Critical path method, Computer Networking

Assignment Help:

You are the Senior Project Manager in a software company and have, as part of your team, a student on a three month internship. The student has proudly told you that they have studied a project management module and understand network diagrams and the critical path method (CPM). You have a small project to undertake for a client, so you ask the student to produce an Activity on Node (AON) network, use CPM on the network, suggest whether the project can be completed with the 60 day schedule and, if not, recommend which activity times might be crashed.

You were rather disappointed when, two days, later the student comes back with one sheet of paper merely containing the network shown below.

1772_create schedule.png


Advise on what the network and subsequent analysis should have looked like. (Assume the work breakdown, precedence of activities, and logic of the above network are correct).

Please note, as this is largely a practical assignment, you do not need to provide extensive bibliographical references.


Related Discussions:- Critical path method

Explain the wireless standards, Problem 1: (a) Briefly explain each of...

Problem 1: (a) Briefly explain each of the following wireless standards: (i) WiFi (ii) WiMAX (iii) 3G. Problem 2: (b) Bluetooth is an industrial specific

Why do we require a subnet mask? , If the host has the subnet ID why do we ...

If the host has the subnet ID why do we require a subnet mask?

How is it different than bootp or rarp, Bootp protocol normally use it in d...

Bootp protocol normally use it in dhcp protocol, it is configured manually in order to give ip add or there relvent host. Rarp is a work just opposite of Arp. Rarp stand for rev

Show the security policy as well integrated security, Q. Show the Security ...

Q. Show the Security Policy as well Integrated Security ? Security policy is on paper statement describing what assets are to be protected and why who is responsible and which

What is the attenuation, In communication weakening or loss of signal energ...

In communication weakening or loss of signal energy, typically caused by distance

Enhance the competition among the internet service providers, 1 Suppose you...

1 Suppose you are the new regulator in charge who has authority over Internet services (although in reality such a position may not exist depending on your country). You aim to enh

Estimate of average delay deviation, Consider the procedure described for e...

Consider the procedure described for estimating average delay di. Suppose that u=0.1. Let r1-t1 be the most recent sample delay, let     r2 -t2 be the next most recent sample delay

Security control procedures , a) An Introduction/Overview of Network Securi...

a) An Introduction/Overview of Network Security issues. b) A Risk Assessment  analysis- to include:             Assets                                                         T

Layer 2 switch, A typical layer 2 switch has a number of features. Identify...

A typical layer 2 switch has a number of features. Identify and explain 5 features that you think are important that you would consider in your evaluation of L2 switches offered b

What is a binary semaphore, What is a binary semaphore? What is its u...

What is a binary semaphore? What is its use? A binary semaphore is takes only 0 and 1 as values. They are used to execute mutual exclusion and synchronize concurrent p

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd