Critical path method, Computer Networking

You are the Senior Project Manager in a software company and have, as part of your team, a student on a three month internship. The student has proudly told you that they have studied a project management module and understand network diagrams and the critical path method (CPM). You have a small project to undertake for a client, so you ask the student to produce an Activity on Node (AON) network, use CPM on the network, suggest whether the project can be completed with the 60 day schedule and, if not, recommend which activity times might be crashed.

You were rather disappointed when, two days, later the student comes back with one sheet of paper merely containing the network shown below.

1772_create schedule.png


Advise on what the network and subsequent analysis should have looked like. (Assume the work breakdown, precedence of activities, and logic of the above network are correct).

Please note, as this is largely a practical assignment, you do not need to provide extensive bibliographical references.

Posted Date: 3/25/2013 6:05:01 AM | Location : United States







Related Discussions:- Critical path method, Assignment Help, Ask Question on Critical path method, Get Answer, Expert's Help, Critical path method Discussions

Write discussion on Critical path method
Your posts are moderated
Related Questions

10Base5 - Thicknet A rigid coaxial cable (RG-8) approx 0.4 in' thick used in the original Ethernet networks Bus topology LAN utilize base signalling with a maximum se

Network Problems Q1  Consider the single-sender CDMA example in Kurose & Ross. What would be the sender's output (for the 2 data bits shown), if the sender's CDMA code were (

Question Which elementary logic gate is equivalent to this circuit? Show your working.

Question: Consider that you have to configure a small WLAN of 8 computers using Wired Equivalent Privacy (WEP) and that you have to best make use of its available security f

State some Security Models The first and foremost thing one needs to do is to chalk out a security plan and policy based on any security model. The term security policy shall

Explain the physical and logical paths in a computer communication network also

What is the suggestion of increasing and decreasing subnet Bits?


"arpa" is used by the Cisco IOS for which encapsulation types Ans) Ethernet_II