 2 4 1 39
3 6 6 2 3 1 0 24 1 2 6 4 3 43
4 6 5 4 3 2 6 25 1 1 1 2 4 44
5 2 1 3 3 1 6 26 5 6 3 6 1 43
6 2 4 1 6 2 12 27 6 6 2 2 6 55
7 3 4 1 4 5 4 28 3 5 1 5 1 40
8 5 1 2 2 2 12 29 3 3 3 2 4 45
9 7 1 5 2 3 17 30 7 4 3 4 3 48
10 6 6 1 5 3 25 31 5 2 5 3 3 61
11 8 6 1 6 3 17 32 2 1 3 5 5 53
12 2 5 1 6 6 14 33 3 2 3 3 2 '62
13 1 3 4 4 3 24 34 6 4 1 4 1 62
14 7 1 1 1 1 16 35 7 3 5 5 4 55
15 2 1 1 4 1 25 36 1 1 4 5 4 67
16 1 1 1 2 3 31 37 3 1 5 1 2 68
17 9 1 3 5 2 27 38 2 5 3 1 3 67
18 5 4 2 3 1 31 39 2 2 4 3 3 65
19 3 5 1 4 3 36 40 1 6 3 2 3 69
20 3 2 2 5 3 40 41 2 2 6 5 4 71
21 4 3 5 6 5 36 42 3 3 3 2 4 71
43 0 0 0 0 0 74
SUMMARY
REFERENCES
EXERCISES
1. Suppose the resource requirements associated with each activity in the net-
work of Figure 7-4 have changed t o the following levels:
Reaourca Constraints in Project Scheduling 227
Resource Requirement
Activity Type A Type B
A 3 2
B 2 4
C 3 1
D 4 3
E 4 0
F 2 2
G 3 1
H 4 4
I 6 4
J 4 1
K 5 4
a. Draw the ES and LS resource profiles.
b. Construct the cumulative resource requirements curves.
c. Calculate the lower-bound estimate of the average daily resource require-
ments of each type; use the internal tangent method where appropriate.
d. What is the criticality index for each resource if the following maximum
levels of each are available?
Type A Type B
Case 1 8 8
Case 2 7 7
e. What is the expected minimum project duration with Case 1 resource
limits of d above?
2. Using the Burgess leveling procedure and the revised resource requirements
above for the network of Figure 7-4, level the resource requirements as much
as possible.
3. Using the shortest-job-first heuristic (SIO rule in Table 7-1) instead of the
min-LS rule t o order activities in the OSS, reschedule the network of Figure
7-4 with the basic procedure of Figure 7-13. Use lowest job number in case
of ties.
4. Using the new resource requirements given in (1) above for the network of
Figure 7-4 and resources available of 8 type A, 8 type B, apply the basic
scheduling procedure of Figure 7-1 1.
5. Repeat exercise 4 above, but instead of using the Min-LS rule to order activ-
ities in the OSS, use the "Greatest Resource Demand" (GRD) rule shown in
Table 7-1. Use lowest job number in case of ties.
6. Schedule the example of Figure 7-4 using the Wiest procedure outlined in
Figure 7-15. Assume that only resource type A is required, that the activity
resource requirements of type A shown in Figure 7-4 are the "Normal crew
size" and that the maximum and minimum loadings are one unit more or
one unit less, respectively. Assume type A resources available equal 8 units.
Ignore schedule costs.
7. Verify the project schedule shown in Figure 7-9 using the Burgess algorithm.
APPENDIX 7-1
APPLICATION OF BRANCH AND
BOUND METHODS TO RESOURCE
CONSTRAINED PROJECT SCHEDULING
The description of the branch and bound method here as applied to resource-
constrained project scheduling is based on Stinson, Davis, and ~humawala."*
The version of the problem addressed is minimization of project duration, i.e.,
establishing a schedule of feasible activity start times such that the entire project
is completed in a minimum span of time. It is assumed that (1) resource require-
ments of each activity are at a constant level for each resource type during the
entire interval in which the activity is in progress, (2) the level of availability of
each resource type is constant over the entire span of project duration, and
(3) activities once started are not interrupted.
The B&B procedure for the resource-constrained scheduling problem consists
of creating nodes in the decision tree, which represent unique "partial sched-
ules." Each partial schedule represents scheduling decisions for some subset of
the total number of activities. The partial schedules created are always feasible
(i.e., they satisfy both precedence and resource constraints) and nonredundant
(no two schedules are exactly alike). Furthermore the solutions tree is exhaus-
tive in that every possible feasible project schedule will exist at the terminal
nodes of the tree.
The tree generation process starts with creation of an initial node representing
the set of activities which can be started at the beginning of the project (time 0).
From this point a family of partial schedules is created by branches with new
228
Resource Constraints in Project Scheduling 229
nodes to the tree; each node in the family created from a particular node has in
common with the others all scheduling decisions made previously in creating the
common parent node. However each is unique from the others in that it in-
cludes one new decision involving the scheduling of one or more activities pre-
viously unscheduled. Each branching operation therefore creates only as many
new partial schedules as there are feasible combinations ("feasible subsets") of
activities that may enter the schedule at some point in time, t,. Thus a partial
schedule, PS,, can be visualized as a real project in progress at time t,: Some
activities (the "complete set," C,) will have been completed at t,, others (the
"active set," A , ) may be actively in progress, to be finished at a later date, and
still others may be ready to be scheduled when all predecessor activities have
been completed.
The complete B&B procedure involves simultaneous tree generation and
"pruning," to prevent growth beyond unmanageable bounds. However the pro-
cedure is best understood by first showing the complete (i.e., unpruned) tree
for a sample problem; then techniques for pruning the tree will be described.
The small 4-activity project of Figure 7-19 will be used as an example. The
B&B solutions tree generated for this project is shown in Figure 7-20. The first
node (partial schedule) represents the only feasible scheduling decision at time
zero, which is to place activity 1, the dummy start activity, in an "active" status.
When activity 1 is completed (also at time zero) there are three possible schedul-
ing decisions which are feasible (i.e., 3 possible feasible subsets): Schedule activ-
ity 2 by itself (node 2), schedule activity 3 by itself (node 3), or schedule both
activities 2 and 3 together (node 4). The latter is allowable only because the
resource requirements of both activities together do not exceed the amount
available.
To illustrate continuation of the process, consider branching from node 2,
where activity 2 is scheduled to start at time zero. The next set of scheduling
decisions will occur when activity 2 is completed (time 1). Thus all scheduling
k Duration
2:o 3; 0 4: 0
121;12.3) 131;IZ. 3) 12.31; (2. 31
I
I 5;l 7;4 8; 1
13); 131 (21; 1-21 (3); 0
1
1
9; 5 10; 5 11;5 12;5 13; 5 14; 4
141; 14) i31;I3.51 15?;13.51 (3.5); {3.51 14); 14) {4): (41
I I I I I
15;9 16; 9 17;9 18;9 19;8
(51; (51 151; 151 [31: (31 (51: 15) (51; (51
decisions in the new family of nodes emanating from node 2 will occur at time
1. The feasible alternatives are: Schedule activity 3 alone (node 5) or schedule
activity 4 alone (node 6). The alternative of scheduling both activities 3 and 4
together is not feasible because of resource constraints.
Continuing from node 6 (activity 4 selected to start at time l), there are three
possible alternatives: Schedule activity 3 alone (node lo), schedule activity 5
alone (node 1I), or schedule activities 3 and 5 together (node 12). All three new
nodes have the same "decision time" of day 5, since activity 4 is complete at
time 5.
If node 12 is selected to continue from, it can be seen that both activities 3
and 5 will be completed simultaneously at the end of day 9. At this point the
only possible new decision is to schedule the final (dummy) activity 6. Thus
node 23, a terminal node, is a complete schedule since all project activities have
been scheduled. Node 23 is, in fact, the optimal schedule; its completion time
is 9 days. The Gantt chart for node 23 is shown in Figure 7-21 along with all
nonoptimal complete schedules (terminal nodes 20,21,22, 24, and 25).
The tree of solutions created for this sample problem can be seen to be ex-
Resource Constraints in Project Scheduling 231
Res.
used
Time
la)
Non-optimal schedules
psm
2
1 Activity 3 can
be left-shifted
0
0 1 2 3 4 5 6 7 8 910111213
2
1 Activity 5 can
be leftshifted
0
ps,
2
1 Activity 3 can
0 be left-shifted
2
1 Activity 2 can
be left-shifted
0
0 1 2 3 4 5 6 7 8 9 10111213
If)
Figure 7-21 Complete schedules for illustrative network.17
haustive, and feasible with respect to both precedence and resource constraints.
It is also nonredundant since no two complete schedules are exactly alike. It
offers a framework for evaluating all possible feasible schedules. However, fol-
lowing this process is quite impractical for even modest-sized problems, because
the number of complete schedules rapidly becomes extremely large as the num-
ber of activities increases. The framework offered is thus useful only to the
extent that portions of the solutions tree can be pruned away during the tree
232 11 I Advanced Topics
creation process, in order to keep the tree within manageable bounds. Such
pruning is allowable, however, only if it can be proved conclusively that further
branching from the pruned-away portions of the tree could not possibly lead to
a complete schedule which would be better than some other complete schedule
that already exists or that can be developed from the nonpruned portions of
the tree.
Pruning the solutions tree can be accomplished with two basically different
categories of procedures: (I) schedule dominance and ( 2 ) lower bounds. Sched-
ule dominance is relatively more powerful, but operationally more difficult to
implement. We will describe dominance procedures first.
Schedule Dominance
plete schedule shown downstream as node 21, making it also equivalent to the
complete schedule of node 25. Thus node 5 is also dominated by node 4, the
parent of node 25.
At this point in the pruning process the surviving portions of the tree are
shown in Figure 7-22. Only one path other than the optimal path remains. This
path cannot be eliminated by the type of schedule dominance illustrated above,
but may be pruned by use of a lower bound.
Note that at any point in the project scheduling (i.e., for any partial schedule) a
minimum length schedule for the remaining (unscheduled) activities can be cal-
culated ignoring possible resource conflicts. In other words, there is an inescap-
able duration of the remaining work implied soley by the duration and prece-
dence requirements of the remaining activities. The completion time of this
path constitutes a lower bound on completion time of any partial schedule
emanating from this partial schedule. The authors of Reference 17 call this a
precedence-based lower bound (LBP). If it is not less than the completion time
for a known complete schedule (called the current upper bound), the partial
schedule may be pruned.
Another type of lower bound can be calculated by ignoring precedence con-
C(21.39111
E(15, 2418
F118,21)8
G(15, 7)9
CE(6. 2118 CE t OOM
CF19. 1818 CF + I L
CEF
8 1 3.6 13,18
C11
G(3, 33112
F17.33112 -F t IL
G
EF(3.33112 -EF t DOM
11 13,613.33
G 12
113. 37)
Completion
number time
\
Cumulative idleness
of each resource type
Feasible subset pruned by:
IL = Idleness limit
CP = Critical path bound
DOM =Dominance
Figure 7-23 Reduced solutions tree for network of Figure 7-4 (see legend, next page).
236 11 I Advanced Topics
I
F I
6 6 6 7 7 2 2 2 2 2 2 3 4 4 4 3 3 4 4 4
5 5 5 6 6 6 6 6 6 6 6 6 5 5 5 6 6 5 5 5
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 5 10 15 20
Figure 7-24 20day optimum schedule for sample network.
(2) bounding, or evaluating the nodes, and (3) pruning nonoptimal portions of
the tree. As can be seen from the example above, the more effective the pruning,
the more efficient the procedure becomes. However pruning is also enhanced by
the manner in which the tree is allowed to grow, i.e., the manner in which the
next unpruned node from which t o branch is selected.
The node selection rule used for branching can cause the solutions tree t o
develop in two strongly contrasting ways. One such way is termed "backtrack-
ing." In this scheme the tree develops in depth very rapidly in a restricted area
until a complete new solution is obtained; lateral areas of the tree are not ex-
plored until this restricted area has been fully explored and pruned.
The second way in which the tree can be developed is termed "skiptracking."
In this case the tree tends to grow in breadth more rapidly and downward move-
ment is in more or less uniform fashion laterally.
Skiptracking schemes require significantly more computer storage than back-
tracking procedures, but generally can be solved in less computer time. More
importantly for the constrained-resource scheduling problem, tree pruning by
schedule dominance is possible with skiptracking but not backtracking.
Two node selection rules which result in skiptracking are: Select the node
having the least lower bound, or select the node which has the least total accu-
mulated resource idleness up to the current partial schedule time. Use of any
one node rule alone, however, is not as effective on vely large problems as sev-
eral rules together; this is because many nodes could have the samelower bounds.
A series of partial schedule "attributes," including the three lower bounds de-
scribed earlier, can be grouped into a "decision vector," i.e., a series of tie-
breaking rules, for selecting the next node from which to branch. If no ties
exist for the first attribute in the vector, the other attributes are ignored.
B&B procedures represent perhaps the most promising avenue of mathe-
matically rigorous alternatives for attacking the constrained-resource scheduling
problem. As computer memories have expanded along with significant decreases
in the cost of computer time, these procedures have become less unreasonable to
consider, at least for some small-medium sized problems.
TIME-COST
TRADE-OFF
PROCEDURES
The results of the planning and scheduling stages of the critical path method pro-
vide a network plan for the activities making up the project and a set of earliest
and latest start and fmish times for each activity. In particular, the earliest oc-
currence time for the network terminal event is the estimated "normal" project
duration time, based on "normal" activity time estimates. This state of the over-
all project planning and control procedure is depicted in box (3) of Figure 1-4
(Chapter 1). The purpose of this chapter is to consider the question raised in
the next step, i.e., whether the current plan satisfies time constraints placed on
the project, or in general, to consider the relationship between project duration
and total project costs.
Time constraints arise in a number of ways. First, the customer might con-
tractually require a scheduled completion time for the project. Then, the origi-
nal time constraint might change after a project has started, requiring new proj-
ect planning. These changes arise because of changes in the customer's plans;
or, when delays occur in the early stages of a project, the new expected comple-
tion time of the project may be too late. The most interesting time constraint
application, and the one which was the basis for the development of the "CPM"
time-cost trade-off procedure by Kelley and ~ a l k e r , ' ~ 'arises
~ ' when we ask for
the project schedule that minimizes total project costs, direct plus indirect. This
is equivalent to the schedule that just balances the (indirect) marginal value of
time saved (in completing the project one time unit earlier) against the (direct)
marginal cost of saving it. This situation occurs frequently, for example, in the
238 11 I Advanced Topics
major overhaul of large systems, such as chemical plants, paper machines, air-
craft, etc. Here the value of time saved is very hgh,and furthermore it is known
quite accurately. In this application, the crux of the problem amounts to devel-
oping a procedure to find the minimum (marginal) cost of saving time. This as-
sumes, of course, that some jobs can be done more quickly if more resources are
allocated to them. The resources may be men, machinery, and/or materials. We
will assume that these resources can be measured and estimated, reduced to
monetary units, and summarized as a direct cost per unit time.
Thus, the main purpose of this chapter can be stated as the development of a
procedure to determine activity schedules to reduce the project duration time
with a minimum increase in the project direct costs, by buying time along the
critical path(s) where it can be obtained at least cost.
This procedure can be applied informally in a very simple manner. For exam-
ple, consider the network presented by ~ a v i s ?and shown in Figure 8-1. The
critical path is composed of activities 0-1, 1-2, 2-4, and 4-5, with normal dura-
tion times of 4, 6, 5, and 7, respectively, giving a project duration of 22 days.
The other paths through the network have positive float values indicated along
the arrows. Also, the third value inside the parentheses indicates the cost to
reduce the duration of the activity by one day. For example, activity 0-1 has
a normal duration of 4 days, and it can be reduced to 3 days at a cost of $70.
It is easy to see in this example that the cheapest way to compress this project
is to add "resources" to activity 1-2 and reduce its duration by 1 or 2 days.
The net result in this case would be a project duration of 21 days at an extra
cost of $50, or a 20 day duration at an extra cost of $100. The effect of a 2
day reduction in activity 1-2 is noted directly on the network by the changes
made in the forward pass computations only. At this point it is interesting to
note that there are now three critical paths; 0-2-4-5 and 0-1-4-5 have been
added to the original critical path 0-1-2-4-5. Further reductionsin the project
duration are still possible, but now one must determine the economical way to
cut all three paths simultaneously.
Systematic methods of carrying out the above procedure will be taken up
in this chapter. First, the original CPM approach of Kelley and ~ a l k e r , ' ~ ~ "
based on simple linear time-cost tradeoff curves for each activity, will be pre-
sented. Then, a heuristic hand computational procedure will be presented,
based on these same assumptions. Finally, an extensive treatment of the use of
mathematical programming to give exact solutions to this problem is presented
in Appendix 8-1.
It is assumed in all of the procedures to be developed in this chapter that un-
limited resources are available. If this is not the case, or if personnel must be
paid up to some fixed resource requirement level, whether they are needed or
not on a particular day, then the procedures described in Chapter 7 on resource
allocation may be more appropriate than those described here. Although this
Time-Cost Trade-Off Promurea 239
4'
(8-6-801
Key:
-
Normal
time \(:I?, J
Crash Cast
y& EF
'Changes in the forward pass computations reflect a compression of activity 1-2 from 6 to 4 days.
Normal "Crash"
Time slope
3 days
6 days
4 days
7 days 600
1 day 1.100 200
150
4 days
3 days
240
150
.
6M) 6 days 750 150
$4.280
"Crash"
cost C,
- I . e., a straight line connecting any two points
on the curve lies entirely above the curve.
Linear approximation
"Normal"
. . "Normal" time-cost
point, coordinates
i.
- I -- - - - - - - - - - -
[ i I
Activity
td
1 duration
time
"Crash" time D
"Normal" time
Definition:
Activity direct costs include the costs of the material, equipment, and direct
labor required to perform the activity in question. If the activity is being per-
formed in its entirety by a subcontractor, then the activity direct cost is equal
to the price of the subcontract, plus any fee that may be added.
Definition:
Project indirect costs may include, in addition t o supervision and other cus-
tomary overhead costs, the interest charges on the cumulative project investment,
penalty costs for completing the project after a specified date, and bonuses for
early project completion.
Definition:
Normal activity timecost point. The normal activity cost is equal t o the mini-
mum of direct costs required to perform the activity, and the corresponding ac-
tivity duration is called the normal time. (It is this normal time that is used in
the basic critical path planning and scheduling, and the normal cost is the one
usually supplied if the activity is being subcontracted.) The normal time is actu-
TirnaCogt Trade-Off Procedures 241
ally the shortest time required to perform the activity under the minimum direct
cost constraint, which rules out the use of overtime labor or special time saving
(but more costly) materials or equipment.
Definition:
Crash activity timexost point. The crash time is the fully expedited or mini-
mum activity duration t i e that is technically possible, and the crash cost is
assumed to be the minimum direct cost required to achieve the crash perfor-
mance time.
The normal and crash time-cost points are denoted by the coordinates
(D, CD) and (d, Cd),respectively, in Figure 8-2. For the present, it will be as-
sumed that the resources are infinitely divisible, so that all times between d and
D are feasible, and the time-cost relationship is given by the solid line. I t will
also be assumed that this curve is convex, (defined below), and can be adequately
approximated by the dashed straight line. These assumptions are relaxed in the
treatment of this problem given in Appendix 8-1.
The basic activity inputs to the CPM procedure have been illustrated in Figure
8-2, where it is assumed that the time-cost trade-off points lie on a continuous
linear or piece-wise linear decreasing curve. A piece-wise linear curve is illus-
trated in Figure 8 3 . I t is further assumed that the activities are independent,
in the sense that buying time on one activity does not affect in any way the
availability, cost, or need to buy time on some other activity. This assumption
would, for example, be violated if a special resource could be obtained to speed
up simultaneously two separate activities in the network, since this would mean
that buying time on one activity would automatically include the other.
If the actual tie-cost relationship departs significantly from the assumed
straight line, but is "convex," then it may be necessary to fit the actual cost
curve with a series of straight lines, as shown in Figure 8-3. A convex curve is
one for which a straight line connecting any two points on the curve lies entirely
above the curve; similarly, if the straight line lies entirely below the curve, it is
said to be "concave." These definitions are illustrated in Figure 8-4; the need
for the convexity assumption will be described below.
In Figure 8-3, the actual cost curve, which is convex, is approximated by a
piece-wise linear curve, each piece being treated as a separate activity or pseudo-
activity. In the project network, the actual activity, A, isreplaced by thepseudo-
activities, A , , A , , and A , drawn in series as shown in Figure 8-3. In this illus-
tration, the approximation is with three pieces; however, the procedure can be
242 11 / Advanced T o p i c s
Network representation
--Actual activity
..Pseudo activities
Preudo-activities
the coordinates of the same points for the whole activity, i.e., (D, CD) and
(d, Cd). The reason for the convexity requirement can be explained heuristically
in terms of Figure 8-3. If the activity is currently scheduled at its normal time,
D, then physically, pseudo-activity A, must be augmented first, then A2, and
finally A , . Since the CPM computational procedure effectively searches the crit-
ical activities to find the one that can be augmented the cheapest, it will naturally
choose the pseudo-activities in the proper order, i.e., A,, A 2 , and finally A , ,
since the cost slopes increase as one goes from A, to A, to A , , for any convex
curve. However, if the time-cost curve was not convex, then the cost slopes may
be lowest for A , , and highest for A , , as shown in Figure 8-5. In this case, the
CPM computational procedure would augment the activities in a sequence that
would not be physically meaningful, i.e., in the order A , , A 2 , and finally A3.
The CPM computational procedure chooses the duration times for each activity
so as to minimize the total project d i i c t costs and at the same time satisfy the
constraints on the total project completion time and on the individual activi-
ties, the latter being dictated by both the logic of the project network and
the performance time intervals (d, D) established for each activity.
For example, again consider the simple project presented in Figure 8-1. Ap-
plying the " CPM procedure, we would start by setting all activity durations at
their "normal" value. This gives a project duration of 22 days as determined
by the critical path consisting of activities 0-1, 1-2, 2-4, and 4-5. The associated
total direct cost of project performance is $3050, as indicated in Figure 8-6.
Note that this cost could be increased t o $3,870 through unihtelligent decision
making by "crashing" all activities not on the critical path, with no decrease in
project duration. Between these upper and lower cost values for a project dura-
tion of 22 days there are several other possible values, depending upon the num-
ber of noncritical activities crashed.
If all activity durations are set at "crash" values, the project duration can be
decreased to 17 days, with a total cost of $4,280, as shown by the extreme up-
per left point of Figure 8-6. This corresponds to the practice of speeding up a
244 11 I Advanced Topics
Line of maximum
direct costs
Crash all
+.
0
0
direct costs
3000 - 3050
I I I I I
17 18 19 20 21 22
Days
Figure 8-6 Project duration vs. direct cost for sample network in Figure 8-1.
project by requiring crash times across the board (everybody works overtime),
instead of along the critical paths only. In place of this, a duration of 17 days
could also be achieved at lower cost by not "crashing" activities unnecessarily.
Thus, activity 0-2 can be set at 7 instead of 6 , activity 1-4 at 8 instead of 7,
and activity 2-3 at 4 instead of 1. With all other activities set at crash values,
the associated cost of performance for 17-day project duration is reduced to
$3,570. This value is the lowest possible value for 17-day project duration,
as will be shown below. It is the optimal " CPM solution for a 17-day schedule.
Between 22 and 17 days there are several possible values of project duration,
as shown in Figure 8-6. For each such duration there is a range of possible cost
values depending upon the durations of individual activities and whether activi-
ties are crashed unnecessarily or not. Figure 8-6 shows the curve of both maxi-
mum and minimum costs and the region of possible costs for each duration be-
tween these curves.
In this simple example the minimum direct cost curve is easily determined by
trial and error, or by the hand application of a heuristic procedure such as that
given below. But in more realistic cases consisting of several dozen or more ac-
tivities, such trial and error determination becomes extremely tedious, if not
impossible. In these situations, systematic computation schemes, usually rnathe-
matical programming, must be used to determine the value of the minimum cost
curve for every possible level of project duration. The details of these proce-
dures are discussed in the appendix to this chapter, while their application is
illustrated in Figure 8-7.
Suppose the project duration is under management control, such as in the
case in a plant overhaul. Assuming adequate resources are available, the rational
choice of a project schedule would be made so as to minimize the total project
costs. Then, one would select the project duration schedule indicated in Figure
TimeCort Trade-Off Procedures 245
Project duration
8-7, corresponding to the minimum value of the total cost curve. The critical
ingredient of this process is the minimum direct cost curve, which was not really
available prior to the inception of this "CPM" optimization procedure.
An "effective" cost slope, ECij, is then defined by Siemens as the cost slope
divided by the number of inadequately shortened paths, Nij, which contain
activity (i - 1).
246 11 / Advanced Topics
The procedure described below chooses from among all available activities to
be shortened, the one with the lowest effective cost slope. This heuristic will
usually come quite close to the optimal solution. Each step of this procedure
is illustrated in Figure 8-8.
1. Prepare the project network and time estimates, and list in columns all paths
through the network whose expected lengths are greater than the desired
(scheduled) project duration, T,. The length of a path is merely the sum of
the durations of all activities on the path in question. Also note at the bot-
tom of each path column (row marked iteration O), the time reduction that is
required, i.e., expected path length minus T,.*
2. List (in rows) all activities present in at least one of the listed paths noting
for each activity its cost slope, Cii, and time reduction available, TAij.*
3. Compute the effective cost slopes, ECii, and record them in the column
headed iteration 1.
4. For the path(s) with the most remaining time reduction required, select the
activity with the lowest effective cost slope. Break ties by considering the
following ordered list:
4.1. Give preference to the activity which lies on the greatest. number of
inadequately shortened paths.
4.2. Give preference to the activity which permits the greatest amount of
shortening.
4.3. Choose an activity at random.
5. Shorten the selected activity (i - j ) as much as possible, which will be equal
to the minimum of the following:
5.1. the unallocated time remaining for the selected activity (i - 13,or
5.2. the smallest demand of those inadequately shortened paths containing
the activity (i - j).
6 . Sell back, or deshorten, as much time as possible on paths that have been
overcut, as long as this action does not cause any new paths to become in-
adequately shortened.
7. Stop if all paths have been adequately shortened. If not, recalculate those
effective cost-slopes where any of the following have occurred:
7.1. a path which was inadequately shortened prior to this iteration, has
been adequately shortened, or
7.2. all unallocated time for the activity just shortened has been consumed
and there are one or more additional cost-slope/supply pairs for this
activity (see the footnote to Step 2).
8. Retum to Step 4.
Example Problem
The sample problem shown in Figure 8-1 will be used to illustrate the above
algorithm. The results of Steps 1, 2, and 3 are shown in Figure 8-8 for the
case where a 17-day project duration is required. There are 5 paths through
the network, but only the 3 listed in Figure 8-8 exceed the desired project
duration of 17 days. Also, activities 2-3 and 3-5 have been omitted because
*1f a piecewise linear approximation is being used, as in Figure 8-3, then the data pairs
( C p TAG) must be given for each linear segment, with increasing cost slopes in columns
golng from left to right. Only one cost-slope/supply pair for each activity can be con-
sidered during any iteration of the following recurring steps. Also, these pairs are con-
sidered sequentially left-to-right as they are used up in the shortening process, and from
right-teleft if deshortening occurs.
248 II 1 Advanced Topics
they are not present in any of the 3 paths which require shortening. The cross-
hatching in Figure 8-8 is used to denote the activities that are not present in
the path indicated at the head of the column.
The repetitive portion of this algorithm then begins by applying step 4,
which leads t o cutting activity 0-1 by 1 day in the first iteration. This activity
was chosen because it has the lowest effective cost slope of the 4 activities on
path 0-1-2-4-5, which is the path currently requiring the greatest amount of
shortening. This change is shown by placing a 1 in the two cells corresponding
to the row for activity 0-1 and the two path columns which contain this ac-
tivity; the "Time Reduction Available" for this activity is updated from 1 to 0;
and, finally, the "Remaining Time Reduction Required" is updated in the row
for iteration 1, to reflect that paths 0-1-2-4-5 and 0-1-4-5 have been reduced
from 5 and 3 to 4 and 2, respectively. A total of 6 iterations are required to
reach a final solution, which requires an augmentation of the direct activity
costs of $520, for a total of $3570. It should also be noted in Figure 8-8, that
17 days is the minimum or "crash" project duration, because all activities on
the first path (0-1-2-4-5) have zero "Time Reduction Available."
A summary of repeated applications of this algorithm to cover the entire
range of possible project compressions is shown in Table 8-1. The results shown
here essentially give the project schedule, activity by activity, for a given project
duration. It can be shown that each of these solutions is "optimal," in the sense
that no other solution will give lower total direct costs. This will not always oc-
cur with this heuristic, based on lowest effective cost slope, but solutions ob-
tained this way will usually be very good. These results were plotted in Figure
8-6 above, where they form the line of minimum direct costs. As stated before,
this is the signal contribution of the " C P M procedure. It permits the specifica-
tion of the optimal (total cost minimization) schedule, as shown in Figure 8-7.
17 18 19 20 22
mount Amount Amount Amount Amount
ActiviN Shortened Cost Shortened Cost Shortened Cost Shortened Cost Shortened Cost
Total Excess -
Direct Costs
Base
Direct Costs
- 3050 - 3050 - 3050 - 3050 - 3050
If you assume that the functions Z(T) and X(T) reflect, respectively, the proj-
ects true present value of benefits and costs to society, then society wants
to maximize Bs. This implies that the socially optimal completion time, Ts,
will be determined by the (first-order) condition dZ/dT = dX/dT, independently
of the V function.* This point (Ts) is noted in Figure 8-9, where the slopes of
Z(T) and X(T) are the same. That is, at the point where the marginal benefits
equal the marginal costs.
From the social point of view, the Vfunction is only a device for transferring
income between the buyer and the seller. But its specification is important to
all parties if we are to insure that the contractor has the incentive to also deliver
the project at time Ts, instead of some other time, such as Tc shown in Figure
8-9. A sufficient condition to achieve the desired result is to have aV/aT=
dZ/dT for all T. Cukierman and Shiffer3 point out that this will not be accom-
plished by most project payment plans, V(T,. . . ). For example, periodic prog-
ress payments proportional to contractor expenditures, or agreed upon pay-
ments to be made upon achievement of project milestones, will not achieve the
required incentive. A plan that could achieve the desired result, for example,
would be payments executed at predetermined dates, independently of the
progress of the project, plus an annual fine equal t o the discount rate r, times
~ derivative of Z with respect to T, that is, the rate of change ofZ with respect
* d ~ / isd the
to T.
TimeCost Trades Procedures 251
Figure 8-9 The socially optimal (Ts)and the contractor's best (Tc) delivery times.
the value to the buyer of the completed project at the time of completion, paid
over the life of the project.
This is an interesting, perhaps academic, consideration of an extremely impor-
tant problem from an economic point of view. Of the three functions in Figure
8-9, X(T) is the most difficult to obtain. The " CPM time-cost trade-off con-
cept could be very helpful in this endeavor to determine a socially optimal proj-
ect schedule. I t should be added that in the determination of X(T), the avail-
ability of resources must also be considered. This could be done, for example,
by trial and error simulation. First, assume a trial set of activity time-cost trade-
off function inputs, and determine the corresponding "CPM" project schedules
for various project durations. The resource level vs. time profdes for these
schedules can then be smoothed by the methods in Chapter 7, and finally, this
smoothed level can be judged as to whether it is feasible or not from a resource
staffing point of view.
It appears that the project timecost trade-off concept has more to offer than
the applications t o date indicate. A real understanding of this concept may lead
to improved solutions to large scale systems problems currently facing society.
SUMMARY
The general philosophy of the time-cost trade-off problem has been presented in
this chapter, along with a hand computation procedure, and the "CPM proce
252 11 I Advanced Topics
REFERENCES
7. Fondahl, J. W., "Can Contractors Own Personnel Apply CPM Without Com-
puters," The Constructor, November 1961, pp. 56-60, and December 1961,
pp. 30-35.
8. Fulkerson, D. R., "A Network Flow Computation for Project Cost Curves,"
Management Science, Vol. 7, No. 2, January 1961, pp. 167-179.
9. Hindelang, T. J. and J. F. Muth, "A Dynamic Programming Algorithm for
Decision CPM Networks," Operations Research, Vol. 27, N o . 2, March-
April 1979, pp. 225-241.
10. Kelley, J. E. and M. R. Walker, Critical Path Planning and Scheduling, Pro-
ceedings of the Eastern Joint Computer Conference, December 1959, pp.
160-173.
11. Kelley, J. E., Jr., "Critical Path Planning and Scheduling: Mathematical
Basis," Operations Research, Vol. 9, No. 3 (1961), pp. 296-320.
12. Meyer, W. L. and L. R. Shaffer, Extensions of the Critical Path Method
Through the Application of Integer Programming, Report issued by the
Dept. of Civil Engineering, University of Illinois, Urbana, Ill., July 1963.
13. Moore, L. J., B. W. Taylor 111, E. R. Clayton, and S. M. Lee, "Analysis of
a Multi-Criteria Project Crashing Model," American Institute o f Industrial
Engineering Trans.,Vol. 10, No. 2, June 1978, pp. 163-169.
14. Panagiotakopoulos, D., "A CPM TimeCost Computational Algorithm for
Arbitrary Activity Cost Functions," INFOR, Vol. 15, No. 2, June 1977,
pp. 183-195.
15. Siemens. N.. "A Simple CPM Time-Cost Tradeaff Algorithm," Management
~ c i e n c e , . ~ o17,
l . NO -6, Feb. 1971, pp. B-354-363.
16. Yen, J. Y., "Finding the K Shortest Loopless Paths in a Network," Manage-
ment Science, Vol. 17, No. 11, July 1971, pp. 712-716.
EXERCISES
1. Given below are the network data and the timetost trade-off data for a small
maintenance project.
Table 8-2
A none
B none
C none
D A
E C
F A
G 6, D
Total
254 11 / Advanced Topics
Assume the indirect costs, including the cost o f lost production, and asso-
ciated outage costs, supenision, etc., t o be as follows.
Table 8-3
Cost (dollars)
Activity Predecessor Description of Time (hours) Nor-
No. Activity Nos. Activity a m b mal Crash
Assuming any integer times between the normal and crash activity times are
feasible, use the hand computational time-cost trade-off procedure to show
that the total costs are $1510, 1470,1430, 1470, 1530and 1620 for 12, 11,
10,9, 8, and 7 day project durations, respectively.
2. Given in Table 8-3 are the data for a steam calendar and pipeline maintenance
project. Three sets of times are given under columns headed a, m, and b. In
this problem only the first two columns will be used: the times under the col-
umn headed a are the "crash" activity performance times while those under
the column headed m are the "normal" performance times.
a. Draw the network and make the basic scheduling computations using
activities-onarrows or activities~n-nodes.
b. Identify the critical path.
c. Indicate, in step-by-step detail, the activity augmentations required t o re-
duce the project duration to 248 hours while keeping the total project
direct costs at a minimum. Assume that only the normal and crash times
are feasible.
3.*In the appendix to this chapter, the linear programming formulations are
given for activity time-cost trade-off curves that are either continuous, or
a collection of feasible timecost points. These formulations can be extended
to cover the case where combinations of these two types of trade-off func-
tions occur. An analysis of this problem indicates that the transitions can
occur in three distinct ways as shown in Figure 8-10, i.e., any combinations
of continuous curves and discrete points can be handled by appropriate com-
binations of these three transitions. Write out the Linear programming for-
mulation for each of these transitions.
4.*Consider the simple project network shown in Figure 8-11, along with the
accompanying activity time-cost trade-off curves. Using the linear (integer)
-
v
-
.A
.-
.-
>
.-
4
2
Activity 2-3
3
:a/- - :
Activity
2
I
2-4
I
+':[-;*
Yzs
Activity 3.4
2 5 "34
Figure 8-1 1
APPENDIX 8-1
APPLICATIONS OF
MATHEMATICAL PROGRAMMING
TO THE DEVELOPMENT OF
PROJECT COST CURVES
The various topics treated in this appendix will be illustrated using the simple
network* shown in Figure 8-12. The numbers appearing along each activity
in this figure give (dii,Dii, Cij). For example, ( d l , , D l , , CI2)= ( l , 3 , 3 ) indi-
*By permission from L. R. Ford, Jr., and D. R. Fulkerson, "Flows in Network," The Rand
Corporation, 1962. Published, 1962, by Princeton University Press.
257
258 11 I Advanmd Topics
Figure 8-12 Illustrative network with data giving crash time. normal time, and cost slope
for each activity.
cates that for activity 1-2, the crash and normal performance times are 1 and 3
time units, respectively, and the slope of the linear time-cost trade-off curve is 3
monetary units per time unit. In the applications, the time unit is chosen so that
the di;s and Dii's are all integer valued, and the monetary unit is chosen so that
the Ci;s are also integer valued.
For purposes of illustrating how the basic forward pass computations can be
formulated as a linear programming problem, assume that all activities in Figure
8-12 are scheduled to be performed at their normal times, i.e., the middle num-
ber of the three numbers given for each activity. Now the project network may
be viewed as a flow network, in which a hypothetical unit of flow leaves the
source, node (event) 1, and enters the sink, node 4. Also, nodes 2 and 3 play
the role of "transhipment" points and, thus, at these nodes there must be a
conservation of flow, i.e., the total flow into node 2 must equal the total flow
away from node 2, and similarly for node 3. The performance time of each
activity, yii, is then interpreted as the time (or cost) of transporting a unit o f
flow from node i to node j. Viewing a project network in this way reduces
the problem of finding the critical path(s) to the determination of the network
path(s) or route(s) from the source, node 1, t o the sink, node 4, which requires
a maximum time (or cost) to traverse. The reader is no doubt well aware of
the fact that there are easier ways of locating the network critical path. The
main purpose of this network flow interpretation of the problem is to show
that it can be formulated as a linear programming problem, a technique which
will prove to be useful later in solving problems which cannot be easily solved
in other ways.
Applying the above network flow interpretation to Figure 8-12 results in
the linear programming formulation given in equation (I), which will be r s
ferred to as the primal problem. In this formulation, yii = 0 or 1 denotes the
absence or presence of a unit flow from node i to node j, a flow which is said to
be along activity i-j.
Applications of Mathematical Programming 259
PRIMAL PROBLEM
Constraint equations (lb) and (le) indicate that a unit of flow leaves the source,
node 1, and enters the sink, node 4, while constraint equations (lc) and (Id) re-
quire a conservation of flow at the intermediate nodes 2 and 3. Thus, any set of
yijYswhich satisfy these constraints constitute a path from the source to the
sink, as indicated by the yit's that are equal to one. Then, since the yij's are
equal to one for the activities carrying the hypothetical unit flow, andzeroother-
wise, the objective function, f[Y], gives the sum of the activity duration times
for the chosen path from source to sink. When the objective function is maxi-
mized, the corresponding path, denoted by Y*,is the longest or critical path
through the network; the corresponding value of the objective function will
be denoted by f[Y*]. The solution of this problem is greatly facilitated by
the use of the duality theorem of linear programming as described below.
From the well known duality theorem of linear programming, it can be shown
that to every linear programming problem, call it the primal, there corresponds
a related linear programming problem which is called the dual of the original
problem. The connection between these two problems is stated in the following
theorem.
Duality Jheorem
Given a linear programming problem, call it the primal, there is always a re-
lated linear programming problem, called the dual, defined as follows, in matrix
notation.
PRIMAL DUAL
w2 - w4 2 5 (2e)
w3 - w4 2 6 (2f)
- m < w , <-, - m < w 2 <-, - m < w 3 <-, --<w4 <-
The advantage of the dual formulation t o this problem is now fairly obvious.
Since each dual constraint involves only two variables, they can be solved by in-
spection, if a value is assigned to w, . To see this, consider the constraints writ-
ten in the following equivalent form.
Applications of Mathematical Programming 261
It will be shown below that w, varies directly with the value assigned tow, ,
and since g [W] is merely the difference between wl, and w4, wl can be as-
signed an arbitrary value without affecting g [W] . Thus, one may let wl = 0,
a choice which makes all of the other wi's, and in particular wq, take on nega-
tive values. Then, to minimize g [W] = w, - w4 =- w4,one must minimize the
absolute value of w4,and at the same time satisfy each of the above constraints.
It is easy to see by inspection that this is achieved by the solution indicated
above, i.e., w: = 0, w: = -3, w: = - 5 and w: = - 11. This will be denoted as
[w*] = (0, - 3, - 5, -1 1). Thus, the optimal value of the dual objective function
is g [w*] = w: - : W = 0 - (- 11) = 11. It is interesting to note the similarity be-
tween the solution of inequalities (2bb) through (2ff), and the conventional for-
ward pass computations. For example the value of w -
: = 5 is the largest abso-
lute value of the two solutions obtained by treating (2cc) and (2dd) as equalities,
or equivalently, the smallest absolute value of w3 which satisfies both of these
constraints. This is analogous to calculating the earliest event time at a merge
point by taking the largest of the earliest finish times of the merging activities,
which are 4 and 5 in this case.
Noting that the second and fourth dual constraints, i.e., those given by equa-
tions (2c) and (2e) are satisfied as inequalities, one knows from the duality theo-
rem that the second and fourth primal variables, i.e., y,, and y, are zero, while
the others may be positive. By checking the primal constraints equations (lb)
through (le), one sees that the optimal solution to the primal problem is given
by [Y*l = ( Y : , , Y T ~ , Y ~ ; , Y ~ ~ , Y=: ~(1,
) 0, 1 , 0 , 11, andthatfry*] = 3 X 1 +
4 X 0 + 2 X 1 t 5 X 0 + 6 X 1 = 11. (Note also that the requirement, f [Y*] =
g[~*= ] 11 is satisfied.) Thus, it is concluded that the network critical path is
comprised of activities 1-2, 2-3, and 3-4, and has a total duration of 11 timeunits,
a value which can easily be verified by the routine forward pass computation.
The basic formulation of the time-cost trade-off problem will be given first, as-
suming each activity in the network shown in Figure 8-12 has a trade-off curve
of the form shown in Figure 8-13. The advantage of the notation used in this
figure is that it replaces the normal and crash costs by a single cost slope, Cij.
Again letting yij denote the scheduled duration of activity i-j, one can write the
total direct project costs as a function of these variables as follows:
where Xi XI is used to denote the summation over all activities in the project
network. Since the KiiYsare futed constants, whose sum is denoted by K in
262 11 I Advanced Topics
(Crash1 C.
I i
0
0 d,, (Crash)
-
Dl, (Normal)
v,,
equation (3), the total direct project costs are minimized if one will*
*1n this appendix, the symbol Tiwill be used in place of Ei, used elsewhere in this text.
Applications of Mathematical Programming 263
objective function because their cost coefficients are zero; their role in this for-
mulation is merely to insure that the scheduled values of yij are feasible from
the standpoint of network logic, and to insure that the project duration does
not exceed A.
While this problem could be solved using the simplex method to find the
schedule [Y*]= (yF2, yy3, y:3, y,*,, y;), which satisfies all of the constaints
and at the same time maximizes f[Y], more efficient network flow algorithms
have been developed. These procedures will not be given here. A detailed treat-
ment can be found, for example, in the 2nd edition of this text, or in the origi-
nal reference by Ford and Fulkerson.' An extensive treatment of this subject
can also be found in Chapter 2 of the text by Elmaghraby.6 The development
of this procedure was motivated by considering the dual of the problem given
above by equation (4). The special structure of the nonzero elements in the dual
constraint matrix led to the discovery that this problem could be viewed as a
network flow problem. A network flow algorithm was then devised t o solve the
dual problem, which is much simpler than the conventional simplex method.
Thus, this time-cost trade-off problem, referred to as the " CPM problem, can
be solved very efficiently on a minicomputer, even for large networks. The out-
put of these programs is essentially of the form shown above in Figure 8-8 and
Table 8-1 for the modified Siemens hand computation procedure.
A natural extension of the "CPM" problem, as stated by eq. (4), was devel-
oped by Elmaghraby.' It allows scheduled completion time, Sk,to be placed
on a set of milestone events in the network (k = 1 , 2 , . . . , K), where K is as-
sumed to denote the project terminal event. This problem formulation also in-
cludes penalty rates, pk, that are invoked for tardiness in meeting the schedules,
S k , placed on the project milestone events. This might be applied, for example,
in the development of a mass transit system, a housing project, a shopping cen-
ter, etc., where the facility can be completed and utilized in stages, as defined
by the set of K milestone events. The problem then is to determine the subset
of activities whose durations are to be shortened, and the amount of that shor-
tening, in order to incur the smallest total cost, i.e., cost of shortening plus the
cost of tardiness. The linear programming formulation of this problem can be
written as follows:
In this formulation, the constraint set (5e) replaces the single constraint (4e)
in the " CPM problem. In these constraints, thz variables, s k , that are con-
strainted to be nonnegative, sk 2 0,denote the tardiness in realizing event k,
and the corresponding penalty, pksk, appears in the objective function. Just as
before, this problem can be solved by an efficient network flow algorithm (see
Reference 5).
Another extension of the "CPM" problem was made by Moore13 and others.
They considered the determination of the optimal project schedule for the case
where multiple objectives were considered. For example, the completion time
of the entire project, as well as intermediate milestone events; duration of a par-
ticular set of activities that collectively should be allowed a specified minimum
time; and an attempt to operate within a futed budget for total direct project
costs. This generalized model for the time-cost crashing problem is solved using
goal programming, rather than linear programming. Modest sized networks
could be handled by this procedure.
Using the simplex method to solve this problem will bring y,ij and yZij into the
solution in the proper order, i.e., y1# will remain its maximum value until y,ij is
reduced to zero, and then only will y,ij be reduced below its maximum value.
This follows because Cl > C, , and the sum Clylii + Czyzii is being maximized.
I t is obvious that this would prevail for any number of straight line segments, as
long as the actual trade-off is convex, which insures that Ci > Ci+,, for all i.
Applications of Mathematical Programming 265
If one puts constraints (7e) and (7f) together, one finds that this system of
constraints actually requires that S be equal to either zero or one, as shown in
equation (8).
If yii is equal to its maximum value, then 6 = 1 since y2ii = D - m, and because
of the integer constraint on 6, it must continue to equal 1 as long asy,ij > 0.
266 11 I Advanced Topics
A
.
4 Vz,,
d rn 0 Yu 0 m-d
It often happens that an activity can only be performed in a small number of dif-
ferent times, which gives rise to a small set of feasible time-cost points. For ex-
ample, consider an activity i-j that can only be performed at a normal time, Dii,
or a crash time, d i i In this formulation of the problem, one requires two* non-
negative integer-valued variables as follows:
yDii = 1 if the activity duration is Dii
= 0 if the activity duration is dii
(10)
ydii = 1 if the activity duration is dii
= 0 if the activity duration is Dii
Using these integer-valued variables, the linear programming formulation is as
follows:
Maximize f [Y]= . . - -CD yD..- Cd..ya + . . .
ii 11 I o (lla)
Subject to
If the activity has k different feasible timecost points, the above formulation is
extended by introducing one non-negative integer-valued variable for each feasi-
ble time-cost point and requiring that the sum of all of the variables be equal t o
one.
The use of integer variables in this manner is, indeed, a very powerful tool
which could be used in a number of other ways. Consider, for example, the
criticism put forth by Fondah17 that the CPM procedure does not account for
the fact that activities are sometimes correlated in that a speed up of activity A
must be accompanied by a speed up in say activity B as well, because it is ac-
complished by the use of a special resource which acts in common t o both of
these activities. In this case, one could accomplish the requirement that neither
or both of the activities A and B are augmented by adding a pair of constraints
*One variable would suffice in this case, since y~ = 1 - yd . however, the formulation
ii v.
given in equation (11) is used because it suggests the generahation to more than two
feasible time-cost points.
268 11 I Advanced Topics
to equation (1 I), i.e., ydA - ydB 5 0 and ydB ydA 5 0, where ydA and yd,
-
In Chapter 1, PERT was described as being appropriate for scheduling and con-
trolling research and development type projects, or others comprised primarily
of activities whose actual duration times are subject t o considerable chance varia-
tion. It is because of this variability that for projects of this type, the time ele-
ment of project performance is usually of paramount importance. While the
deterministic CPM approach, as described in Chapters 3 and 4, isquite frequently
applied to programs of this type, the single estimate of the average activity per-
formance time which it employs completely ignores the chance element asso-
ciated with the conduct of the project activities. For example, an activity which
is expected to take 10 days t o perform, but might vary from 9 t o 11 days would
be treated no differently than an activity which is also expected to take 1 0 days
to perform, but might vary from 2 to 25 days. The advantage of the PERT sta-
tistical approach, originally developed by D. C. M a l c ~ l r n ~and
~ ~others,
' is that
it offers a method of dealing with this chance variation, making it possible t o
allow for it in the scheduling calculations and finally using it as a basis for com-
puting the probability (index) that the project, or key milestones in the project,
will be completed on or before their scheduled date(s).
This type of analysis could be very helpful in arriving at an acceptable project
plan for implementation, as shown in box (5) of Figure 1-4,which illustrated
the overall dynamic network-based planning and control procedure. For exam-
ple, probabilities of meeting a required schedule, of greater than say 0.75, might
signal a green light to go with the project plan. Values between 0.25 and 0.75
270 11 I Advanced Topics
would signal a yellow caution light; careful attention to progress on this project
is appropriate, and some project replanning may be anticipated. Finally, a prob-
ability less than 0.25 would signal red to immediately stop and replan to achieve
a better chance of meeting the required schedule.
This type of early warning system has considerable merit when large uncer-
tainty in activity duration time exists. For example, the major overhaul of air-
craft involves considerable uncertainty that is not revealed until covers are re-
moved from control cables, engines, etc., where corrosion and wear may be found
to vary from minimal to extensive. In other projects, external elements, such as
the weather, may interject uncertainty. For example, in the Alaskan pipeline
project, risk analysis of the construction schedule required the inclusion of the
effects of weather conditions within the project network plan.
OVERVIEW O F PERT
/ 7. t-
; - -
t,; :t
Figure 9-1 Illustration of the "conventional" PERT statistical approach to the network
originally presented in Figure 4-5.
The PERT Statistical Approach 271
quent activities on the critical path, so that the project will still be completed
on time. This chapter is concerned with the problem of estimating the prob-
ability of having to undertake such measures. Hence, the uncertainties in per-
formance time being referred to here are those associated with completing the
originally defined activity with the originally specified resources.
Returning to the example, one notes that the actual performance times for
the activities on the critical path, instead of being exactly 2, 8, and 5 days, are
variables subject to random or chance variation, withmean values of 2, 8, and 5,
respectively. Also, the actual time t o perform the activities on the critical path
is the sum of three random or chance variables, and (except for the slight possi-
bility that activity 6-7 may be completed after activity 3-7 and activity 5-8
after activity 7-8) this sum is also the actual t i e to complete the project.
Hence, to estimate the statistical distribution of project performance time,
and in turn compute the probability of meeting a scheduled date for the comple-
tion of the project, it will be necessary to deal with the statistics of the sum of
random variables. In the next section the theory of probability and statistics
necessary to handle this problem will be considered. The following section will
describe "conventional" PERT scheduling and probability calculation along with
several practical applications. Several important refinements t o the conventional
PERT procedure are given at the end of this chapter.
The treatment of PERT given in this chapter is referred t o as "conventional"
because the calculation of earliest and latest activity start and finish times is
made in the same way as described in Chapter 4, using expected activity perfor-
mance times only. The variability associated with activity performance times is
involved only in the computation of PERT probabilities. This simplifying as-
sumption causes the PERT event times t o be biased slightly, always on the low
side, and the PERT probabilities considerably on the high side. For example,
in Figure 9-1 the earliest expected complete time for activity 7-8 is 15. How-
ever, since the actual complete time for activity 5-8 may be greater than that for
activity 7-8, even though its expected time of 14 is less (earlier) than that for
activity 7-8, the correct expected time for the completion of both activities 5-8
and 7-8 must be greater than 15.
The fact that the conventional PERT procedure always underestimates the
expected occurrence times of network merge events and their successors, dis-
turbs users. The fact is, however, that this bias is usually relatively small; less
than 5 percent. It turns out that the PERT probability estimates are more seri-
ously biased, on the high side. This is due not only to the merge event t i e bias,
but also to the relatively large error in the estimate of the variance of the actual
project duration time. These biases will be illustrated in the latter sections of
this chapter, along with two practical methods of circumventing them. One rela-
tively simple method, called PNET, considers not only the critical path, but also
a "sufficient" set of near critical paths so that accurate probability estimates
272 11 I Advanmd Topi-
vice will continue operating for at least one hour and "highly improbable" that
it will continue operating for more than one thousand hours, one can say that
the respective probabilities are, say, 0.999 and 0.001. The definitionsandmathe-
matical procedures that enable one t o go from qualitative to quantitative state-
ments can become quite technical and highly specialized; the intent, however, is
to enable one to make precise and valid statements about the degree of certainty
or uncertainty associated with specific occurrences.
?The definition of these two terms used here differs from that used in literature on decision
theory, where the differentiation between uncertainty and risk is based on the presence or
absence of a probability distribution associated with the variable in question.
Activity duration time, f
Figure 9-2 Empirical frequency distribution of activity duration times.
learning, changes in working conditions, job description, etc., take place. Al-
though PERT generally involves no statistical sampling of this sort, for the
purpose of this discussion, one may suppose the duration times for this ac-
tivity ranged from 7 to 17 days. Now suppose that one counts the number of
times the activity required 7 days to perform, 8 days to perform, etc., and dis-
plays the resulting data in the form of an empirical frequency distribution or
histogram as shown in Figure 9-2. If one had an infmite number of observa-
tions and made the wjdth of the intends in Figure 9-2 approach zero, the
distribution would merge into some smooth curve; this type of curve will be
referred to as the theoretical probability density of the random variable. The
total area under such a curve is made to be exactly one, so that the area under
the curve between any two values o f t is directly the probability that the random
variable t will fall in this interval.
2I
-8
D
$
m
-
u
E
>
u
,-
-
u
a3
a:
Random variable
mean as a measure of central tendency, and what is called the standard devia-
tion as the measure of variability. These statistics will first be defmed with re-
spect to a sample of n observations drawn from some distribution such as the
one shown in Figure 9-2. If the n obselvations are denoted by t,, t , ,. . , t,, .
these measures are computed as follows:
The above formula for the standard deviation indicates why it is sometimes
referred to as the root-mean-square deviation; it is the square root of the mean
of the squares of the deviations of the individual observations from their aver-
age. Computations will frequently use the square of the standard deviation,
which, for convenience, is called the variance; sf = variance oft.
The question usually asked at this point is what do I and s, (or st) mean? First
of all, t and st both carry the same time units and are estimates of the true mean
and standard deviation of the distribution shown by the smooth curve in Figure
9-2. These quantities will be denoted by t, and (vt)ll*, respectively; I ap-
proaches t, and st approaches ( v ~ ) 'as~ the
~ size of the sample, n, approaches
infinity. If some assumption is made now about the theoretical distribution (the
smooth curve in Figure 9-2) from which the sample was obtained, one can pro-
ceed with the interpretation. For example, suppose the random variable t is
"normally" distributed, that is, the distribution has a characteristic symmetrical
bell shape which frequently occurs when a variable is acted upon by a multitude
of random chance causes of variation. In this case, our interpretation is shown
in Figure 9-4.
The last bit of statistical machinery needed for PERT probability computations
is the Central L i t Theorem, which is perhaps the most important theorem in
all of mathematical statistics. In the context of PERT, this theorem may be
stated in the following way.
Scale of
random
variable f
That is, the mean of the sum, is the sum of the means; the variance of the sum
is the sum of the variances; and the distribution of the sum of activity times will
be normal regardless of the shape of the distribution of actual activity perfor-
mance times (such as given in Figure 9-2).
The normal distribution is extensively tabulated and therefore probability
statements can be made regarding the random variable T by using these tables.
A table of normal curve areas is given in Appendix 9-1, and an example illus-
trating its use is given later.
Possible outcomes:
Random variable X 1 2 3 4 5 6
Figurs 9 5
If the die being tossed is unbiased, the probability of each outcome of this
experiment is equally likely, and hence has a probability of 8,
since there are
just six possible outcomes. This is shown in Figure 9-6, which is called a theo-
retical probability distribution for the random variable X. The mean and vari-
ance of this theoretical distribution can be computed using equations (1) and
(2) in which each possible value of the random variable X is weighted by its
theoretical probability. These results are indicated in Figure 9-6.
MeanofX=(l x $ ) + ( 2 X i ) + ( 3 ~ i ) + ( 4 ~$1
+(5~;)+(6xi)=$=3;
Variance of X = (1 - 3'); X i+ (2 - 3+)2 X i
t(3-332 X i + ( 4 - 332 x i
+(5-3f)2~$+(6-3;)2~$
= $=211
12
Now consider tossing two dice with the random variable Y defined as the sum
of the spots on both dice, i.e., Y = X, + X2.The probability distribution for
this example, shown in Figure 9-6, follows directly from the fact that there are
36 mutually exclusive and equally likely ways of tossing two unbiased dice, the
outcomes of which are shown by the matrix in Figure 9-7, which gives the total
number of spots for each of the 36 combinations.
The reader can verify that by using equations (1) and (2) in the same manner
as shown above for the single die case, the mean and variance of this distribution
are exactly twice the values for a single die, i.e., mean = 2 X 34 = 7 and the
variance = 2 X 2g = 56, as they should be according to the Central Limit Theo-
rem. One should also note from Figure 9-6 that while the basic random variable
X has a rectangular distribution, the random variable Y has a triangular distribu-
tion which represents a large step toward the theoretical normal distribution as
dictated by the Central Limit Theorem.
To carry this experiment still one step further, consider tossing three dice
with the random variable Z defined as the sum of the spots on all three dice,
The PERT Statistical Approach 279
P (XI
P fZl
I Three dice
Mean of Z = 10 1 R
Variance of Z = 8 314
i.e., Z = X, + X2+ X 3 . The reader can again verify that the mean and variance
of this distribution follow the Central Limit Theorem, i.e.,
Mean of Z = 3 X 3 1 = 10;
Variance of Z = 3 X 2% = :8
Examination of Figure 9 6 indicates that the shape of the distribution is now
very close to the theoretical normal distribution. The Central Limit Theorem
will be applied in the section below on the probability of meeting a scheduled
280 11 I Advanced Topi-
Second die
1 2 3 4 5 6
Figure 9-7 The thirw-six equiprobable ways of tossing two unbiased dice.
PERT basic scheduling computations utilize the expected values, t,, of the hypo-
thetical distributions of actual activity performance times, as depicted in Figure
9-2 and 9-8 below. Since PERT addresses itself primarily to programs whose
activities are subject to considerable random variation and to programs where
time schedules are of the essence, it utilizes the standard deviations of the dis-
tributions shown in these figures in computing a measure of the chances of meet-
ing scheduled dates of project milestones.
In making PERT computations, it must be realized that the activity perfor-
mance time distribution is purely hypothetical, since one ordinarily is unable
t o do any statistical sampling whatever. [If historical (sample) activity duration
data are available, they can be used to estimate a, rn, and b, as indicated in Ap-
pendix 9-21. After an activity has been performed, the observed actual perfor-
mance time, denoted by t, for the activity can be considered as a single sample
from this hypothetical distribution. However, all computations are made prior
to the performance of the activity; hence, as stated above, the basis of PERT
computations involves no statistical sampling, but rather it depends on the judg-
ment of the person in charge of the activity in question. The latter judgement
is, of course, based on a sampling of work experiences; however, this is not
sampling in the strict statistical sense. In making these subjective estimates,
The PERT Statistical Approach 281
Probability
density
one is asked to call on his general experience, and his knowledge of the require-
ments of the activity in question, to consider the personnel and facilities avail-
able to him, and then to estimate the three times shown in Figure 9-8. These
times defmed below, will then be used to estimate the mean and standard devia-
tion of the hypothetical activity performance time distribution. The choice of
a most likely time, rn, and then a range of times from an optimistic estimate, a,
to a pessimistic estimate, b, seems to be a natural choice of times.
Definition:
a = optimistic performance time; the time which would be bettered only one
time in twenty if the activity could be performed repeatedly under the same es-
sential conditions.
Definition:
rn =most likely time; the modal value of the distribution, or the value which
is likely to occur more often than any other value.
Definition:
The above definitions of a and b are called the 5 and 95 percentiles, respec-
tively, of the distribution of the performance time, t. These definitions are
based on a study by Moder and Rodgers.lD They differ from the original devel-
opment of PERT,^^" where they were assumed to be the ultimate limits, or the
0 and 100 percentiles of the distribution of t. An intuitive argument for our
definition is that since the estimates of a and b are based on past experience and
judgment, the 0 and 100 percentiles would be very difficult to estimate, since
they would never have been experienced. Further arguments of a statistical na-
ture will be presented below.
Although the above definitions of a, m, and b appear to be clear and work-
able, the following points will be helpful in obtaining reliable values for these
time estimates.
1. One of the important assumptions in the Central L i i t Theorem is the in-
dependence of the random variables in question. Since this theorem is the
basis of PERT probability computations, the estimates of a, m, and b
should be obtained so that the assumption of independence is satisfied,
that is, they should be made independently of what may occur in other ac-
tivities in the project, which may in turn affect the availability of man-
power and equipment planned for the activity in question. The estimator
should submit values for a, m ,and b whiih are appropriate if the work is
carried out with the initially assumed manpower and facilities, and under
the assumed working conditions.
2. The estimates of a, m, and b should not be influenced by the time avail-
able to complete the project, i.e., it is not logical to revise estimates by an
across-the-board cut in t i e s after learning that the project critical path is
too long. This completely invalidates the PERT probabilities and destroys
any positive contribution that they may be able to make in the planning
function. Time estimates should be revised only when the scope of the
activity is changed, or when the manpower and facilities assigned to it are
changed.
3. To maintain an atmosphere conducive to obtaining unbiased estimates of
a, m, and b, it should be made clear that these are estimates and not
schedule commitments in the usual sense.
4. In general, the estimates of a, m, and b should not include allowances for
events which occur so infrequently that one does not ordinarly think of
them as random variables. The estimates of a, m, and b should not include
allowances for acts of nature-fires, floods, hurricanes, etc.
5 . In general, the estimates of a, m, and b should include allowances for
events normally classed as random variables. An example here would be
the effects of weather. For activities whose performance is subject to
weather conditions, it is appropriate to anticipate the time of the year
when the activity will be performed and make suitable allowance for the
anticipated prevailing weather in estimating a, m,and b.
The PERT Statistical Approach 283
As mentioned above, a and b were originally defined as the 0 and 100 percen-
tiles of the distribution of t , and therefore, the divisor in equation (3) was 6 in
place of the above value of 3.2, in the original development of This
is the basis of another argument in favor of our 5 and 95 percentile definitions
of a and b. In the paper by Moder and ~ o d ~ e r s , ' it
' is shown that the difference
(b - a) varies from 3.1 to 3.3 (average of 3.2) standard deviations for a wide vari-
ety of distribution types ranging from the exponential distribution to the normal
distribution, including rectangular, triangular, and beta type distributions. For
this same set of distributions, the difference between the 0 and 100 percentiles
varies, however, from 3.5 all the way to 6.0. Thus, the use of the 5 and 95 per-
centiles for a and b leads to an estimator of the standard deviation that is robust
to variations in the shape of the distribution of t. This is of some importance,
because in general we do not know the shape of the distribution o f t , and fur-
ther, we wish to avoid making any specific assumptions about it.
A simple formula for estimating the mean, t,, of the activity time distribution
has also been developed. It is the simple weighted average of the estimates a, m,
and b given in equation (4).
*The 0 and 100 percentile definitions of a and b were used in this derivation. The same
formula should hold, however, for the 5 and 95 percentile definitions used in thjs text.
284 11 / Advanced Topia
It should also be pointed out that the mean is equal to the most likely or
modal time ( t , = m ) , only if the optimistic and pessimistic times are symmetri-
cally placed about the most likely time, i.e., only if b - m = m - a. Thus, in
the CPM procedure the single time estimate, denoted by D, is an estimate of the
mean activity duration time and is not necessarily the most likely time as de-
fined here. This is essential, since according to the Central Limit Theorem, the
expected total duration of a series of activities is the sum of their mean times
and not a sum of their most likely times. In fact, since the distribution of the
sum of random variables tends to the normal (symmetrical) distribution for
which the mean and the mode are the same, the most likely (modal) duration
time of a series of activities is not given by the sum of the individual activity
most likely times, but rather by a sum of their mean times.
If a single time estimate system is being used, and an activity is encountered
which has a skew distribution with a considerable amount of variation, then
equation (4) might be of assistance in arriving at the single time estimate, D. In
this case, a person might feel that he can estimate the mean activity duration
time more accurately by estimating a, m , and b, and using equation (4) to con-
vert these numbers to the required single t i e estimate, D. Some evidence t o
this effect was found in the study cited in Reference 10.
To illustrate the computation in the PERT statistical approach, consider the
simple network given in Figure 9-9. Here, for the network originally presented
in Figure 4-1, single time estimates have been replaced by estimates of a, m , and
b. For example, a = 1, m = 2, and b = 3 for activity 1-2. In the middle diagram
of Figure 9-9 are indicated the values of t,, and Vt computed from equations
(3) and (4). These computations are illustrated below for activity 1-2.
t, = (1 + 4 X 2 + 3)/6 = 2
V, = [(3 - 1)/3.2] e0.391
The results of the forward pass are indicated by the time scale at the bottom
of Figure 9-9. The earliest expected event occurrence times, E, are computed in
exactly the same manner (in conventional PERT) as outlined for the single time
estimate systems, as shown in Figure 4-1.
The event variance, VT, is computed in a manner quite similar to the compu-
tation of E. The rules are as follows:
Mean = E6 = 12
3 Std. dew. = 3 ( V 7
Time units
Figure 9-9 PERT statistical computations.
286 11 / Advanced Topica
Applying these rules to the network given in Figure 9-9, one obtains the fol-
lowing:
VT (event 1) = 0
Mean = E8 = 12
T
7 12 14 17
in Figure 9-10, where the distribution is shown to "touch down" on the abscissa
at three standard deviations on either side of the mean, i.e., at 12 f 5.
Now, the problem of computing the probability of meeting an arbitrary
scheduled date, such as 14 shown in Figure 9-10, is quite simple. Since the total
area under the normal curve is exactly one, the crosshatched area under the nor-
mal curve is directly the probability that the actual event occurrence time, T ,
will be equal to or less than 14, which is the probability that the scheduled date
will be met. This probability can be read from the table of normal curve areas,
given in Appendix 9-1 at the end of this chapter. In order for this table to apply
to any normal curve, it is based on the deviation of the scheduled date in ques-
tion, Ts, from the mean of the distribution, E6, in units of standard deviations,
( v T ) " ~ . Calling this value Z , one obtains
A value of Z = 1.21 indicates that the scheduled time, T8, is 1.21 standard de-
viations greater than the expected time, E, = 12. Reference to Appendix 9-1B
indicates that this value of Z corresponds to a probability of approximately
0.89. Thus, assuming that "time now" is zero, one may expect this project to
end at time 12, and the probability that it wiU end on or before the scheduled
time of 14, without expediting the project, is approximately 0.89. It should be
pointed out that if Ts had been two days less than E, instead of being greater,
i.e., Ts = 12 - 2 = 10, then Z = - 1.21, and the corresponding probability would
be 0.11. Hence, it is essential that the correct sign is placed on the 2.
The above phrase, "without expediting," is very important. In certain proj-
ects, schedules always may be met by some means or another, for example, by
changing the schedule, by changing the project requirements, by adding addi-
tional personnel or facilities, etc. The probability being computed here is the
probability that the original schedule will be met without having to expedite the
work in some way or another. For this reason, the following rules should be
adopted in dealing with networks having two or more scheduled dates.
Definition:
Rule:
Definition:
The conditional probability of meeting a scheduled date is the probability
of the occurrence of an event on or before a specified time, assuming that all
prior scheduled events occur on their scheduled dates.
Rule:
Suppose the scheduled time for the completion of the project shown in Figure
9-9 had been T, = 10; then the probability of meeting this schedule would have
The PERT Statistical Approach 289
been the relatively low figure of 0.11, as discussed in the previous paragraph.
One might then ask the question, what is the probability of meeting various re-
vised project completion times? A convenient way to answer this question is
with a graph (or table) giving cumulative probability vs. project duration time.
Applying equation (5) above, this probability can be written as
Cumulative Probability
Completing Project on = P{T 5 T,} = P{Z $ [T, - E(T)]1 6 )
Before Time T,
Figure 9-11 Comulative probability of completing the project on or before the scheduled
time TS.
290 11 I Adnncsd Topics
Now, the probability of meeting any possible schedule can be read directly from
Figure 9-1 1. For example, the probability of meeting a schedule of T, = 13 days
is approximately 0.7.
To illustrate the use of Eqs. (3) and (4), an example wiU be given dealing with
the overhaul of jet aircraft. The data given in Table 9-2 lists the nine activities
that form the critical (longest) path through the network of overhaul activities.
Because of physical space limitations, the number of men that can be assigned
to an overhaul task is almost fixed. Thus, an activity cannot be accelerated by
adding manpower when an overhaul project is behind schedule, and for this rea-
son, it is reasonable to assume that the actual activity duration times are statis-
tically independent. Also, the critical path is considerably longer than the next
most critical path, so that the usual PERT application of the Central Limit
Theorem is justified. The results given in Table 9-2 indicate that the expected
duration of this series of activities is 169.0 hours (7.05 days), with a standard
deviation of the actual performance times equal to 11.3 hours (0.47 days). The
overhaul duration that will not be exceeded more often than say one time in ten
can be estimated by substituting these statistics in eq. (5) and solving for Ts,
which is found to be 7.65 days.
In this example, the objective was to accomplish the overhaul project in seven
days. Thus, technological changes in the techniques of overhaul or in the extent
of the work to be accomplished must be made to reduce the overall duration of
Open Pylons 4
Open Engines 1
Cable Checking 10
Remove Engines 1
Pylon Rework 96
Reassemble Pylon, Etc. 12
Fuel Aircraft 1
Check Fuel Tanks, Etc. 4
Wing Closures 2
Final Checkout 6
TOTALS: ..... ... . . .... ....... . . . ..... . ...... .. ...
Standard Deviation = 11.3 Hours
the project by at least 0.65 days, or about two work shifts, or a reduction in the
standard deviation of the project duration, or some combination of both.
One of the frequent criticisms of the PERT statistical approach is that the per-
sons supplying values of a, m , and b do not have the experience to furnish accu-
rate data. This criticism is largely due to the nature of the work being planned.
Also, the estimators are not consistent, some being conservative while others are
liberal in making their estimates. In addition, there is the real possibility that
the estimates are biased by a knowledge of what some h~gherauthority would
like the times to be for aribtrary reasons.
This problem was studied by MacCrimmon and Ryavec.' They studied the
effects of various sources of errors on the estimates of the mean, t,, and the
standard deviation (v,)"~. They considered errors introduced by (1) assuming
the activity time distribution was a beta distribution; (2) by using the PERT ap-
proximate formulas given by equations (3)* and (4); and (3) by using estimates
of a, m, and b in place of the true values. They concluded that these sources of
error could cause absolute errors in estimates of t , and ( ~ , ) ' ~ % f 3 0 and 15
percent of the range (b - a), respectively. Since these errors are both positive
and negative, however, they will tend to cancel each other.
This problem was also considered by King and Wilson,' who studied actual
data obtained from a large scale development project involving a prime con-
tractor and a number of subcontractors. They examined the hypothesis that
there is a general increase in the accuracy of pre-activity time estimates as the
beginning of the activity approaches. They rejected this hypothesis. Their
data also indicated that most of the time estimates were optimistic, some being
as low as 13 percent of the actual activity duration time. The same conclusion
was reached in regard to ability t o improve the estimates of remaininglife after
the activity was started. In this study, the estimate of remaining life was, on
the average, 72 percent of the actual value. On the basis of these findings, the
authors proposed for consideration, the upward adjustment of all time estimates.
In the project studied, a multiplier of 1.39 would have reduced the average error
in the activity duration times to zero.
Another serious aspect of this problem that has not received much attention
is the effect of the "Peter Principle" applied t o activity performance times. It
might be stated as follows: The actual time required to perfoim an activity wilI
rise to at least fill the time allotted to it. Referring to Fig. 9-9, the actual time to
perform an activity would be expected t o be less than the mean, t,, about as
*They assumed 0 and 100 percentiles were used, and a corresponding divisor of 6 in equa-
tion (3).
292 11 I Advanced Topics
often as it exceeds the mean. (About is used here because for a distribution
skewed to the right (or left), the mean will be slightly greater (or less) than the
median or 50% point.) Experience would undoubtedly not bear this out be-
cause of the ever present human temptation t o take a situation where the per-
formance time could be less than the mean, and drag it out to refme or improve
the results beyond the initial product specification, or by the diversion of efforts
away from the activity to complete "other things." Thii presents a real chal-
lenge to management to create a climate where performance times less than the
expected values (t,) will occur. The control chart procedure described below
may be of some help in alleviating this problem.
Another approach to this problem, which these authors feel has more promise,
is t o work with the individuals making the time estimates t o improve their future
estimates by supplying them with positive feedback information. It is suggested
that records be kept for each person supplying activity time estimates. These
records should give the deviation of the estimated and actual activity perfor-
mance times in units of standard deviations as shown in equation (6).
One problem which complicates this analysis is that the specifications for the
work comprising the activity, or the level of effort applied to the activity, may
be changed before the activity is completed. In these cases, the only valid proce-
dure is t o use the estimated mean time, t,, which was made immediately after
the final deviation in the activity specification or level of effort occurred.
The Z values computed for a particular estimator can then be tabulated and
studied, as additional activities with which he is associated are completed. Theo-
retically, these Z values should vary randomly about zero from about - 3 to +3,
with the majority of the values near zero. Deviations from this pattern have a
very logical interpretation; they should be studied by the estimator who supplied
the data so that improvements in the estimates can be made. If the points vary
about a mean less than the zero centerline, then the estimator has the common
problem of underestimating the time required to perform assigned tasks. Simi-
larly, variation about a mean greater than zero would indicate a consistent over-
estimation of performance times. Also, the points should vary from - 3 to +3,
or possibly - 4 to + 4 if the performance time distributions are skewed. If they
vary over too wide a range, say ? 5 , then generally, the difference between the
pessimistic and optimistic estimates (b - a) must be increased. The other possi-
bility is not too likely, but consistent variation over too narrow a range would
call for a reduction in the difference (b - a).
The PERT Statistical Approach 293
PERT probability computations can be handled in much the same way as time-
cost trade-offs were handled in Chapter 8. If a computer is being used, then
estimates of a, m , and b must be obtained and used on all activities. In this
case, probabilities of meeting specified scheduled times are given in the com-
puter output, such as are shown in Figure 9-13, for the network shown in
Figure 9-12. However, if the computations are being made by hand, one could
start off with a single time estimate for the mean performance time for each
activity, and then obtain a, m , and b values only for those activities on the criti-
cal path, or the longest path leading to the scheduled event in question. This
procedure is summarized below.
1. Make the usual forward and backward pass computations based on a single-
time estimate, D, for each activity.
2. Suppose one wishes to compute the probability of meeting a specified
scheduled time for event X. Then obtain estimates of a, m and b for only
those activities that comprise the "longest path" from the initial event to
the event X. If necessary, adjust the length of this path as dictated by the
new t , values based on a, m and b.
3. Compute the variance for event X, (VT), by summing the variances for the
activities listed in Step 2. VT = sum of values of [(b- a)/3.2I2,for each
activity on the "longest path" leading to event X.
4. Compute z using equation (5) and look up the corresponding probability
in the normal curve table given in Appendix 9-1.
To use the PNET method described below, values of a and b must also be col-
lected on the "near" critical paths, to be defined.
Referring again to Figure 9-12, the practice of labeling the events on the net-
work, rather than the activities, should be noted. Event labeling in this manner
is not recommended because it confuses the reader; one cannot be sure which
arrows and time estimates apply to which events. This procedure was adopted
to be compatible with the early government practice of controlling this type of
project by monitoring milestone events. Milestones are, of course, key points
in time in the life of a project and are, therefore, events which occur at the com-
pletion of one or more activities. Upper management keys on the status of mile-
stone events, while lower levels of management concentrate on the performance
of individual activities as shown in Figure 9-13. To facilitate this reporting at
several levels of detail, computer programs are utilized to summarize networks
by retaining only the specified set of milestone events. (This concept was dis-
cussed under Network Condensation in Chapter 3.)
294 11 I Advanced Topics
PAGE 1
PERT SYSTEM
PERT SYSTEM
4004-715 4004-716 REV DATE (SMITH TROMBONE RECO-BEG TEST) 98 05-26-61 A06-07-61 -1.6 t
4004-716 4004-714 SMITH TROMBONE TESTED 0146 06-23-61 06-12-61 -1.6 + 2.3 .4
4004-714 4004-727 TROMBONE CHOSEN-BEGIN MECH OESIGN 0146 06-28-61 06-16-61 -1.6 t 3.0 .5
4004-727 4004-728 RFP PARAMP FLIGHT HARDWARE 0146 07-20-61 07-08-61 - 1.6 + 6.1 .7
4004.728 4004-729 PARAMP CONTRACT LET 0146 08-17-61 08-05-61 -1.6 t10.1 .8
4004-729 4004-730 PARAMP RECEIVED 10-26-61 10-14-61 -1.6 t20.1 1.3
4004-730 4004-734 PARAMP TESTED 0146 11-09-61 10-28-61 -1.6 t22.1 1.4
4004-734 4004-742 CHOICE BETWEEN PREAPIP-PARAMP 0146 11-13-61 11-01-61 -1.6 t22.6 1.4
4004-742 4004-743 COMPL MICROWAVE ASSY 0146 12-09-61 11-28-61 -1.6 t26.5 1.6
4004-743 4004-199 COMPL FINAL TEST MICWAVE ASSY-DELIVERED 0146 12-25-61 12-13-61 12-13-61 .12 -1.6 t28.6 1.9
4000-001 4004-713 REV DATE (JONES TROMBONE RECO-BEG TEST) 99 05-29-61 A06-07-61 -1.3 +
z
4004-713
4004-714
4004-714 JONES TROMBONE TESTED
t .5
t
t
2.0
3.0
.1
.5
m
p
-
rn
4004-717 4004-731 RFP FOR FLIGHT HDW-MIXER-TROMB-PREAMP 0146 07-20-61 07-24-61 + .5 t 6.1 .7 4
4004-717 4004-739 COMPL MICWAVE ASSY TEST-RFP LOC OSCIL 0146 07-20-61 07-24-61 t .5 + 6.1 .7 J?
4004-731 4004-735 TROMBONE CONTRACT LET 0146 08-17-61 08-21-61 t .5 t10.1 .8 g,
4004-731 4004-737 MIXER CONTRACT LET 0146 08-17- 61 08-21-61 + .5 +10.1 .B a
4004-739 4004-740 CONTRACT LET FOR LOC OSCIL AND PWR SPLT 0146 08-17-61 08-21- 61 t .5 t10.1 .8 "
4004-735 4004-736 TROMBONE RECEIVED 10-14-61 10-18-61 + .5 t18.5 1.8
4004-737 4004-738 MIXER RECEIVED 10-14-61 10-18-61 + .5 +1B.5 1.8 u
4004-740
4004-736
4004-741
4004-742
LOC OSC-PWR SPLITTER RECEIVED
TROMBONE TESTED
10-14-61
0146 10-28-61
10-18-61
11-01-61
+ .5
+ .5
t18.5
t20.5
1.8
1.9
5g
4004-738 4004-742 MIXER TESTED 0146 10-28-61 11-01-61 + .5 t20.5 1:9 s
4004-741 4004-742 LOC OSC-PWR SPLITTER TESTED 0146 10-28-61 11-01-6: + .5 i20.5 1.9
Figure 9-13 Typical PERT computer output. (First three-paths shown here.)
I
m
296 11 I Advanced Topics
The critical path through the project network in Figure 9-12 is marked by the
heavy line. The computer output in Figure 9-13 is based on a primary sort of
slack, and a secondary sort of early start time. This places the critical path as
the first set of 10 activities, the next most critical path as the next set of 2 ac-
tivities, and the third most critical paths as the final set of 12 activities. Notice
that the slack on the critical path is - 1.6 weeks, because the scheduled comple-
tion time (12-1361) is earlier than the expected time (12-25-61). Because of
this, the probabiliy of meeting this schedule is a low value of 0.12. Clearly, this
would be a red Iight signal, calling for some immediate application of time-cost
trade-off procedures to raise this probability to an acceptable level. Further-
more, it would be unwise to wait further t o consider this problem, because as
time goes by, the most economical way t o buy time may have passed by.
As pointed out in the introduction to this chapter, the conventional PERT pro-
cedure described above always leads to an optimistically biased estimate of the
earliest (expected) occurrence time for the network events. This bias arises be-
cause all subcritical paths are ignored in making the forward pass computations.
If the longer path leading to a merge event is much longer than the second
longest path, and/or the variance of the activities on the longest path is small,
this bias will be insignificant. The first part of this section will be devoted to a
series of examples designed to give the reader an appreciation for the signifi-
cance of this bias problem. Finally, a solution t o this problem using the PNET
procedure and Monte Carlo simulation will be described in some detail.
Magnitude of Bias
A study of this problem was made by MacCrimmon and Ryavec,' who con-
sidered two of the more important factors affecting the magnitude of the merge
event bias. First, one would intuitively expect the bias t o increase as the num-
ber of parallel paths to the network end event increases. This is studied in Fig-
ure 9-14 below. Second, one would also expect the bias to increase as the ex-
pected length of the parallel paths become equal. This is studied in Figure 9-15.
Consider the four activity network in Figure 9-14a. The particular discrete
distribution assumed for each of these activities can be identified in Table 9-3 by
the corresponding mean shown on the network activities. There are two paths,
ABD and ACD, both having a mean length of 6. The mean of the maximum
time distribution, or the earliest expected time for event D is 6.89. Thus, the
error in the PERT calculated mean is 12.9 percent of the actual mean.
There are two possible ways a third path, with a mean length of 6, may be
created by adding one more activity. In one case the path may be completely
independent of the other two paths, thus resulting in a third parallel element,
The PERT Statistical Approach 297
Figure 9-14 Effect of parallel paths. with and without correlation,on themergeevent bias.
Ratio of path AC
Lengths: path ABC
PERT (Mean)
Exact (Mean)
% Error
PERT (Std. Dev.)
Exact (Std. Dev.)
% Error
Figure 9-15 Effect of slack on merge event bias.
The PERT Statistical Approach 299
t Probability t Probability
1 % 2 x
2 K 4 %
3 % 6 %
Mean = te = 2 Mean = re =4
S t d . Dev. = ( v ~ =)0.707
~ ~ ~ S t d . Dev. = = 1.414
Coef. of Var. = ( ~ ~ ) =~35%
/ ~ l t ~ Coef. of Var. = ( ~ ~ l ' =/ 35%
~ / t ~
This example indicates that the deviation of the PERT-calculated mean and
standard deviation, from the actual mean and standard deviation, may be quite
large when the paths are about equal in length, but the difference decreases
substantially as the path lengths become farther apart.
Because of point 2 above, the correction at most merge events will be negligible
and thus can be ignored. From a study of tables derived by C l a ~ k giving
,~ the
expected value of the greatest of a finite set of random variables, this can be
stated as a useful rule of thumb as follows.
Rule:
If the difference between the expected complete times of the two merging
a$yitie-considered is greater than the larger of their respective standard
deviations, then the bias correction will -.
be small;
-if the difference is greater
than two standard deviations, the bias will be less th& a few percent and can
be ignored. (The difference referred to here is what has been defined in Chapter
4 as activity free slack.) If there are more than two merging activities, this rule
should be applied to the two with the latest expected finish times.
The validity of this rule is illustrated in Figure 9-15. The difference (slack)
in the expected time of the two merging activities is less than one standard devia-
300 11 I Advanced Topicr
tion in Figure 9-15b and is greater than two in Figure 9-15c. The corresponding
biases of 8 percent and 0.5 percent are appreciable andinsignificant,respectively,
as suggested by this rule.
If the above does not rule out the need for a bias correction, then it should be
made by one of the procedures described below.
The merge event bias correction problem is essentially a statistical problem, deal-
ing with a random variable defined as the maximum value of a set of random
variables, not necessarily statistically independent. The latter condition compli-
cates the problem greatly. The maximum value is the earliest expected occur-
rence time of the (merge) event in question, and the set of random variables is
the actual complete times of the activities merging to the event in question.
These latter times are not always statistically independent, because of the net-
work crossover condition previously illustrated in Figure 9-14c.
This is an intriguing statistical problem that has caught the fancy of many
researchers, and dozens of papers have been written about it. Only the rela-
tively recent work of Ang, Abdelnour and Chaker' (1974) will be presented
here because it is the simplest of the procedures that produce a satisfactory
solution. Their procedure is called PNET.
To introduce this procedure, consider again the network shown earlier in
Figure 9-1. The conventional critical path is 0-3-7-8, having an expected time
of 15, with a standard deviation 1.68 days. Suppose the three time estimates for
the additional activities 3-4, 4-5, and 5-8 are as shown in Table 9-4. These data
Table 9-4. Mean and Standard Deviation of the Critical and Near Critical Paths
for the Network in Figure 9-1
0-3 1 2 3
3-7 6 8 10
7-8 3.5 5 6.5
3-4 1 4 13
4-5 2 4 6
5-8 2 3 4
~otals*
Standard Deviation
'The mean and variance of the duration of a path is merely the sum of the means and vari-
ances of the activities along the path in question; the standard deviation of the path dura-
tion is then obtained as the square root of its variance.
The PERT Statistical Approach 301
lead to the mean, variance, and standard deviation statistics for the critical path,
0-3-7-8, and the near critical path, 0-3-4-5-8, as shown at the bottom of the
table. Using eq. (S), the cumulative probability curves for each of these paths
are then computed and are shown in Figure 9-16. They appear as straight limes
because the graph paper used here, called Normal Probability paper, has a verti-
cal scale adjusted to produce a straight line for any normally distributed random
variable. It is obvious from these two graphs that the PERT probability proce-
dure, which considers only path 0-3-7-8, is biased on the high side. In fact, for
any scheduled time greater than the cross over point (about 15.7) the cumulative
probability for the near critical path is considerably less than for the critical path
itself. This anomoly occurs because of the very large variance for the near criti-
cal path; a situation which could occur in practice. It should also be noted that
although the individual path lengths have Normal distributions (by virtue of the
Central Limit Theorem) the distribution of the project duration, considering all
paths, is not Normal. This distribution, t o be derived below, is shown by the
dashed line in Figure 9-16. This censoring of the lower tail of the distribution
is a characteristic result which has been verified repeatedly by simulation. It can
be explained by recalling that the actual project duration is the maximum of a
set of random variables. The lower tail of this distribution of the maximums is
.999 -
,998 -
,995 -
.99
-
-
.98
-- -
--
.95
--
.90
--
.80
> .E -
Standard
1 1 l 1 1 1 1 1
6 8 10 12 14 16 18 20 22 24 26
Project scheduled duration time. Ts
Figure 916 Cumulative probability of path and project mmpletion on o r before time T5.
302 11 I Advanced Topics
truncated because a low maximum requires all of the paths t o be low, and hence
it occurs infrequently. However, a high maximum will result when only one or
more high path times occur, and hence it occurs more frequently. At this point
it is appropriate to ask, "What is the correct cumulative probability?"
If we are jistified in ignoring all but these two paths, we could proceed t o
answer this question by first assuming they are statistically independent. This is
a very good assumption because these paths have only one element in common,
activity 0-3, and its variance is negligible in comparison to the total path vari-
ances. Thus, from basid probability theory of independent events, the prob-
ability that the project will be completed on or before time T, is merely the
product of the cumulative probabilities that each path wiU be completed on or
before time T,. For example, for T, = 14, this probability (reading from Figure
9-16) is 0.50 X 0.27 = 0,135. The latter value is shown by the dashed curve, la-
beled Both Paths. This is essentially the procedure developed by Ang,' called
PNET. It amounts to fmding the set of assumed independent paths which "rep-
resent" the network, and then set the cumulative probability for the project
equal to the product of the cumulative probabilities for each of the "represen-
tative" paths. It can be shown that the dashed PNET curve in Figure 9-16 is
almost identical t o the correct curve.
The PNET algorithm utilizes the important fact that the linear correlation coeffi-
cient between any pair of path lengths, say Tt and Ti for paths i and j, is given
by
where the sum in the numerator is the sum of the variances of the activities that
are common t o both paths i andj, and the denominator is merely the product
'of the standard deviations of the total durations of paths i and j. The value of
pij varies from 0 for completely independent paths, to 1 for identical paths. For
the two paths in the above example, the data in Table 9-4 shows that pii is only
0.057, indicating almost complete independence of these two paths.
In the PNET algorithm, this correlation coefficient is used t o determine the set
of representative paths for the network. Jftwo u a w e a correlation coeffi-
w e r than 0.5. then the oln-_fhtew
t as is said t o represent both
paths. and the shorter oath is dropped from consideration. Similarly, if the cor-
relation coefficient is less than 0.5, the two paths are assumed in@pzd_entmd
both remain under consideration. Then, the probability that a project will meet
The PERT Statistical Approach 303
Mean = t,
Variance
I
Figure 9-17 lllustrativc network for Monte Carlo simulation and PNET.
a specified completion date is taken as the product of the probabilities that each
of the representative paths will meet the specified completion date.
An application of this procedure, given in the next section, shows excellent
agreement with the correct results obtained by simulation. Ang gives three ap-
plications of this procedure, and each shows excellent agreement with the results
obtained by simulation. One explanation of why this procedure seems t o work
better than expected, based on intuition, is that a form of the Central Limit
Theorem is in operation. That is, dropping paths with correlations greater than
0.5, tends to cancel the error effects of assuming paths with correlations less
than 0.5 are independent. A modification of Ang's - original
- PNET procedure is
given below, along with its application to the network shown above in Figure
9-1 7.
*The listing of paths in order of criticality could be accomplished from a slack sort of the
project activities, moditied so that each slack path extends from the initial to the terminal
network event.
304 II I Advanced Topics
Standard
No. Path Meen Variance Deviation
10 network paths are shown here for illustrative purposes; the listing could
have stopped after generating path 6 and showing that its mean differs from
the first (critical) path by 66 - 50.3 = 15.7, which exceeds twice the larger of
the path standard deviations, i.e., 2 X 7.8 = 15.6.
2. Compute the correlation coefficient for each pair of major paths using
equation (7), and arrange them in matrix form. For the above example, this
matrix is shown in Table 9-6.
3. Determine the set of representative paths for the network. This proce-
dure is given for the correlation matrix shown in Table 9-6.
Table 9-6. Correlation Matrix for the Five Major Paths in the Network
in Fiaure 9-17
1 . . . . . . .. . . . . . 3 . . . ... . . . . . . . . . tRepresentative Set of Paths
\ i .
i
I
& , 4
I
I
I5 t M a j o r Paths Considered
- -
Paths Deleted
The PERT Statistical Appmach 305
3.1. Start with path 1, enter it into the set of representative paths, and
move across row 1 of the correlation matrix deleting all paths with correlations
greater than 0.5. In this example, delete paths 2 and 5 because r,, = 0.88 and
rl, = 0.86 are both greater than 0.5.
3.2. Move t o the next remaining path, enter it into the set of representative
paths, and move across this row of the correlation matrix again deleting all paths
with correlations greater than 0.5. In this example, enter path 3 into the set of
representative paths, and delete path 4 because r , = 0.71 is greater than 0.5.
3.3. Continue Step 3.2 until there are no remaining major paths to be con-
sidered; at this point stop, list the set of representative paths and number them
.
1 , . , K. In this example the procedure stops after Step 3.2 because no
major paths remain to be considered, and the set of representative paths con-
sists of paths 1 and 3.
4. Calculate the probability that the duration of each representative path
(TI, . . . , TK) will not exceed some scheduled project duration (T,), assuming
that each path duration has a normal distribution with mean and standard devia-
tion computed in Step 1, i.e., calculate P(T, 5 T,), . . . ,P(TK 5 T,). These
probabilities are shown on the left side of Table 9-7, for the example problem.
5. The probability that the project completion time, T, will meet the sched-
ule time, T,, is denoted by P(T 5 T,), and is then given approximately by the
product
The Monte Carlo simulation approach to the solution of this problem was used
by Van Slykel2 in 1963. He recognized this problem as one of simply solving
the stochastic network model to find something that corresponds, in some sense,
to the project duration and critical path in the deterministic case. The difficulty
here was avoided to some extent by approximating the random problem by a
series of problems of the deterministic form. To accomplish this, Monte Carlo
simulation was used. A bonus from this approach was that it not only gave
306 11I Advanced Topics
z1 = 23 = PNET =
Ts IT- 66117.8 P ( ~ d . I7 ~ (T, - 58)14.1 P(Z 5 rs) PV 521) . P ( z ~ z ~ )
MEAN 66 58 66.9'
STANDARD
DEVIATION 7.8
his mean value was computed from the PNET cumulative probability distribution using
the following formula:
K
Mean = t; X p (ti)
i=l
.
where ti is the class mark (mid-point) of the i t h class interval ( i = 1.2.. . , K; where K = 7
in this sxample), and p ( t i ) is the probability that the (random) project duration will fall in
the i t h class interval.
-
Mean = LO18 - 0) 52.5 + (.I52 - ,018) 57.5 + .
+ (1.OM) - .9931 87.5 66.9
- - + (.993 - ,963) 82.5
-
The standard deviation, or variance, was computed in a similar fashion, replacing the class
mark (e.g., 52.51, by the (class markmean)2 (52.5 - 86.9)'.
unbiased estimates of the mean and variance of the project duration, along with
the distribution of total project time, but it also gave estimates for quantities
not obtainable from the standard PERT approach. In particular, the 'criticality'
of an activity, i.e., the probability of an activity being on the critical path, can
be calculated. One of the more misleading aspects of conventional PERT meth-
ods is the implication that there is a unique critical path. In general, any of
a number of paths could be critical, depending on the particular realization of
the random activity durations that actually occur. Thus, it makes sense to talk
about a criticality index. This appears to be an exceedingly useful measure of
the degree of attention on activity should receive by management, and is not as
misleading as the critical path concept used in PERT. It should be added that
the probability of an activity being on the critical path is not correlated too well
with slack, as computed by the conventional PERT procedure, which is the fac-
The PERT Statistical Approach 307
tor that usually determines the degree of attention that a particular activity
receives.
The Monte Carlo simulation procedure was applied by Van Slyke to the net-
work given in Figure 9-17. Each activity was assumed t o have a beta distribution
with mean, t,, and a variance, V,, as noted on each activity. As generally recom-
mended by Van Slyke for this purpose, 10,000 sets of random times were gen-
erated for each activity in the network. For each of these sets, the longest path
through the network was determined: its duration was noted, as well as a count
for each activity on the critical path. The results of these 10,000 simulations are
given in Figure 9-18, where the probability that an activity was on the critical
path is noted on each activity. For example, 0.737 on activity 1-2 means that in
7370 of the 10,000 simulations, this activity was on the longest path in the net-
work. Also, given at the bottom of Figure 9-18 are the statistics pertaining t o
the total project duration. We note here that the PERT estimate of the project
mean was low (optimistic) by only 1.5 percent; however, the variance was esti-
mated too high by 42 percent, and the results previously obtained by PNET are
well inside the 95% confidence intervals based on the simulation estimates. The
PERT result is about as expected according to the rule @en in the previous sec-
tion, because there is a considerable amount of slack along the subcritical
path(s) at each merge event. It is interesting to note, however, that activities 1-3
and 3-5, which are not on the conventional PERT critical path, have appreciable
probability of ending up on the actual critical path.
Another output of the Monte Carlo simulation study is given in Figure 9-19,
where the cumulative probability of a specified project duration is given for sim-
ulation and PNET, which were almost identical, and is compared with the results
given by the conventional PERT procedure.
A final note on the simulation procedure regards the cost of obtaining these
results. A sample size of 10,000 simulations was used in the example in Figures
9-17 and 9-18, however, this is considerably larger than justified for this problem.
A recent empirical study by Crandalls indicates that this sample size can be re-
duced to 1000 or less and still obtain an adequate level of confidence in the final
estimates. Other practitioners of simulation suggest samples as low as 400. This
is the generally recommended range of sample sizes for this problem.
A statistical analysis for the criticality index can be based on the binomial dis-
tribution, since for each simulation trial, any particular activity is either on, or
not on, the critical path. The (1-a) level confidence interval could then be con-
structed on the true criticality index, p, from the equation
308 11 I Advanced Topics
The PERT Statistical Approach 309
1.0
-I - ,
0.8 -
0.6 -
0.4-
---PERT
Monte Carlo
and PNET
I
50 55 60 65 70 75 80 85 90
Project duration
where p^ is the estimated criticality index, n = sample size, and Z,/, is the stan-
dard normal deviate. Application of this formula at the 95% confidence level
(Z,,,,, = 1.96) would indicate that if p is in the 10% to 90% range, and sample
sizes in the 400 t o 1000 range, then the estimates would fall in the ranges
*
(100 p + 21% to (100 p 5)%. Estimates within 2% t o 5% certainly represent
an acceptable level of accuracy.
Regarding the estimation of the mean project duration, some assumption
must be made regarding the coefficient of variation (CV) of the project dura-
tion, where CV = (Standard DeviationIMean) X 100%. From the real examples
reported by Ang' , and many others reported in the literature, the CV was found
to vary from 5% t o 15%. In this case, the width of the 95% confidence interval
on the estimate of the mean will vary from f0.5 to 21.5% of the mean for sam-
ple size 400, and f0.3 to 51.0% for sample size 1000. This can be computed
from the formula:
SUMMARY
In this chapter, the PERT statistical approach t o project planning and control
was given, which leads to a probability that a given scheduled event occurrence
time will be met, without having to expedite the project. The conventional
PERT procedure derives its measure of uncertainty in the event occurrence times
from the three performance time estimates, optimistic, pessimistic, and most
likely, for each network activity. This procedure was modified by defming the
optimistic and pessimistic times as 5 and 95 percentiles, respectively, of the
hypothetical activity performance time distribution, rather than the end points
of the distribution. Based on the Central Limit Theorem, estimates of the mean
and variance in activity performance times were then used to compute a prob-
ability of meeting arbitrary scheduled times for special network events. It was
recognized that it is difficult to obtain accurate estimates of the activity perfor-
mance times, and procedures for improving the estimation by feedback of past
estimation performance plotted on a standardized control chart was outlined.
The merge event bias, introduced in conventional PERT by ignoring all but
the critical path, was then discussed with examples illustrating the magnitude of
this problem. A simple rule of thumb was given to determine, from the com-
pleted conventional PERT analysis, whether this bias will be serious or not.
This rule simply states that at merge events, one can ignore the path with free
slack in excess of twice the larger of the two paths standard deviations.
Two practical procedures to overcome the statistical errors in conventional
PERT were described, that is, PNET and Monte Carlo simulation. Both methods
The PERT Statistical Approach 311
will give accurate estimates of the expected project duration and the probability
of meeting a range of scheduled duration times. It is, however, easier t o collect
this information on intermediate network events with simulation than with
PNET. Also, simulation alone will give the criticality index on each project
activity. Something approaching this might be achieved with PNET if it were
programmed to give the cumulative probability curves for the critical and near
critical paths, but this would not be as easy t o interpret as the criticality index.
Finally, it has been estimated by Angl that the computer cost of simulation is
about an order of magnitude greater than running PNET.
From the above comparison, it appears that PNET should become a standard
procedure, expected of all PERT computer routines. If the importance of the
project warrants the additional expenditure, then simulation should be utilized,
primarily t o give information on all milestone network events, and the criticality
index on all activities. With these improvements in PERT methodology in plade,
interest in this technique just may be rekindled.
REFERENCES
EXERCISES
1. Verify the Central Limit Theorem by sampling, that is, by tossing three dice
and recording the results on graphs, such as those shown in Figure 9-6. For
convenience, use a white, a red, and a green die. Call the number of spots
on the white die, X, and plot on the first figme. Call the number of spots
on the white plus the red die, Y, and plot on the second figure. Finally, call
the number of spots on all three dice, Z, and plot on the thud figure. Com-
pare the results of your experiment with the theoretical values given in
Figure 9-6.
2. Verify the expected time and variance for event (4004-1 99), and verify the
the probability of 0.12 given for activity (4004-743)-(4004-199) in Figure
9-13b. Note: the values of a and b given in this figure are the end points of
the distribution of activity performance time as used in conventional PERT
Hence (vt)ll' = ( b - a)/6 should be used in place of equation (3) given in
this text. Also, note that the time interval 12-13-61 to 12-25-61 is equiva-
lent to 1.6 working weeks.
3. Consider the oversimplified network given in Figure 9-20 which might be
only a portion of a larger network, a portion which is subject t o consider-
able chance variation in the performance times. In Figure 9-20 a and b are
5 and 95 percentiles, respectively.
a. Compute t , and V , for each of the four activities.
b. What is the earliest expected time of event 3?
Figure 9-20
The PERT Statistical Approach 313
c. What is the variance, VT,for the actual occurrence time for event 3?
d. What is the probability that the project will be completed by time 8?
By time 9?
e. What time are you fairly sure (say 95 percent confident) of meeting for
the completion of the project, i.e., the occurrence of event 3?
4. With reference t o Figure 9-1, what is the probability that event 8 will be
completed on or before the end of the 12th day, assuming all activities are
started as early as possible? What scheduled time for the entire project
would you feel 95 percent confident of meeting without having t o expedite
the project?
5. With reference t o Figure 9-1, what is the (conditional) probability that event
8 will be completed on or before the end of the 16th day, assuming that a
scheduled time of 10 is met on event 7?
6. Repeat exercise 5 on the assumption that event 7 has occurred 2 days late,
i.e., at the end of the 12th day.
7. Solve exercise 3 using the Monte Carlo approach described in the text. For
simplicity, assume that the distribution of perfoqnance times for each ac-
tivity is rectangular between the limits given by a and b . Using a table of
random numbers that are uniformly distributed on the range from 0 to 1,
given in most standard statistics texts, transform them t o the distribution re-
quired for each of the activities in Figure 9-20. For example, activity 2-3
has a possible range of 3 t o 7, or 4 time units, and a mean of 5. Letting r
denote a random number uniformly distributed on the interval 0 t o 1, then,
t = 3 + 4 r , will be uniformly distributed on the range 3 t o 7 as desired. De-
cide for yourself how many simulations of the network should be made,
and express the results in a form such as given in Figures 9-18 and 9-19.
Discuss your results.
8. Repeat exercise 7 for the network given in Figure 9-1 making the same as-
sumptions as suggested in exercise 7 about the distributions of activity per-
formance times. To carry out this exercise, use the following values of a, m ,
and b.
Activity a m b
a. Applying the rule of thumb given in the text on merge event bias, will
the latter be significant in this problem? Why? At what merge events?
b. If we wanted to simplify the Monte Carlo simulation, would the elimina-
tion of slack paths 0-6-7 and 0-1-2-5 be justified?
c. Perform the Monte Carlo simulation and comment on the results obtained.
9. Referring to exercise 2 in Chapter 8 assume the times given under a and b
are 0 and 100 percentiles, so that the standard deviation, (vt)'I2 = (b - a)/6,
and the times under the m column are single time estimates of the mean,
i.e., t , = m , in this case. Without making a complete PERT statistical anal-
ysis, answer the following questions.
a. Is there a significant merge event bias problem for this network?
b. What is the mean and approximate standard deviation of the total time
for this project?
c. What are the approxitt~atechances of completing this project in 400
hours?
10. Apply the PNET procedure to the network shown in Figures 9-12 and 9-13.
a. Compute the corrected probability of meeting the schedule of 12/13/61
for event 4199. (This is equivalent t o a project duration of 27.0 weeks).
b. Compute the cumulative probability curve for a range of scheduled times
from 26 to 36 weeks.
c. What project scheduled duration currently has a probability of 0.90 of
being met?
11. How would PERT be applied t o precedence diagramming? Answer this
question by applying the Central Limit Theorem.
a. Describe a procedure that could be used assuming the critical path is
specified as suggested in Chapter 4. For example, the network in Figure
4-1 If has the following critical path. Framing(NC)-FFl-Electrical(RC)-
SS1-Finishing(NC). Assuming estimates of the mean and variance for
each activity duration are available, give equations for the mean and vari-
ance for the project duration, T. What assumptions are required for this
procedure?
b. Does the Monte Carlo simulation approach require any modification for
precedence diagramfning?
c. Does the PNET procedure require any modification for precedence
diagramming?
APPENDIX 9-1a
THE CUMULATIVE NORMAL
DISTRIBUTION FUNCTIONt
-- for I -m r r LO)
B Y pernlission from A. Ilald. Stntisricnl Trrbles, and Forntalas, John Wiley & Som. Inc., New York, 1952.
315
APPENDIX 9-1b
THE CUMULATIVE NORMAL
DISTRIBUTION FUNCTl0N-f
t By per~~liniun
from A. Hald, Stotisticnl Tables, nnd Forntulns, John Wiley h Sons, Ine., hTew York, 1952.
316
APPENDIX 9-2
USE OF
HISTORICAL DATA
IN ESTIMATING
a, m, AND b
Occasionally one may have historical (sample) activity duration data on which to
base estimates of t, and (v,)'l2, or better, to estimate a, m, and b, which when
processed in the usual manner, with equations (3) and (4), will give the desired
estimates of (v,)''~ and t,. This procedure has merit, if the following condi-
tions are satisfied.
(RangelStd.
Sample Slzet Dev.) = d*tt k = 1.6/dZ
t Although this table includes samples ar small as two, one should not rely solely on tbe
sample data unless the sample size is at least four.
tt The symbol d, used here is the universal designation of this ratio, which is widely used
and tabled in 8t;ltistical quality control literature; it assumes the random variable is normally
distributed.
well in modeling project plans. However, at the cutting edge of project planning
methodology, there are situations that still cannot be adequately modeled by
these basic schemes. Arrow and node diagrams are based on deterministic net-
work logic. That is, it is assumed that every path in the network is a necessary
part of the project; there are no optional or alternative paths. However, we
know that in some types of projects there is some uncertainty as to just which
activities will be included. In research projects in particular, several different
outcomes of the project may result, depending upon the outcomes of certain
chains of activities. A network that shows only one plan with one possible out-
come may not represent adequately the true nature of the project. The flexibil-
ity desired here is called probabilistic branching, where only one of several suc-
cessor activities leaving a burst event are realized. Another important deficiency
of basic network schemes is that they do not permit the incorporation of loops
in the networks.
A simple example of an application of looping and probabilistic branching
would be the activities following a "test" activity. If the test result isacceptable,
then the branch to the next phase of the project would be followed. However,
if the test result is unacceptable, then an alternate branch is followed which
forms a loop to correct the unacceptable performance, and eventually leads back
to repeat the same test activity.
The use of branching and looping in this situation could be avoided in simple
arrow or node diagrams by incorporating testing, rework if needed, retesting,
etc., all in one activity. These two alternatives are shown in Figure 10-1. If the
PERT system of time estimation were utilized in this situation, the uncertainty
in the Testing and Rework (10-20) activity could be accounted for by assigning
Acceptable I Tn /
Testing
Initial To
project . and rework
) conclusion
activities of project
Figure 10-1 Example o f probabilistic branching and looping, with an equivalent single ar-
row diagram activity 10-20.
Othar Networking Schemes 321
Initial
Evaluation of
alternative engine
a Drop project
Proceed to develop
solid fuel engine
project
activities
Proceed to develop
(See Table 10-1 below for an explanation of the node symbols used here.]
Figure 10-2 Example of probabilistic branching and looping--no equivalent arrow diagram
possible. (See Table 1 0 1 below for an explanation of the node symbols used here.)
an appropriate range of activity duration times, with the optimistic time corre-
sponding to an acceptable test on the first try, and a pessimistic duration corre-
sponding to the time required to traverse a maximum number of recycle loops
that might reasonably be expected to occur in practice.
Now, consider a situation such as shown in Figure 10-2. Here, the testing or
evaluation activity (10-20) has a probabilistic successor event (20) that branches
to one of 4 possible successor activities, one of which forms a loop leading back
to the same evaluation activity. Note also, in this case, that there are several dif-
ferent project end events, only one of which can ever be realized. The true es-
sence of this project plan, and the evaluation of alternative project policies,
could not be captured by basic arrow or node diagrams, such.as was done in
Figure 10-1. The generalized arrow diagram which incorporates the branching
and looping shown in Figures 10-1 and 10-2 was developed by Alan Pritsker and
is called CERT, the acronym for Graphical Evaluation and Review Technique
(References 13-18).
DEVELOPMENT OF GERT
One of the earliest extensions of the basic arrow and node diagrams was sug-
gested by Freeman6 and dealt with the portrayal of alternative networks to rep-
resent a project. Eisner2 generalized this concept by including a new node type
for branching events to graphically portray alternative paths in a network. The
probabilities assigned to these paths add to one, and they are estimated by the
project planners along with the activity duration times on the basis of judgment
and experience with similar circumstances. A significant breakthrough in gen-
eralizing the structure of activity networks was then made by Elmaghraby3*4
when he defined three types of nodes: AND nodes; EXCLUSIVE-OR nodes;
and INCLUSIVE-OR nodes. The initial GERT developments were made by
pritsker'3.14, 15.17 by building on Elmaghraby's node definitions.
The first research activities on GERT were performed at the Rand Corpora-
tion whiie developing procedures for automatic checkout equipment for the
Apollo Program. Pritsker subsequently worked with many groups in leading up
to the current program called Q-GERT. Notable from a project management
point of view was the addition of costs to the usual time analysis of networks.
Arisawa and Elmaghraby modeled costs by considering setup costs and variable
costs that increase in time for each project activity. P-GERT was developed by
PritskerI6 to handle node diagram notation. Finally, HebertS developed the pro-
gram called R-GERT which gives the basic outputs of a simulation of a PERT
network (as discussed in Chapter 9) with the consideration of resource con-
straints. That is, the program gives the earlyllate startlfinish times and criti-
cality indices for each project activity, with the condition that an activity
cannot be started until the stated resources required by the activity become
available.
In the next section ,GERT nomenclature will be introduced and its use will be
illustrated for a simple project of reviewing a paper for a technical journal. Then,
a detailed example of Q-GERT will be presented which deals with an industrial
sales negotiation process.
GERT NOMENCLATURE
One form of basic GERT nomenclature is shown in Table 10-1. The basic arrow
diagram logic of PERTICPM is embodied in the circle node shown in the upper
left-hand quadrant of this table. The other three node symbols in this table are
GERT logic extensions which permit looping, branching, and multiple project
end results.
An application of this notation is given in Figure 10-3, which treats the pro-
cess of reviewing an article submitted for publication in a professional journal.
The network contains one initial event and two terminal events; the latter have
the symbol for infinity (m) in the lower quadrant to denote that they can only
be realized once. These events are halfnodes because the initial event has no in-
puts, and the terminal events have no outputs. The network chart is essentially
self-explanatory, which is one of the advantages of this nomenclature. This
could be called a multiple reviewer policy which requires a favorable majority to
accept the article for publication. The network involves branching at nodes 4,5
and 8 t o denote the appropriate reviewer decision. Also, there are two loops
back to node 6 from nodes 8 and 13, and two end nodes denoting acceptance or
rejection of the article. Of particular note is node 13 which is realized only if
the first two reviewers do not agree (one accept and one reject); it triggers off a
recycle loop to node 6 to select an alternate reviewer.
The diagram in Figure 10-3 could, by itself, be quite useful as a general tool of
Other Networking Schemer 323
\ Output
Input
e
Deterministic,D
a @
Protmti'istic, D 0 @
N Denotes the node identification number.
AND The A N D node will be released only if all activities
(arrows) leading into the node are realized. The time
of realization is the largest o f the completion times o f
the activities leading into the A N D node lbasic PERTl
CPM input node logic).
F Denotes the number o f predecessor activities that
must be completed for the First realization o f the
node, and S denotes the number required for Subse-
quent realizations.
OR The OR node will be realized the first time when any
F o f the total number o f activities leading into the
node are completed. I f the node is contained i n a
loop, then the node can be realized the second and
all subsequent times when any S o f the total number
of activities leading into the node are completed; usu-
ally F 2 S.
Deterministic A l l activities emanating from the node are subse-
quently taken i f the node is realized (basic PERTl
CPM output node logic).
Probabililic Only one activity emanating from the node is taken i f
the node is realized. The sum o f the probabilities as-
sociated with each of the output activities equals one.
systems analysis, particularly where the problem is more complex than shown
here. It could be used to show redundancies, inefficiencies, and inconsistencies
in the policies or procedures in question. It could also be useful in speeding up
action at each branching node in the network, since the requirements and impli-
cations of each alternative are clearly stated. If additional data is added to this
network, the use of the Q-GERT simulation program could provide estimates of
the probabfiities of realization of each of the end nodes, and time and cost dis-
tributions for the realization of any selected nodes, considering resource con-
straints if desired. An example of this type will be presented in the next section.
Author mails article Log article, select
to journal ed. reviewer and mail
Figure 10-3 Generalized IGERT) model of a sequential article review process. (See Table 10-1 for an explanation of the node symbols used
hers.)
Other Networking Schemes 325
AN APPLICATION OF Q-GERT
*This example is taken from the article "Sales Negotiation Cost Planning for Corporate
Level Sales," by M. M. Bird, E. R. Clayton, and L. J. Moore, J O U ~ MMarketing
~O~ (April),
Vol. 37, pp. 7-13, by permission of the publisher, the American Marketing Association.
326 11 I Advanad Topics
*Numbers in squares below each activity are used t o identify the activities listed in Table
10-2; Activity 0, for example, could have alternatively been called 2-3,using the node num-
bers for identification.
**Node 22 appears three times i n this network t o facilitate drawing the network; they
should be interpreted as the same node.
Figure 10-4 Q-GERT diagram of industrial sales negotiation model.
Other Networking Schemes 327
mulated [28, 291. Based on these plans, corporate level strategy is developed in
a conference [30]. This strategy is implemented in a negotiation conference
with the buying firm 1311. The results of the negotiation conference are: no
sale [32] ; contract awarded [33] ; or further negotiations requested by the
buyer involving plan modifications [34]. Marketing and engineering modifica-
tions are then performed [35, 361. A corporate level meeting to evaluate and
reconcile the modifications is then held [37]. Following this, a return is made
to node 18 of the Q-GERT network where another negotiation conference with
the buying firm is held [31]. At node 23, a successful sale has been made.
Total costs when a successful scale is made are collected at node 23. Total costs
of the negotiation when a sale has not been made are collected at node 22.
The GERT network model for the sales negotiation process allows an analyst
to include probabilistic outcomes as modeled by the probabilistic branching at
nodes throughout the network. In addition, recycling of activities is permissible
as illustrated by the loop of nodes 18, 19,20 and 21.
Nodes 22 and 23 are of special interest because they are terminal; node 12 is
also singled out as a milestone because it denotes that all preliminary reports are
favorable, and the final phase of the project is initiated. The GERT simulation
program is instructed to collect statistics on these nodes, and for this reason, spe-
cial notation is required. For example, node 12 contains the symbols 5/m, L/F,
1, UP, 38, 12. It is read as follows. First, 5/00 denotes that 5 activities (favor-
able reports) must be completed to realize this node the first time, whiie mde-
notes that this node cannot be realized more than once. (Nodes 18, 19,20 and
21 are nodes that can be realized more than once because they are contained in a
network loop; in these cases, w is replaced by the appropriate integer 1 or 2).
The L/F symbol indicates that the time completion of the Last (fifth) activity
and the First activity are kept at this node. (Note, only the First activity com-
pletion times are collected at the other terminal nodes 22 and 23, because they
are realized as soon as the First incoming activity is complete.) The last 4 entries
indicate that on node 12, user function OJF) number 38 is used to compute at-
tribute 1 which is cumulative project costs.
The main GERT program handles project time analysis and all computer out-
puts. It contains 145 lines (FORTRAN language), 1 1 1 of which deal with data
describing the 37 network activities. The cumulative cost analysis is introduced
by the User Function, which in this case is two subroutines containing 38 lines
of computer code, half of which are cost data. The User Function in this case
assumes that each activity has an associated fixed setup cost, and a variable cost
that is linear in time. Other functions of time could be used by changing one
FORTRAN statement. If node 22 (no sale) is realized, the User Function ad-
ministers company policy which requires that all work on the project is halted.
Thus, the program stops all activities so that their remaining costs are not in-
curred and reflected in the computed total project cost.
Table 10-2. Activity Descriptions for Sales Negotiations Network 8
-
Activity Time in hours Cost in dollars* Proba-
No. Activity Description Distribution Mode Min hlax (a) (b) bility 9
LY
1 Sales call by company salesman Beta 4.0
2 Sales report to marketing vice president Beta 1.o
3 Marketing vice president reports to president Beta 0.50
4 Preliminary engineering report Beta 40.0
5 Preliminary production report Constant N/A
6 Preliminary financial report Constant N/A
7 Preliminary marketing report Constant N/A
8 Preliminary purchasing report Beta 40.0
9 Negative engineering report examined Constant NIA
10 Favorable engineering report examined Constant NIA
11 Production subcontracting investigated Beta 40.0
12 Favorable produclion report examined Constant N/A
13 Favorable financial report examined Constant NIA
14 Negative financial report examined Constant N/A
15 Favorable marketing report examined Constant N/A
16 Negative marketing report examined Constant NIA
17 Favorable purchasing report examined Constant NIA
18 Negative purchasing report examined Constant N/A
19 Unfavorable production subcontract examined Constant NIA
20 Favorable production subcontract examined Constant N/A
21 Corporate level planning conference Constant N/A
Sales call by marketing vice president and salesman Constant NIA
Engineering call by engineering vice president Constant N/ A
Unfavorable sales call conference Beta 18.0
Favorable sales call no conference Constant NIA
Unfavorable engineering call conference Beta 16.0
Favorable engineering call no conference Constant N/A
Marketing negotiation plan formulation Beta 40.0
Engineering design plan formulation Beta 160.0
Corporate level strategy conference Beta 8.0
Negotiation conference with buying fum Beta 16.0
No sale Constant NIA
Contract awarded Constant N/A
Modifications requested by buyer Constant NIA
Modification of marketing negotiation plan Beta 20.0
Modification of engineering design plan Beta 80.0
Corporate meetina to reconcile modifications Beta 4.0
*Column (a) in the fixed cost for the activity while column (h) is the variable cost for the activity assumed to be linear over time.
330 11 I Advanced Topics
The Q-GERT model of the industrial sales negotiation process was simulated 500
times. Summaries of the time and cost results are presented in Figures 10-5 and
106. The estimates of the probability of losing a sale, node 22, is 0.844, that is,
over 84 percent of the negotiations end in failure.
Looking at node 12, favorable reports received, it is seen that approximately
43 percent of the potential projects result in a l l five reports being favorable.
Thus, 57 percent of the sales negotiations are turned down for internal reasons.
The time estimates indicate that it takes over 38 days to decide that negotiations
should be carried beyond the internal report phase. The cost data indicate that
it costs over $3050 when all favorable reports are obtained. This information
can be extremely useful for an analyst who is attempting to improve the sales
negotiation process, as it provides trade-off data regarding the possibility of in-
creasing the probability of favorable reports versus the time and costs required
to obtain the favorable reports. By developing alternative networks up t o node
12, such trade-offs can be made. The analyst should attempt to develop proce-
dures for detecting when unfavorable reports will be issued. Possibly sequential
reporting of the engineering, production, financial, marketing and purchasing re-
ports should be made. Since engineering and marketing have the highest prob-
ability of issuing a negative report, possibly these two activities should be per-
formed prior to the other reports. If this is done, the time required to reach the
decision with regard to the preliminary reports will be extended.
The summary statistics for a lost sale indicate that it takes 62 days on the av-
erage to make this determination. Since node 22 can be reached from many
points in the network, this time should have a wide variability which is the case
as indicated by its standard deviation of 56.4 and its range of 23 to 288. The av-
erage cost associated with a lost sale is $4944. This indicates that when the proj-
ect fails more money is expended in obtaining favorable reports than is put into
the negotiation effort after the reports are obtained. When the project succeeds,
which occurs only 15.6 percent of the time, the negotiation process takes a
lengthy 182 days and costs on the average $1 1,947. Other statistical quantities
concerning the time and cost when the negotiation is successful are shown in
Figures 10-5 and 10-6.
The time and cost histograms associated with node 22, lost sale, are presented
in Figure 10-7. These histograms illustrate that the distribution function as-
sociated with node 22 has discrete breaks due to the different paths that can
be used to reach node 22. For example, failed reports occurred on 283 runs.
((1 - .434) X 500 = 283). The histogram for node 22 shows 283 values in the
range 20 to 50; hence, this cluster of values is associated with failed reports. The
other values in the histogram for node 22 are for the times when a lost sale oc-
curred after favorable reports were received.
**FINAL YESJLTS FOR 5 0 0 SXHULATXONSD*
*+AVE3ASE NODE S T A T l S T I C S * *
P
+ + U S E 9 S T A T I S T I C S FU9 V A S I P 6 L E S BLSED ON OBSEQVLTION AT T I M E * 3 0 . 0 9 5 I N RUN 500** 33
A VE S T J DEII S O OF A V E n~hxnun n ~ x ~ n g w 06s 5'
(D
V1
FAV-RPTS 3053.6797 141.4592 9.5036 2 760.4418 3469.0bO2 217 %
LOST-SAL 4943.8782 3330.3886 162.1201 2475.4571 17774.6202 422 I
8
SUCCESS 11946.3841 27JO.lble 304.1299 95ZC.0147 25230.0935 78
Figure 10-6 Summary report for costs associated with sales negotiation model.
W
9
332 11 I Advanced Topics
Loll-SlL
UPPE?
13>*0 0' CELL 8
I
I....!....!.
21
... b I b0
1....1...I....I....l....I....I....I
I* LOO
I
I........................ I
:.....
I......... c I
C I
C I
I... C I
I C I
::...
I C I
C I
t
I.. C I
I C I
1. C I
I. C
1 C
I C
I C
I C
I C
I C
T..I*..l..I..I..I..I..I..l..1..I
Figure 10-7 Histograms of times and costs associated with unsuccessful sales negotiation.
Histograms for the time and costs associated with a successful sales negotia-
tion were also developed, but are not presented here. These histograms could be
used to monitor company time and cost data associated with successful sales
negotiations. They would indicate that over 20 percent of the time, the total
sales negotiation cost will be greater than $14,000. Thus, we can expect 1 time
out of 5 to have this high cost, given that the sales negotiation pattern follows
the one described by the Q-CERT model. By making such comparisons, the
company can maintain some control over the costs involved in their sales nego-
tiations activities.
analytically using the basic laws of probability. However, this is not true for the
time and cost statistics in Figures 10-6 and 10-7. In a more complex hardware
development project by Moderia, it was found to be difficult to intuitively pre-
dict even the direction of the effect on time and costs of policy changes in a
project plan. One change led to a reduction in both time and cost. GERT simu-
lation is particularly useful in such cases.
Some 13 years have passed since the previous edition of this book in 1970.
At that time it was expected that GERT would prove to be a useful tool in proj-
ect management. The literature of the 709 attests to the validity of this forecast.
For example, Vanston19 used GERT to analyze the effects of various funding
and administrative strategies on nuclear fusion power plant development. Halpin7
used GERT to investigate the use of simulation networks for modeling construc-
tion operations. Another important application in this area (see reference 5) in-
volved risk analysis of the construction schedule of the Alaskan pipeline. The ef-
fects of weather conditions on construction activities was modeled within the
Q-GERT framework to estimate the distribution of both project time and costs
performance. Many other applications could be cited.
It has been pointed out above that PERT network logic is a subset of GERT
logic. Hence, the latter can be used t o simulate PERT networks t o obtain the
probability distribution of project duration and activity criticality indices. At
present, this application would require separate computer runs t o produce a
GERT simulation output and a conventional PERT output. A number of re-
searchers (Wolfezo and Hebert9) are developing programs to produce both these
outputs from a single computer run. When the objective is both project planning
and control, this is the desired mode of operation and the development of such
programs should provide a marked increase in the use of GERT in this area of
application.
The most recent development in this area of stochastic networks by Moeller
and Digman", has been called VERT, the acronym for Venture Evaluation and
Review Technique. It is a computer-based mathematical simulation network
technique designed t o systematically assess the risks involved in undertaking a
new venture and in resource planning, control monitoring and overall evaluation
of ongoing projects, programs and systems. It involves even more User Function
types of interaction than GERT, and is perhaps a logical evolution t o embrace
the somewhat elusive third parameter of the time/cost/quality of performance
triumvirate.
REFERENCES
EXERCISES
1. Construct a table containing a list of criteria that you feel could be used t o
measure the utility of networking schemes. On the other axis list all the net-
working and project charting schemes you are familiar with, including hybrid
forms of bar charts, milestone charts: or others. Then assign a rank or other
value score t o each scheme and criterion and summarize the score of each
scheme. Which scheme received the highest score?
2. Compare the results of your scoring in the exercise above with those of other
students and, if practical, with the opinions of persons experienced with a
variety of networking schemes. As a result of these comparisons, comment
on whether it is practical t o evaluate networking schemes on a technical, ob-
jective basis.
3. The techniques of resource allocation (Chapter 7) are applicable to certain
types of job-shop scheduling problems, especially where the sequence of jobs
is fixed and the problems are reduced t o questions of the loading of certain
facilities or pools of resources and the avoidance of project (or job) delays.
Discuss how generalized network concepts may provide solution methods t o
a wider class of job-scheduling problems.
4. Draw a GERT network for the following procedure used by a university
patent committee.
1. Inventor submits invention t o patent committee.
2. Above (1) initiates two concurrent activities:
2.1. Technical or commercial reviews by experts; and
2.2. Legal review of inventor's patent liability to contractors and
university.
3. Study of legal and technical reviews.
4. The study in (3) leads to
4.1. Favorable evaluation, or
4.2. Unfavorable evaluation
5. Favorable evaluation in 4.1 leads t o
5.1. Submission of invention t o university patent attorney; or
5.2. Submission of invention to outside patent corporation.
6. Activity 5.1 leads t o
6.1. University marketing of patent; or
6.2. University drops invention because of lack of patent protection.
7. Activity 5.2 leads t o
7.1. Outside patent corporation rejects invention; or
7.2. Outside patent corporation seeks patent.
8. Activity 7.1 leads t o
8.1. Resubmission by university patent committee of patent t o outside
patent corporation for reconsideration; or
8.2. University drops invention.
9. Activity 7.2 leads t o
9.1. Patent denied so university drops invention; or
9.2. Patent acquired so outside patent corporation markets patent.
336 11 / Advanced Topics
In Chapter 4, manual methods of making the basic critical path scheduling com-
putations were presented. This chapter will describe how the samecomputations
can be made by computers. The computer programs for CPM and PERT compu-
tations are available to anyone who has access to almost any general purpose
business computer (including so-called minicomputers and microcomputers).
The treatment in this chapter begins with what the typical critical path soft-
ware is and how one can make use of it. The actual software that one may find
will vary somewhat in capacity, speed, features provided, and even sometimes in
the computational results. Consequently, this text does not attempt to explain
how each available program works. Rather, it is a treatment of how they all
work in general, and what to look for in the way of comparative features.
The basic critical path scheduling computations are emphasized in this chap-
ter. The roles of the computer in the more advanced topics are mentioned here
but are covered more fully in the appropriate chapters.
ADVANTAGES OF COMPUTERS
1. The project activities can be easily sorted and listed in a variety of useful
ways, such as by float (critical path listing), by early or late start dates
338 11 I Advanced Topics
1 . Network size. The larger the network, of course, the more likely that
computer processing will be needed. However, there is no specific number
of activities that would call for a computer, due to the influence of the
other factors listed below.
2. Computer avm'ZabiZity. Both a suitable computer and adequate critical
path software must be available at a reasonable cost.
3. Expected frequency of updating. If the network is primarily a planning
tool and is not likely t o be revised and updated throughout the project,
computer processing may not be worthwhile, even if the network is large.
4 . Desiredoutput listings. If printed listings of the network activities are de-
sired, selected, and sorted by float, responsibility, start dates, activity num-
bers, etc., and if these lists are desired for each updating calculation on the
project, then computer processing is the most practical answer.
5. Advanced analyses. In most cases computers and the appropriate soft-
ware are required for timecost trade-off, resource allocation, PERT statis-
tistics, and cost control analyses.
6 . Network format. When the precedence network format is used, manual
calculations of the basic schedule are complex, making the use of com-
puter processing decidely advantageous.
Computsr Processing 339
Each potential user must consider these factors in relation to his project and
the particular program available. A few hypothetical examples of such consider-
ations are given below. These examples are not offered as firm guidelines for the
types of situations described, but rather as indications of the considerations that
should influence the decision of whether or not to use a computer.
CASE 1 . Heart Surgery. A network of 75 activities has been prepared for the
purpose of planning a complex surgical operation. The network will
not be used after the plan has been worked out. Recommendation: In
this case a manual computation and a time-scaled network would be
the best means of working- out a well-coordinated plan.
CASE 2. Promotional Campaign. A project to introduce a new consumer prod-
uct involves about 80 advertising, manufacturing, distribution, and
sales activities. The network is to be used for initial planning and coor-
dination throughout the six-month project in order to assure proper
timing of each phase. All the supervisors have had a short course in
CPM. Management intends to update the network twice a month and
distribute copies of the results to each of the key supervisors involved.
Recommendation: In this case the frequency of updating indicates that
computer processing would be faster and more economical than man-
ual updating. Also, the computer can sort the output by responsibil-
ity, so that each supervisor can get an extracted report on only his
activities.
CASE 3. Construction of a Lazge Building in a Remote Location. A five-story
building is to be constructed in a small city where no critical path com-
puter program is available. The local contractor is interested in apply-
ing CPM in planning the project, though, because this will be his first
multi-story building project. The first draft of his network contained
270 activities. Recommendation: The manual computation of this net-
work will be well worthwhile, perhaps saving the contractor a great
deal of cost and confusion over the re-use of concrete forms, the phas-
ing of carpentry, steel, electrical, and other trades, and by helping to
solve other problems of coordinating multi-story construction that he
has not yet experienced. (See also Exercise 7.)
CASE 4. New Plant Start-up. This project includes construction of a plant,
delivery and installation of machinery, recruiting and training a new
labor force, and starting production. The key supervisors for the con-
tractor, machinery suppliers, training and production departments have
had no CPM training, and management considers it impractical to un-
dertake such training at this time. The project manager's network con-
tains 210 activities, and he intends to use it for schedule control during
the project. A good CPM program is available. Recommendation: The
pros and cons of using a computer in this case are not strong either
340 11 / Advanced Topia
COMPUTER SOFTWARE
To illustrate how a typical critical path software package may be used, let us
take the market survey network in Figure 11-3 and prepare it for computer pro-
cessing. (In this case we will be employing the arrow scheme of networking. In-
Computer Processing 341
network data
(Keyboard entry
or punched cards1
lnittal CPM
computations
lcomputerl
- Initial
CPM
reports
(tape or disk)
Updating CPM
computations
- Updated
CPM reports
lnew file)
questionnaire
put procedures for networks in the node and precedence diagramming formats
are different. Each software package contains instructions for input.)
Most input forms for arrow-scheme networks are similar to that shown in
Figure 11-4. Data related t o an activity is entered in one row of this form.
The column labeled "pred" is for the predecessor event number of the activity,
and "succ" is for the successor event number. The column labeled "t" is for the
activity time estimate. (PERT input forms have columns for three time esti-
mates.) The description column usually accepts a certain number of alphabetic
or numeric characters, which are used to describe the activity.
2 3 5 HIRE PERSONNEL
1 2 3 PLAN SURVEY
2 4 10 DESIGN QUESTIONNAIRE
-- -
4 3 0 DUMMY
6 5 0 DUMMY
4 5 4 SELECT HOUSEHOLDS
5 7 15 CONDUCT SURVEY
7 8 5 ANALYZE RESULTS
3 5 7 TRAIN PERSONNEL
The way the form is fdled out illustrates one of the rules that must be fol-
lowed: all dummies must be entered into the form just as all other activities, ex-
cept that dummies carry zero time estimates. The description "dummy" is op-
tional. Note also that the activities are entered in the form in random order,
which is permissible. (We have also assumed that the program to be used will
accept events numbered at random; otherwise numbers 3 and 4 in the network
would have to be reversed.) Other common rules of input are that each activity
must be entered, and no activity may be entered twice. Programs that have
scheduled date, calendar date, cost control, and other features have additional
columns in the input forms for certain necessary data for these features.
After the form has been filled out and double-checked for errors or omissions,
the form is given to a keyboard operator who transfers the information onto a
computer input medium such as a magnetic disk, tape, or punched cards. The
input medium is also checked for errors and then is fed into the computer sys-
tem for processing.
In addition to the data on each activity, one must also provide certain general
information and parameters for the network as a whole. These data would nor-
mally include the name of the network, whether the initial or updating computa-
tion is desired, and such other data as required by the options of the program.
For example, programs having calendar dating capability normally would require
that the network data include:
The requirements for such data and their input format vary with each program,
therefore they are not illustrated here.
The basic output report contains the same information as given by manual meth-
ods. The typical format is shown in Figure 11-5. Note that the first four fields
contain the input data for each activity. The remaining fields provide the com-
puted results for each activity. In this example the times are expressed in units,
the unit being defined by the user. In most programs one may elect t o obtain
the output times in the form of calendar dates.
Note also that the output in Figure 11-5 is now in a particular order, although
the activities were put in at random. The order here is by float or slack, from
the lowest to the highest. This "slack sort" is one of the most commonly re-
quested sorts of the output, because it lists the most critical activities first, and
thus easily identifies the critical path, or paths.
344 11I Advanced Topics
I J DUR DESCRIPTION ES LS EF LF S
1 2 3 PLAN SURVEY 0 0 3 3 0
2 4 10 DESIGN QUESTIONNAIRE 3 3 13 13 0
4 3 0 DUMMY
3 5 7 TRAIN PERSONNEL
5 7 15 CONDUCT SURVEY
7 8 5 ANALYZE RESULTS
4 6 5 PRINT QUESTIONNAIRE
6 5 0 DUMMY
4 5 4 SELECT HOUSEHOLDS
2 3 5 HIRE PERSONNEL
Figure 11-5 Basic computer output report.
INPUT F O R UPDATING
To update a critical path schedule after the project has begun and progress has
been made, the computer programs may call for the following types of data:
Most updating programs utilize only start and finish dates of activities, al-
though a few will accept a "percent completion" figure.
For changed activities, normally only the changed field must be entered. This
will usually be the time estimate or the description. The I and J numbers may
not be changed, except by deleting the activity and adding a new one with the
new numbers. The I and J numbers are the keys to identification of each activ-
ity in the computer files.
Care must be taken in deleting activities, to insure that errors or gaps are not
created in the network. If activity 4-3 in the sample network were deleted the
computer would accept the input and process it, although the result would be
different than when 4-3 is included. However, if activity 3-5 were deleted (and
not replaced by one or more other activities) the network would have more than
one terminal event; some programs would halt on this condition.
In addition to the above data for the activities, updating input must include
some general project information as in the input for the initial computation. An
important fact for the updating run is the effective or "cut-off" date of the re-
port. Some computations will involve the effective date. Also the effective date
serves as the basis for certain error checks. For example, a reported actual date
(for the start or finish of an activity) may not be later than the effective date.
Computer Processing 345
Actual Actual
Activity Start Date Finish Date Change
2
12
-
Change time estimate
to 10 days.
Figure 11-6 Progress on survey project as of the end of the twelfth day.
Update
I J DUR DESCRIPTION Code Date
1 2 1 0
1 2 2 2
2 4 1 2
2 4 2 12
4 6 1 12
3 5 10 3
To illustrate how typical updating data are entered, consider the survey proj-
ect of Figure 11-3. Assume that at the end of day 12 progress has been made
according to the information in Figure 11-6.
Assume that no other progress dates or changes have been recorded as of the
end of day 12. These updating data may be entered on the program input form
as shown in Figure 11-7. The key to the "Update Code" is as follows: 1 = start
date; 2 = fmish date; 3 = change. Note that only the activities that are actually
involved in the updating are entered on the form.
It is emphasized that these procedures are presented only as representative
of how some programs handle initial and updating information. The particular
program that a user may obtain will probably differ from these examples in a
variety of ways. This is especially true of the updating function. Consequently,
the user must carefully study the instruction manual provided with the program
to be used.
Est Act
I J Dur Dur Description ES LS EF L F F
of the project is now day 48 instead of the desired day 40. The total float has
gone from the initial value of zero to -8, or 8 days behind schedule.
The float sort is not the only useful sequence of the output. For large net-
works an I-J sort is useful for quickly locating data on particular activities. A
sort by one of the date columns can also be of value. For example, a sort by the
L F column provides a list in chronological order, with the activities that should
be finished first listed at the top. All of these sort options and others are usually
available through simple sort key codes that can be specified by the user. Most
users will specify two or three different sorts for each update report. A sum-
mary of some of the more useful sorts is given in Table 11-1.
PRECEDENCE METHOD
As mentioned earlier, this chapter employs only the arrow scheme to illustrate
computer input and output. For an example of computer reports under prece-
dence diagramming, see Chapter 4, Figures 4-13,4-14,4-17, and 4-18.
nearby cities for computer installations that rent time on the equipment. The
local representatives of the computer manufacturers are good sources for this in-
formation. Rental time is offered by many banks and industrial firms as well as
computer service companies, and such services are often found in relatively small
cities and towns. With the recent advances in mini- and microcomputers it has
become possible to purchase one with critical path software for only two or
three thousand dollars.
Having determined what equipment is available, one should determine next
whether a suitable critical path program is available for that equipment. The or-
ganization operating the computer may have a suitable program in its library, the
manufacturer may be able to supply one, or it may be necessary to seek a pro-
gram from other sources. The appendix to this chapter lists a number of CPM
and PERT programs available t o the public. These programs differ significantly
in a variety of ways, however, and the differences are worthy of close attention
by the potential user.
Computer software companies are also good sources to investigate, since a
number of them offer CPM software packages for sale. Purchasing a package is
worthwhile if (a) it is expected that the package will be used often, (b) the pack-
age makes it possible to utilize the user's in-house computer, and (c) the package
has valuable features not otherwise available.
It is also possible t o obtain network computational service on a time-shared
basis. The user provides the input through a rented or purchased terminal. The
input is transmitted over telephone lines to a large computer at some other loca-
tion, perhaps in another city, or via satellite to another country. The computer
processes the input immediately, while it is simultaneously processing a number
of other jobs for other users. The critical path output comes directly back to
the user's terminal.
In any case, it is important to obtain and study the user's manunl that is pub-
lished for each available program. The manual describes the characteristics of
the software and how to provide input for it. When attempting to use software
for the first time, it is a good idea to test the published procedures with a small
network such as the one in Figure 11-3. In this way one can verify the results by
hand computation and also check the logic on updating, calendar dating, etc.
COMPARATIVE FEATURES
1 . Arrow vs. Node Format. It is necessary that the network and the soft-
ware be consistent in the use of either the arrow or the node network format.
Thus, the available software might dictate which network format is to be used.
An increasing number of software packages now will accommodate either the
arrow or node format, or the more advanced precedence scheme.
If the user has already drawn a network in the arrow format and then finds
that the only available software requires the node format, the network can be
redrawn into the node format. Conversion from arrow to node is relatively easy.
Conversion from node to arrow, however, may not be so easy unless the user is
familiar with the pitfalls of arrow networking, such as the creation of false de-
pendencies. (See "Common Pitfalls," Chapter 2.)
2. Event Numbering. A few of the oldest CPM programs require that events
be numbered in ascending order, that is, each activity's successor event number
must be larger than its predecessor event number. This is a severe restriction, for
it inhibits the flexibility of the network and causes event-number bookkeeping
problems. Most programs now permit random numbering of events (or activities
in the node format), provided that no two nodes or activities receive identical
numbers.
3. Capacity. The capacity of critical path programs is usually expressed in
terms of the number of activities permitted. Capacities vary from a few hundred
to at least 500,000 activities.
If a network exceeds the capacity of the program, it is not usually practical t o
divide the network into parts for separate computation. The interaction of for-
ward and backward passes along all paths can make such subdivision highly com-
plex. A better approach is to condense the network, as explained in Chapter 3.
(See also Network Condensation, feature No. 12 below.)
4 . Calendar Dates. Many programs have a calendar dating option, which will
provide all output dates in the fonn of 02/03/85 or 03FEB85. To use this op-
tion the user needs only t o input the base starting date for the fust event in the
project. A few other options are sometimes available, such as whether the calen-
dar computation is to be based on 5-, 6-, or 7-day weeks, and whether there are
holidays. The calendar dating option is highly desirable, although some indus-
trial projects are scheduled by hours and would not use calendar dates. Some
programs assume that start dates refer t o the beginning of the day given, whereas
fmish dates are assumed to be at the end of the day given. This convention is
logical and presents no problem as long as all the users are aware of it.
5. Scheduled Dates. Most programs will accept scheduled dates assigned t o
the terminal events in the network, and backward passes are made from these
scheduled dates, rather than merely "turning around" on the terminal event's
earliest expected date as computed in the forward pass. The acceptance of
scheduled dates means that the slack figures will be related to the scheduled
dates, and the critical path may have positive, zero, or negative float. (The criti-
cal path is defined as the path of least float.) Without this feature, one must per-
350 11 I Advanced Topics
Figure 11-98 Result of input specification shown in Figure 11-9A is a report with critical path [zero float in thiscase) activities listed first.
llluEtrations of PAC llTM Report Writer courtesy of International Systems, Inc., King of Prussia, Pennsylvania.
3 .WJOJ 40 pua i e ino
-Ael leurunlo3 aioN .aldluexa s!qa u! paaenrnll! s! a h y x d aJeMyos Jai!JMFlOdaJ e 40 suealu A q u e q u~ u e e~ 40 uo!ie3!4!3adS WOL-LL wnB!j
P R I N T SHOWING ' PHASE' ' I C T I V I T I ' 'RESOURCE' 'PROJ F I N I S H DATE'
-
<n --
'REVD F I N I S H DATE' 'CALENDAR'
-- --
-..l T. F n ' P. F.n . I E C T. '
S EL E C T IF RECORD^ = .'7".
EJECT PACE ON 'PROJECT'.
T I T L E SIiOWING "PROJECT DESCRIPTION" 'PROJECT DESC' "PROJECT" ' P f O l E C T ' .
GAtlTT CHART FROM " 1 0 0 1 8 2 " TO " 0 3 3 1 8 3 " SHOWING 'PROJ F I N I S H D L T E
R E L A T I V E 1 0 'REVD F I N I S H DATE' U S I N G I I T F R A L S "+-" " '-
"OCT NOV DEC JAN FEB
"1 1 1 1 I 1 1
ACT1 RE5 PROJECTED REVISED OCT NOV DEC JAN FEB MAR kPR
PH VlTY ID FINISH FINISH 1 1 1 1 1 1 1
Figure 11-108 Gantt chart resulting from entry in Figure 11-IDA shows first the edited in?; instructions then the chart. Note that plus
signs denote activities with positive float, minus signs for negative float. illustrations of PAC I I system courtesy International Systems, Inc.,
King of Prussia, Pennsylvania.
Computer Procesing 355
and even the network diagrams themselves. The charting devices used include
the standard line printer on most computers, the CRT display screen, and con-
tinuous line plotters. For illustrations of a few of the graphic outputs available,
see Figures 11-10 through 11-15.
11. Updating. A good software package will provide for updating by excep-
tion. The original network is stored on disk or tape, and progress reports are in-
put to update and revise the network and schedule projections. The input trans-
actions should consist only of changes in the network and actual progress, such
as the activity start and completion dates since the last update as illustrated ear-
lier in this chapter. The entire network need not be input again.
However, there are significant differences in how the updating function is
handled among the available programs. For example, some programs permit
only the input of finish dates of activities; the start dates are ignored. This
means that if an activity has started late and is not yet finished, the late condi-
tion will not be recognized by the program, and the output will be incorrect to
that extent. Also, if only finish dates are accepted, it is not possible to compute
and record the actual duration of each activity for comparison with the esti-
mated duration.
A similar but more serious error is to assume that, on a path having had some
progress dates reported, the next unreported event date on the path will occur at
its earliest time (ES or EF), regardless of the effective date of the input. To
understand the effect of this assumption, review the market survey network and
the sample progress report in Figures 11-6 and 11-8. Activity 2-3 is pertinent,
for it has not started as of the reporting date, day 12. The correct handling of
this condition is to compare the ES for the activity with the reporting date, and
take the larger of the two as the basis for beginning the forward pass. If the re-
port date is larger, one day may be added. Thus, since 2-3 had not started by
the end of day 12, the earliest that it could now start is day 13. Therefore, the
correct ES for 2-3 is 13, the E F becomes 18, and the project completion date is
extended.
By the incorrect procedure, the ES for 2-3 would be assumed to be 2 (which
is impossible since day 2 is now ten days ago), the EF would become 7, and this
path of the project would apparently be a day ahead of schedule. Incorrect re-
sults of this type have caused misunderstanding and confusion for many users.
Programs using this incorrect procedure should be avoided.
12. Network Condensation. Routines have been developed which in effect
condense large networks into smaller ones. One such procedure involves three
phases: (a) the condensation of large, detailed networks into smaller ones, (b)
the integration of two or more condensed networks, and (c) the expansion of
the condensed and integrated networks back into large, separate, detailed net-
works. The condensation phase involves the determination of the longest path
between each sequential pair of preselected key events in the detailed network.
. a a s n q a m a W ' a 6 p ! l q L L I ~'.out 'auawdolanea g ale%-
a 3 a f o r d A s w n q 'waasAs ramduo3 Z/U~~IJI&~ aq8 A q paanpord w e q a J B ~PUB 'sauna an!ze~n~una
'SWBIBOIS!~ 40 uo!gerwnlll ~ 1 . wnn!j
~ 1
. I ~ . P ? ~ r. v w . w . .aw.p3?4r5..3:~.y
w . R ~ . ~ ? : . ? ? ~ . . B w.PA..&*"~
........ rtr ....... vjr.. . . . .r o .......
~ fir:::
,,....
,,,,,.......
ipr .........5.
25
7,,,,7,7,,,1WIIII :
0.0
! '00&*7
! 'OOoEr
xxxn ,f .ooosc
LW,XIII
PROJECT/2
G R A P H I C REPORT W R I T E R
RESOURCE 1 1 0 . 0 0 - LABORERS
@ ~~!~"A~%REs(IuRcE
T R H
A G SC
LABORERS
ESI
,1000
.,
,**. kkiTARG
!R*:S SCH RESOURCE
LABORERS
1
1\000
E S cun
D
;fgW
; YESOURCE ! I 0 0 0 MANDAYS RESOURCE 1 1 0 0 0
r R E S scn 1 cun
The result of this phase is a network consisting of the key events only, which are
connected by single activities instead of groups of activities.
In the integration phase the computer processes two or more condensed net-
works as though they were a single network, each condensed network having one
or more common events (interfaces) with another network. The results of this
process are new earliest and latest times for each key event. The expansion
phase, then, utilizes the new restraints on the interface events to compute new
schedules for all activities in the detailed networks. The output of the expansion
phase is in the same format as the output for the original detailed network, but
the earliest and latest times and slack figures reflect the new restraints imposed
on the interfaces.' Hence, this network condensation-integration-expansion pro-
cedure provides extraordinary capacity for processing the largest networks and
groups of networks. It also aids in the preparation of summarized reports for
management.
13. Statistical Anabsis. Originally the controversy of the three-time esti-
mate probabilistic approach versus the single-estimate deterministic approach to
critical path computations provided a clear distinction between PERT and CPM.
358 11I Advanced Topics
mmi€as
300
BEFORE SCHEOULING
RESOURCE LOADING FOR CARPENTERS
m LOADING
MY
nm
, I
I
~ ~ w m r n i m n f f i ~ m m m ~ ~ ~ ~ n ~ ~ m ( f
-------.-------.------,981-------------.--2----.-.-----.----19Bp-------------->
PROJECT TIHESCALE (MONTHS)
Figure 11-13A Capabilities of graphics plotters are illustrated in this example of a resource
loading histogram for a project utilizing carpenters. Original report is i n four colors.
mmfE warm
AFTER SCHEOULING
RESOURCE LOADING FOR CARPENTERS
3m
270 - LOADlNG
- UNDERLOAD
240
OVERLOAD
ZlYI -
.--.
PROJECT TIMESCALE (MONTHS>
Figure 11-138 After the software has scheduled the project within the resource constraint,
the resulting histogram displays the extended project duration and the new monthly require-
ments for carpenters. Illustrations of ARTEMIS system courtesy of Metier Management
Systems, Inc., Houston, Texas.
Computer Processing 359
While the distinction still exists among many critical path specialists and is main-
tained in this text, the two terms have been used loosely in practice and are no
longer mutually exclusive. For example, some programs permit three time esti-
mates in the input and obtain the usual weighted average of these figures, but do
not make any summations of variance or computations of probability. Another
system used by a govenunent agency is labeled 'TERT" but makes no use of
three time estimates or statistics. Consequently, if one desires the probabilistic
approach he must be careful not to rely on the title "PERYor the three-estimate
input, but must determine exactly what probabilities are computed by the pro-
grams in question. The most common probability computation is an approxima-
tion to the probability of meeting a scheduled date, usually the scheduled date
for the completion of the project.
Those who are interested in the CPM (deterministic) approach but who find
only PERT (probabilistic) programs available to them do not have a serious ob-
stacle. Almost any probabilistic program may be used as a deterministic one by
simply entering the single (expected) time estimate as each of the three estimates.
14. Interactive Processing. A trend in software is the facility for the user to
interact with the program while processing is underway. Using keyboard data
entry, for example, the program may make error checks on each set of activity
data, and signal the user immediately when errors are found. After all the data
are entered, initial computations may be performed and displayed so that the
user can change the network in order to obtain a more acceptable schedule be-
fore printing out the reports. Frequent users of network methods find interac-
tive processing advantageous.
TRENDS I N SOFTWARE
In the first twenty years of critical path network technology the computer pro-
grams for network processing have undergone evolutionary change as well as pro-
liferation. The growth in the market for commercial software and the features
that have proven popular and unpopular provide a measure of the practical appli-
cations of network methods over the two decades. Trends for the future can
also be discerned. (Material for this section is based on experience of the authors
with several commercial programs, contacts with other users and software ven-
dors, and several excellent surveys of software published between 1964 and
1980. (See References 2-6.)
The earliest software often had several inconvenient limitations. The pro-
grams were almost all designed solely for the arrow networking scheme. Many
required I < J node numbers for each activity, provided only one output tabula-
tion, did not provide calendar dates, and were restricted to a single network with
only one starting and one ending node. In the early sixties resource allocation
algorithms were just being considered by graduate students and others and were
not yet available in commercial programs.
360 11 I Advanwd T o p i a
Figure 11-14 The ability of computer systems t o "draw" networks is displayed in this por-
tion of a precedence network plotted on paper by a PAC graphics printer. Courtesy Interna-
tional Systems, Inc.. King of Prussia. Pennsylvania.
Computer Processing 361
On the other hand, some of the earliest programs contained rather sophisti-
cated mathematical features that have since almost disappeared from commercial
software. The statistical and probability features originally associated with
PERT have been the most notable casualties, due to the lack of user interest.
Most programs now operate with a single time estimate per activity.
Similarly, users have not maintained interest in the powerful timecost trade-
off procedure originated by Kelley and Walker in the first CriticalPath Method
computer program. While managers still acknowledge the validity and irnpor-
tance of the timelcost optimization concept (particularly with the dramatic in-
flation in construction and other costs in the late seventies), they tend to deal
with the problem in other ways that do not require detailed time-cost analysis of
each activity in a network. Another reason may be that resource allocation
problems may be more constraining. Why expend a great effort to find an opti-
mal time-cost trade-off if the resultant schedule is infeasible due to resource limi-
tations? As yet, no software has been able to optimize resources as well as time-
cost trade-offs.
Other interesting trends in the programs, indicating user needs and applica-
tions as well as advances in computer hardware and software, are categorized and
commented upon below.
Computer Processing 363
REPRESENTATIVE SOFTWARE
To illustrate the variety and sources of software available in 1981, a small but
representative list of programs is provided in Table 11-2. The list was compiled
primarily from a comprehensive survey published by the Project Management
Institute, plus other sources. The listing for each program was verified by the
vendor. The vendors are listed at the end of this chapter.
All of the programs listed are available t o the public in some manner through
purchase, lease, or user charges. Not listed are any of the scores (or perhaps hun-
dreds) of proprietary programs used internally by corporations, consultants, or
universities.
The table does not attempt to list all of the special features offered, but is
364 11 I Advanced Topics
limited to a few of the more popular and significant features. All of the pro-
grams are presumed to incorporate the basic network scheduling calculations de-
scribed in Chapter 4 and earlier in this chapter, including earliest and latest start
and finish times for each activity, and total float. For more details on each pro-
gram, including price information, contact the vendor.
The reader is cautioned not to infer any evaluations of quality or cost-
effectiveness among the software packages listed in Table 11-2. It is possible
that a program with comparatively few features may be among the most effi-
cient, reliable, and cost-effective in certain applications. The authors disclaim
any comparative evaluations of the programs listed, nor do we suggest that these
are the best available at the time of this publication. For more up-to-date and
qualitative information of this kind, review current literature and contact the
Project Management Institute, P.O. Box 43, Drexel Hill, Pennsylvania 19026.
SUMMARY
The question of when and how t o use computer programs for network computa-
tion has been covered in this chapter, along with examples of input procedures
and output reports. It is stressed that the software packages are readily available
to the public and that they are not difficult to learn to use, even for persons
totally unfamiliar with data processing. There are some significant differences in
the features available in the programs, and the,user should study these carefully
before making a choice.
There is also a wide variety of software packages available for purchase or
lease. The trends in the development of this software reveal the popularity of
network methods in practical applications. A representative list of software
commercially available is provided.
Further details about features, prices, installation services and other information
about the software packages in Table 11-2 should be addressed directly to the
appropriate vendor as listed below. The list was prepared and verified in Janu-
ary, 1981. Addresses and contact names, of course, are subject to change after
that date. The authors do not assume responsibility for further information on
the packages or on vendor addresses.
Program Name Vendor Contact Person
APECS ADP Network Services, Inc. Mr. Richard W. Rogers,
180 Jackson Plaza Manager, Project
Ann Arbor, MI 48106 Management Applications
TaMe 11-2. Representative Software
C
APECS
PROGRAM NAME SOURCE LANGUAGE AND
HARDWARE REQUIRED
Rrrow o r Precedence
64,000 a c t i v i t i e s
Y
X X
S ' J U . ?
X X X X X X X F u l l y i n t e r a c t i v e . Integrated
cost/schedule analysis. Many graphic
output options.
Hewlett Packard lODO Armw o r Precedence X X X K X X X X X " User- friendly' harhrare/soft*are system
mini w i t h 20 Mbyte disc 32,000 a c t i v i t i e s w i t h f l e x i b l e p r i n t e r o r graphic
drive reporting.
18
A
.
Z P B o U
. L,
YO s - z , u u
rnD 0 . 2 Y C Y ) O
O
% U r n %
HARMARE REQUIRED AND SIZE * c1Ju.-
C ~
8
; ~ : ~ Y
0
~ Y *
FORTRAN
From m i n i ' s t o l a r g e
scale computers
COBOL FORTRAN
~ v al i b l e through General
I 200-10,000 a c t i v i t i e s
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X Available i n 5 model sizes f o r mll to
l a r g e canputerr and m r k programs.
WCS (Management COBOL, FORTRAN, BPI Arm o r Precedence X X X X X X X X Resource constrained scheduling.
Scheduling and Control IBn 3601370 42,600 a c t i v i t i e s reporting, s e l e c t i o n c r i t e r i a . Graphics
System) OS, MYT interface.
WCS (Project
Management and Control
System)
FORTRAN
Large Scale
Assembler
Any I?360/370, 303X,
I Arrow o r Precedence
Unlimited
A r r W o r Precedence
8 million activities
X X X X X X X
X X X X X X X X
Resource Leveling
I n t e r a c t i v e I n p u t and Reporting
Capabilities.
PROJACS
Assembler
1Bl 360 05 2561:
PL/1 and Assembler
I M 360/370. 303X, 43XX
I Arrow o r Precedence
64.000 a c t i v i t i e s
Arrow o r Precedence
32,000 a c t i v i t i e s
X X X X X X X
X Y X X X X X
X
X
Resource p l o t s ; repart c m a n d language.
PROJECT/Z
AHS COBOL
250K disk, 150K core
I Precedence
Unlirni ted
A r r r o r Precedence
X X X X X X X
X X X X X X X X
Report generator.
on Mini Conputern)
1
PRDHIWl (Project Contro FORTRAN
64K words
I Arrow o r Precedence
32,000 a c t i v i t i e s
I n t e r a c t i v e Input, r e p o r t w r i t e r .
resource plots.
I
Computer Proosging 389
REFERENCES
6. Woolpert, Bruce, "Computer Software for Project Planning and Control," un-
published student paper, Stanford University, Graduate School of Business,
May 1976.
EXERCISES
1. Using the network of the survey project in Figure 11-3, update the project
schedule with the following progress as of the end of day 8:
Actual Actual
Activity Start Date Finish Date Change
1-2 1 3
2- 4 3 Change time estimate to 8 days.
2-3 5 No change in time estimate.
4-6 Change time estimate to 8 days.
Assume that the project's scheduled completion day is day 37. Manually
prepare an output report similar t o the one in Figure 11-8 and answer the fol-
lowing questions:
Using the network in Figure 11-3, assume that the same questionnaire is t o be
used in another survey project. The deadline for having the printed question-
naire on hand t o conduct the other survey is day 15. Thus, day 15 is a sched-
uled completion date for activity 4-6. With this added constraint, manually
compute the initial schedule for the project, producing a report similar t o
Figure 11-5. What features of a computer program would be needed t o make
the same calculations? Are these features available in all CPM software?
3. Redraw the network in ~ i ~ u11-3r e using the activity-on-node scheme. Com-
pute the initial schedule manually. What differences are there in the results
shown in Figure 11-5? If you used a computer program, how would the in-
put format differ from the one shown in Figure 11-4?
4. Repeat Exercise 1 using a CPM software package available t o you. Discuss
any differences in the output results.
5. Consider a research and development project for a new plastics product in-
volving over 2000 activities, a budget of $1 to $1.3 million, and an estimated
time frame of 20-26 months. Management wishes t o use network analysis t o
plan and monitor progress on the project. An updated network schedule is
desired the f i s t of every month, including graphic presentations of (a) the
372 11 I Advanced Topics
critical path activities and their schedule status, (b) summaries of costs t o
date compared with budget, and (c) listings of activities under the responsibil-
ity of each internal department and each outside vendor and contractor. If
you are t o prepare the project network and present the desired monthly re-
ports: Would you want t o use a computer program or make the analyses
manually? If you decide t o shop for computer software, what features would
you seek? Would any of the programs listed in Table 11-2 not meet your
needs?
6. Suppose that a particular software package offers the features of multiple ini-
tial and terminal events and the option of assigning different scheduled dates
t o the initial and terminal events. The software literature does not mention a
"multi-network" feature. Could the package be used to process multiple net-
works that are interrelated? If so, construct an example of three projects
that are interrelated but have different scheduled completion dates. Explain
how the package could be used t o properly compute the schedules of each
project and all the activities involved.
7. Consider Case 3 on page 339. Suppose the contractor wanted to use a net-
work for schedule updating and control throughout the project. What would
be some of his options for manual or computer processing?
8. Redraw the network in Figure 11-3 using precedence diagram logic including
the following special interdependencies:
Predecessor Successor
Activity Activity Relationship
4-5 Start-Start (Lag 5)
Finish-Finish (Lag 2)
7-8 Start-Start (Lag 51
Finish-Finish ( l a g 3)
Compute the initial schedule manually. What differences are there in the re-
sults shown in Figure I 1-5? Comment on the relative advantages of using a
computer t o process this network compared t o problem 3.
SOLUTIONS TO EXERCISES
Chapter 2
1. Schedule inspector
Inspect machine
5. These are resource dependencies, indicating that there is only one crew of
carpenters for the forming work. The dashed arrows from events 32, 37, and
42 also show that some subsequent activities are dependent on the use of
forms that are removed in activities 31-32, 36-37, and 41-42. (The subse-
quent activities are not shown.) In this case the resource is the reusable
forms.
374 11 I Advancad Topics
Chapter 3
Solutions to Exercises 375
5. To the extent practical, plan activities in parallel rather than in series. (Often
this means providing additional resources to avoid resource dependencies.)
Anticipate long lead-times, such as fabrication of customized equipment, and
plan for them t o begin as early in the project as practical.
7. Inflation of time estimates tends to force those activities to become critical,
thus increasing management attention and pressure.
9. The superintendent for a high-rise building project may want enough detail to
work out the most efficient sequence for a floor, because the time saved
would be accumulated over all floors. The president of a large firm is not
likely to want much detail, but rather just the schedules for a few key events.
A programming subcontractor would be especially interested in the true de-
pendency relationships between programming activities and all other activi-
ties in the project.
Chapter 4
1. a. No.
b. 2.
c. As late as possible, i.e., 6-7.
3. a. Critical Path 210-106-109 Slack - 2
b. No effect for a time of 16; however, a scheduled time of 12 for event
106 would make LIo6 = 12, and thus the path 210-106 would have a
new slack value of - 4.
5. c. Latest allowable start time for the deactivation of the lines is 205 hours.
d. Activities on the critical path are A-B-F-G-M-D-0.
7. a. Project is one day behind schedule. Path 3-4-5-8has a slack of -1.
9. a. and b.
5
- (0-11
2
2
7
2
+
7
17-21
4
6
11
6
11
(2-51
1
7
12
0
Dummy
0 °
0
0
- - - -
0
0
(0-3)
2
2
2
2
3
(3-41
6
7
8
,7
8
(4-51
4
11
12
11
12
(5-81
3
14
15\l5
Dummy
l5
-
finish
0 1 2 10 10 15 :15 O 15-
10-61 13-71 17-81
1 8 5
6 7 2 10 '10 15 Key:
1 4 (Activity no.)
(6-71 duration
3
7 10
376 11 I Advanced Topics
A 0 10 0 10 0 0 1 0 0 1 0 0 -
8 3 11 8 @ 5 3 11 8 0 5 'p=8-4=4
C 0 20 7 27 7 0 2 0 7 2 7 7 -
D @ 8 7 13 5 @ 8 7 13 5 n=6-1=5
E 10 22 10 22 0 10 22 10 22 0 -
F @ 27 13 27 0 @f 27 13 27 0 ar=14-5=9
G @ @ 2 5 2 7 @ @ 0 2 5 2 7 @ -
Differences in times noted by circled values.
Chapter 5
1. Cumulative costs per period with the revised activity starts as indicated are as
follows:
Cumulative Cumulative
Period Cost Period cost
1 $ 500 9 $1 9800
2 1000 10 21 000
3 2500 11 21 900
4 4700 12 24000
5 6900 13 26100
6 10600 14 28200
7 13800 15 28900
8 17000
For most recent reporting period there are some bright spots:
Based on total performance t o date, the project will experience a cost over-
run of $22,700 unless some remedial actions are taken (assuming this is
possible).
Chapter 7
1. c. The internal tangent approach appears appropriate for Resource A because
of the shape of the curve (relatively sharp increase in requirements be-
tween periods 3 and 13).
9 9 - I5
Lower bound estimate = -- 8.4 units/period
13- 3
The relatively gradual increase in requirements of Resource B over the
entire project duration makes the internal tangent approach inappropriate.
98
Average resource requirement = - = 5.4 units/period
18
d. Case 1
8.4
Criticality index, resource A = - = 1.05
8.0
5.4
Criticality index, resource B = - = 0.68
8.0
Case 2
8.4
Criticality index, resource A = - = 1.20
7.0
5.4
Criticality index, resource B = - = 0.77
7.0
e. Expected minimum project duration: determined by Resource A, i.e.,
142
Resource A: -= 17.75 1 1 8 days
8
3. The final schedule obtained using the SIO rule to establish the OSS is shown
below.
378 11 I Advancad Topics
Y q
B
- D
C
1
E 1
F
G
H
1 1 I I l l 1 1 1 1 1 1 1 1 1 1 1 / , , 1
0 3 5 89 13 15 19 21 24
Time
fl
B
C
D
E
--
--
F
G
H
I
-J
I 1 I I 1 I 1 1 1 1 I I 1 I l l
3 5 8 1112 1618 21 24
Time
This sequence was obtained using the CRD rule to set the OSS and adding
both resources together. If only resource A is used (the critical resource), the
same solution is obtained.
Chapter 8
1. Project Indirect Total
Duration Direct Costs Co6D Costs Network Change6
12 610 1510 -
11 g10+40 =650 1470 DL 4
10 650 + 4 0 = 6 9 0 1430 D 13
9 6 9 0 + 8 0 =770 1470 A L 2, D T 4, G L 3
8 770+100=870 1530 F16.Gk2
7 8 7 0 + 1 3 0 = 1000 1620 B15,D13,F+5
3. Activity i-j.
Minimize (C1 - C2 ) 6 I - syb
Solutions to Exercises 379
c,
Activity
direct
cons
-
slope = r
y v p i i
Yi,
dl dz d3
Activity Duration
Activity
'.I--& Slope = s
direct
costs
c,. - - -- -
I I
I
I
c,--+---+
I
I
----.
t+
I
Yt!,
I I
I
I
* y,,
d, d2 d3
Activity duration
380 11 I Advanced Topics
6, = non-negative integer
ActiviN
direct
costs
I I
I I
I I
I I
I Slope = s,
I I
d4
'y,
dl d2 d3
Activity duration
Chapter 9
Solutions t o Exercises 381
9. a. The activities that have two or more predecessor activities are 108, 11 3,
117, 119, 121, 125, 126, 127, 128, 129, 132, and 133. The predecessor
events of these activities are the ones where a merge event bias may occur.
Of these 12 cases, only activities 12 1, 125 and 126 will present merge
event bias problems. For the others, the expected means of the merging
paths are quite far apart, or else there is a great deal of correlation in the
two paths, so that the bias will again be negligible, e.g., activity 132 and
129.
It should also be noted that the merge event biases will occur on slack
paths, and hence will not affect the critical path, and hence the conven-
tional PERT analysis should be a good approximation in this example.
b. The critical path is made up of activities 102, 105, 108, 112, 115, 118,
120, 123, 124, 128, 13 1, 132 and 133. The sum of the estimated mean
times for this path is 382. The variance of this path can be approximated
by considering only activities 105 and 118. The sum of their variances is
1221.3 and the approximate standard deviation is 35.
c. P{T< 400) = P { Z < (400 - 382)/35} = 0.70.
Chapter 10
1. Some of the alternative networking systems (or alternative computer pack-
ages) t o consider include: 1. CPM, 2. PERT, 3. Precedence Diagramming,
4. Node Diagramming, 5. GERT, and 6. Bar Charts. Index these alternatives
by (i), so i = 1, 2, . . . , 6, in this illustration.
Some of the criteria to consider in choosing a networking system include:
1. Ease of drawing the initial network. 2. Ease of obtaining the initial data,
. . . , 9. Ease of updating effectively. Index these criteria by j = 1, 2 , . . . , 9.
Now assign weights, wi,t o each criteria t o reflect their relative importance.
Finally, for each network system (i), assign a relative score, sii,t o reflect how
it achieves the jth criteria. The final score for each networking system is then
computed from
9
Score for System ( i ) = Si = wjslj
i=l
FSource
Redefine problem
Project washout /
382 11 / Advanced Topics
Chapter 11
1. Market Survey Project Effective Date: 8
Est. Act.
I J Our. Our. Description ES LS EF LF F
The computed schedule is the same. The input format would have one iden-
tifying number for each activity, rather than a pair of numbers (I and J). The
input would also list the dependent activities for each activity.
5. Use of a computer would be recommended because of the size of the net-
work, the number of updating calculations projected, and the various output
sorts desired. Software features needed would include: updating, cost sum-
Solutions to E*orciws 383