Critical path method, Computer Networking

You are the Senior Project Manager in a software company and have, as part of your team, a student on a three month internship. The student has proudly told you that they have studied a project management module and understand network diagrams and the critical path method (CPM). You have a small project to undertake for a client, so you ask the student to produce an Activity on Node (AON) network, use CPM on the network, suggest whether the project can be completed with the 60 day schedule and, if not, recommend which activity times might be crashed.

You were rather disappointed when, two days, later the student comes back with one sheet of paper merely containing the network shown below.

1772_create schedule.png


Advise on what the network and subsequent analysis should have looked like. (Assume the work breakdown, precedence of activities, and logic of the above network are correct).

Please note, as this is largely a practical assignment, you do not need to provide extensive bibliographical references.

Posted Date: 3/25/2013 6:05:01 AM | Location : United States







Related Discussions:- Critical path method, Assignment Help, Ask Question on Critical path method, Get Answer, Expert's Help, Critical path method Discussions

Write discussion on Critical path method
Your posts are moderated
Related Questions
Describe networking. Networking refers to the inter connection among computers and peripherals for data communication. Networking can be done using wired cabling or by wireless

Mean node-node path The mean node-node path is two times the mean node-root path.  Number the levels of the tree with the root as 1 and the deepest level as N.  The path from t

What is Daemon A daemon is a UNIX background process that implements the server side of a protocol. Daemons are unique to UNIX. For example, FTP stands for the File Transfer

Compute the shortest path from t to all network nodes.

Connect a Router and Computer with a Console Cable Step 1 : Set up a basic physical connection. Connect the console (rollover) cable to the console port on the router. Link

What is an Ethernet? The Ethernet topology was developed at the University of Hawaii to connect computers on the many Islands. It was radio based design. Later, Robert Metacalf

How does the cut-through switching technique work? Ans) Cut-Through switching copies only the destination address which is the first 6 bytes after the =frame preamble into its b


Process of Securing an Intranet Securing an Intranet is not a simple task. Mere installation of firewall hardware and software would not help the Intranet to protect itself. P

IGRP is a distance vector routing protocol designed by Cisco. The maximum hop count is 255, and it uses a combination of variables to verify a composite metric. IGRP has an adminis