Critical path method, Computer Networking

You are the Senior Project Manager in a software company and have, as part of your team, a student on a three month internship. The student has proudly told you that they have studied a project management module and understand network diagrams and the critical path method (CPM). You have a small project to undertake for a client, so you ask the student to produce an Activity on Node (AON) network, use CPM on the network, suggest whether the project can be completed with the 60 day schedule and, if not, recommend which activity times might be crashed.

You were rather disappointed when, two days, later the student comes back with one sheet of paper merely containing the network shown below.

1772_create schedule.png


Advise on what the network and subsequent analysis should have looked like. (Assume the work breakdown, precedence of activities, and logic of the above network are correct).

Please note, as this is largely a practical assignment, you do not need to provide extensive bibliographical references.

Posted Date: 3/25/2013 6:05:01 AM | Location : United States







Related Discussions:- Critical path method, Assignment Help, Ask Question on Critical path method, Get Answer, Expert's Help, Critical path method Discussions

Write discussion on Critical path method
Your posts are moderated
Related Questions
There is no commonly accepted meaning for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS for transaction processing".

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Q. What are the TCP Services? TCP - Services Full Duplex Service Connection Oriented Service Reliable Service

Q. Show the Use of flow control? Flow control denotes to a set of procedures used to restrict the amount of data that the sender can send before waiting for Error Control

Question: (a) What is a script kiddie? Is it a significant security threat, and why? (b) Assume that UNIX uses the user login name in lieu of the traditional salt, what is

Serialized data is not generally sent at a uniform rate by a channel. Instead, there is usually a burst of regularly spaced binary data bits followed by a pause, after which the da

QUESTION a) Security is a very crucial component in a Distributed System. Describe three properties of a secure channel. b) During packet transmission, messages are subdivid

Clos network This network was organized by Clos (1953).  It is a non-blocking network and gives full connectivity like crossbar network but it also requires significantly minim

1. A low voltage digital device has a low state of 0 V and a high state of 1.8 V. It generates a signal train of high pulses at a rate of 1 MHz, these pulses having a 10 ns width a

Question 1: ‘There is an overwhelming imperative for organisations to analyse every bit of information they can extract from their huge data warehouses for competitive advant