Unit-4 PERT & CPM
Unit-4 PERT & CPM
Network Scheduling
by PERT/CPM
25:1. INTRODUCTION
Network Scheduling is a technique used for planning and scheduling large projects in the fields of
construction, maintenance fabrication, purchasing, computer system installation, research and
development designs, etc. The technique is a method of minimizing trouble spots, such as, production
bottlenecks, delays and interruptions, by determining critical factors and coordinating various parts of
overall job.
There are two basic planning and control techniques that utilize a network to complete a
pre-determined project or schedule. These are: Program Evaluation and Review Technique (PERT);
and the Critical Path Method (CPM). Several variations of these have also been developed, one such
important variation being the Review Analysis of Multiple Projects (RAMP) which is useful for
guiding the 'activities' of several projects at one time.
Activity
O- -O
Starting Event Completion Event
764
OPERATIONS RESEARCH
of more than one activity is called ameroge event. \i
An event representing the joint completion it is called a burst event
initiation of more than one activity,
an event represents the joint
into the following three categories
The activities can be further classified
which must be completed before
one o r more other
er acti.
activities
I. Predecessor activity. An activity
start is known as predecessor activity.
or more of other actii
started immediately after one ities
2. Successor activity. An activity which
are completed is known as successor activity.
resource and time is na
not consume either any
3. Dummny activity. An activity which does own
is depicted by dotted line in the network diagram.
as dummy activity. A dummy activity
to represent the given precedence
Remark. A dummy activity in the network is added only more parallel activities in a
and is needed when (a) two or
relationships among activities of the project have some (but not all) of their
two or more activities
project have same head and tail events, or (b)
immediate predecessor activities in common.
Succeeding Event
Preceding Event
Successor Activity
Node Node
B
Predecessor Activity A Activity Node
D u m m y Activity
C
Succeeding Event
Fig. 25.1
dotted line in the network diagram as shown above.
A dummy activity is depicted by a
AO C
D C
Dangling
Dummy
O-
Fig. 25.3. Dangling
In the above network, activity D leads to dangling. A dummy activity is therefore introduced to
avoid this dangling.
3. Dependency relationships. When two chains of activities have a common event. w holly or
partly independent of each other, a dummy activity is used to establish proper logical relationships.
Given below are the two cases of dependency relationships
C is dependent upon both A and B.
(i) Activity
() Activity D is dependent upon A alone.
Dummy
B
D
(a) (b)
A (c)
Fig. 25.4
From the above three figures, we observe that Fig. 25.4(a) is clearly wrong since it shows D as
dependent upon not only A but also B which is not desired. Fig. 25.4(b) is also wrong since A has
been shown twice and thus contravenes the fundamental axioms of network that there must be one
arrow for each activity. The way out to this dilema is the representation by means of a dummy
Fig. 25.4(c) shows that C is dependent upon both A and B (via dummy) whereas D is
activity.
dependent upon just A.
sequence must be such so as to reflect the flow of the network. In event numbering, the followin
rules should be observed wing
(a) Event numbers should be unique.
(6) Event numbering should be carried out on a sequential basis from left to right.
(c) The initial event which has all outgoing arrows with no incoming arrow is numbered 0 or 1.
(d) The head of an arrow should always bear a number higher than the one assigned at the tail of
the arrow.
(e) Gaps should be left in the sequence of event numbering to accommodate subsequent inclusion
of activities, if necessary.
Remark. The above procedure of assigning numbers to various events of a network is known as
Fulkerson's Rule.
Illustration. A television is manufactured in six steps, labelled A through F. Because of its size
and complexity, the television is produced one at a time. The production control manager thinks tha
nerwork scheduling techniques might be useful in planning future production. He recorded the
following information:
A is the first step and precedes B and C,
Cprecedes D and E,
F follows E and D is successor of F,
B follows D and precedes E.
(a) Draw an activity-on-node diagram for the production manager.
(b) On checking with the records, the production manager corrects his last note to read, "DB
predecessor of F". Draw a new diagram for the revised network incorporating this new change.
(c) After pondering over the network and rechecking8 from the records, it was found that Bwa
really a predecessor ofD rather than vice versa. Draw a revised network incorporating this nev
change.
(d) Draw an arrow-diagram representation of the network in part (c). How many ummy
activities did you use in your network?
Solution. (a) (i) A is the first step which precedes B and C.
(i) C precedes D and E.
767
(ii) F follows E and D and is the successor of F:
Fig. 25.7
i) Now, since B follows D and precedes E, the
below:
complete network drawing is shown in Fig. 25.8
Fig. 25.8
Evidently. this network contains a cycle as shown in Fig. 25.9 below
- -
Fig. 25.9
(b) Revised network when D is a predecessor of F is as follows
Fig. 25.10
(c) Revised network when D is a predecessor of F and B is a predecessor of D is given below
Fig. 25.11
(a) The arrow diagram of the network presented in part («) can be represented as
3 D
0-A
C
-Dummy Activity
Fig. 25.12
The vents of the diagram are numbered such that their ascending order indicates the direction of
progress in the
project.
768 OPERATIONS RESEARCH
25:5. CONCURRENT ACTIVITIES
Activities discussed so far are discrete in nature. But in practice, they may not always be disera
they may be done in part allowing the subsequent activities to commence before the precedinge te, i.e.,
is fully completed. Activities of this kind are to be frequently encountered in batch productian
example, a batch of 50 spindles is to be processed on two machines, obviously it is not neces for
essary
process all the items of the batch on the first machine and then transfer these to the next machi
few items processed on the first machine may be transferred to the second machine before comnlet
of the entire batch on the first machine. Such simultaneous or concurrent activities are
to h
encountered in sewage work; e.g., trenching, laying pipe, welding pipe, and back filling; all going n
simultaneously with suitable lags on construction work.
Illustration. A batch of four
axles is to be processed on the following three machines in
this
sequence : Lathe (L), Milling (M), Grinding (G).
Instead of first working these four axles on Lathe, then on Milling and finally on
Grinding in
sequence, it is desired to process the first axle on the Lathe and as and when it is processed, it is
taken up on Milling and the second axle on the Lathe, and so on. In other words, each
of the three
activities L M and G have been quartered for the sake of concurrent operations.
You are required to draw the network.
Solution. The dependency relationships are sorted out hereunder
Quartered activity Preceded by Quartered activity Preceded by
Li None M3 Lg, M2
L Li M4 L4. M3
Ls L G M
La La G2 M2, G
M L G3 M3. G2
M2 L2. M G4 Ma. G3
Using the above relationships, the resulting network is shown in Fig. 25.13
2
La
M
G Ma
- G2 G 13 GA
Fig. 25.13
Note. The concurrent activities so drawn are known as ladders in the network jargon.
A M
25:6. CRITICAL PATH ANALYSIS
hepurpose of analysisis to find the critical path, i.e., the sequence of activities with the longest
uration, and to find the float associated with each non-critical activity. This helps in checking actual
rOgress against the scheduled duration of the project. To achieve this objective, we carry out the
pecial computations that produce the following information
a)Total duration needed for the completion of the project.
0) Categorization of the activities of the project as being critical or non-critical.
772
OPERATIONS RESEARCH
is said to be critical, if the delay
in its start will fu
Anactivity in a network diagram scheduling slack, so tha dela
non-critical activity allows
some
the project completion time. A
time of the activity may be
advanced or delayed within
limits without affecting the comnla
ompletion standate
of the entire project.
the following factors should be known
To accomplish the above-mentioned objectives, pare
project scheduling :
activity, i.e., the time by
which an activity must begin and tha
(i) Time schedule for each time
before which it is completed.
well earlier finish and latest finish of each activity
(ii) Earlier and latest start time as
as
the
Step 3. Compute the earliest finish time of each activity that begins at nodei by adding
earliest start time of the activity to the duration of the activity. Thus
EF ES +y =
E, +
Step 4. Move on to next node, say node j (j> ) and compute the earliest
E max EFG) = max {E; + y l .
occurrence for
node j, using
for all immediate predecessor activities.
Step 5. If j = n (final node), then the earliest finish time for the project is given by
E max {EF} = max {E,-1 + 4ij.
Backward Pass Calculations. We start from the final (last) node (event) n of the netwo
proceed through the network visiting nodes in the decreasing order of node numbers and ena at
initial node 1. At each node, we calculate the least finish and start times for each activny o
considering L, as the latest occurrence of node j. The method may be summarized below
Step 1. L, = E,: for j =n.
Step 2. Set the latest finish time of each activity that ends at node j as
LFiy Lj the
Step3. Compute the latest occurrence times of all activities ending at j by subtractung
duration of each activity from the latest finish time of the activity. Thus
HEDULING
NETWORK SCHE BY PERT/CPM
773
Proceed backward to the node in the
sequence, that decrease j by
occurrence
time of node i (i< ) using
1. Also compute the
latest
L min {LS}
=
=
min {L ijB. -
tijB
ased on the above calculations, an
activity (i, j) will be critical if it satisfies the
conditions
following
E =L and E = ly
()
(ii) E-E = L - Li =ij
An activity that does not satisfy the above conditions is termed as non-critical.
Critical Path. The critical activities of a network that constitute an uninterrupted path which
spans the entire network from start to finish is known as critical path.
It is a measure of how much later than expected a particular event could occur without delaying
the completion of the entire project.
2. Activity float. As mentioned earlier, it is the float (or slack) in the activity time estimates.
There are mainly three types of activity floats as discussed below
) Total float. The total float of an activity represents the amount of time by which an activity
can be delayed without delay in the project completion date. In other words, it refers to the amount
of the free time associated with an activity which can be used before, during or after the performance
of this activity. Total float is the positive difference between the earliest finish time and the latest
finish time, or the positive difference between the earliest start time and the latest start time of an
activity depending upon which way it is defined.
Thus, for each activity (i. j), the total float values are computed as follows
tal float (TF) = L, - (E; + i ) = LFy - EF
(j - i) - E = LSj - ES
(i) Free float. Free float is that portion of the total float wihin which an activity can be
manipulated without affecting the float of subsequent activities. It is computed for an activity by
Subtracting the head event slack from its total float. The free float indicates the value by which an
activity in question can be delayed without causing any delay in its immediate successor activities.
Free float values for each activity (i. ) are computed as follows
Free float (FF) = (E, - E) - 4j
for
( dependent float. It is that portion of the total float within which an activity
can be delayed
floats of the preceding activities. It is computed by subtracting the tail event
slaccWithout
slack from the affecting
freee float of the activity. If the result is negative, it is taken as zero.
774 OPERATIONS RESEARCA
Independent float values for each activity (i, j}) are computed as follows
Independent float (F) (E - L)
= -
or
IF =
FFj (slack of event i)
Illustration. Consider the following activity of certain network
E 20 19
E2 = 39
L380- 2 57
Here
Total Float =
L2 -
(E +12) = 57 -
(20+ 19) = 18
Free Float =
E2 (E -
(iv) Interfering float. Utilization of the float of an activity can affect the float of subsequent
activities in the network. Thus, interfering float can be defined as that
part of the total float which
causes a reduction in the float of the successor activities. In other
words, it can be defined as the
difference between the latest finish time of the activity under consideration and the earliest start time
of the following activity, orzero, whichever is larger. Thus, interfering float refers to that portion of
the activity float which cannot be consumed without
affecting adversely the float of the subsequent
activity or activities.
Remarks 1. The basic difference between slack and float times is that slack is used for
events only.
whereas float is applied for activities.
2. Latest occurrent time of an event is always
greater than or equal to its earliest occurrence time, ie.,
Li2 E. This implies that
Independent float Free float s Total float.
3. An activity is critical if its total float is zero, otherwise it is
non-critical.
4. Once the float of an activity is disturbed, float of all other
activities of the project is changed and
should be re-calculated.
5. The calculation of various floats can
help the decision-maker in identifying the underutilized
resources, flexibility in the total schedule and
possibilities of redeployment of resources.
NETWORK SCHEDULING BY PERTICPM
781
Fig. 25.22
Keeping in view of the above-mentioned properties, it may be justified to assume that the duration
of each activity may follow a Beta (B) distribution with its unimodal point occurring at1 ,
points , and p
In Beta distribution the mid-point (, + t,)/2 is assumed to weigh half as much as the most likely
point (). Thus, the expected value of the activity duration can be approximated as the arithmetic
mean of (, + )/2 and 2 Thus, we have
, [2+ +)/2] =% + 4tm t ) / 6
Since almost (99%) all values of random variables fall within t3 standard deviation from the
mean or fall within the range approximately 6 standard deviation in length, therefore the interval
, ) is assumed to enclose about 6 standard deviation of a symmetric distribution. Thus, if a
denotes the standard deviation, then
6o p - or = (, / 6 .
The variance, therefore, is: o = {l, - )/6F.
Emark. In PERT analysis, a Beta distribution is assumed because it is unimodal, has non-negative end
Prob
The standard normal variate (SNV) is given by,
where, T, =
expected completion time of the project and
o =
number of standard deviations the scheduled time lies from the
expected (mean) time,
i.e., the standard deviation of the scheduled time.
Using the cumulative normal distribution tables
(given at the end of book), the corresponding
value of the standard normal variate is read off. This will
the project on scheduled time.
give the required probability of completing
25:8. DISTINCTION BETWEEN PERT AND CPM
Both PERT and CPM are managerial techniques for planning and control of large complex projects.
Both are techniques to network analysis wherein a network is prepared to analyse inter-relationships
between different activities of a project. However, there are several differences between the two
techniques
SCHEDULING BY PERTICPM
NETWORK 791
, CPM is used for repetitive jobs like planning the construction of a house. On the other hand,
cT is used for non-repetitive jobs
planning like the
assembly of the space platform.
PERT is a probabilistic model with uncertainty in activity duration. Multiple time estimates are
t o Calculate probability
the of
completing the project within scheduled time. On the contrary,
DM is a deterministic model with well-known activity (single) times based upon past experience. It,
re fore, does not deal with uncertainty in project duration.
th
3PERT is said to be event-oriented as the results of analysis are expressed in terms of events or
distinct points in time indicative of progress. CPM is, on the other hand, activity-oriented as the
lt of calculations
considered in terms of activities or
are
operations of the project.
4. PERT is applied mainly for planning and scheduling research programmes. On the other hand,
CPM is employed in construction and business problems.
4.
of manufacturing of ships, aeroplanes, etc.
Maintenance Planning. R&D has been the most extensive area where PERT has been used
for development of new products, processes and systems. It has been used in missile
development, space programmes, strategic and tactical military operations, ete.
.
InventoryPlanning. Installation of production and inventory control, acquisition of spare
parts, etc. have been greatly helped by network techniques.
Marketing. Networks have been used for advertising programmes, for development and
aunching of new products and for planning their distribution.
Other Areas of Application are preparation of budget and auditing. installation of computers
and large machinery, organisation of big conferences and public works, advertising and sales
promotion strategies, etc.
45:10.
ADVANTAGES OF NETWORK TECHNIQUES
hcse are most valuable and powerful for planning, seheduling and control of operations in
large and complex projects.
792 OPERATIONS RESEARCH
2. The techniques are useful tools to evaluate the level of performance by comparing
ring actual
performance against the planned targets.
3. These techniques help to determine the interdependence of various activities for nro
for propeT
integration and coordination of various operations.
4. These techniques help to evaluate the time-cost trade off and determine the aptimum schedhule
5. These techniques are simple and can be easily oriented towards computers.
6. The networks clearly designate the responsibilities of different supervisors. Supervisor of
activity knows his time schedule precisely and also thé supervisors of other activities wi
an
whom he has to coordinate.
25:11. LIMITATIONS AND DIFFICULTIES IN USING NETWORK
. Construction of networks for complex projects is complicated and time consumin, to trial
and error approach.
2. Difficulty in securing the realistic time estimates. In the case of new and non-repetitive type
projects, the time estimates are often mere ficticious.
3. Estimation of reliable and accurate duration of various activities is a difficult exercise.
4. The natural tendency to oppose changes results in the difficulty of persuading the
management to accept these techniques.
5. The planning and implementation of networks require personnel trained in the network
methodology. Managements are reluctant to spare the existing staff to learn these techniques
or to recruit trained personnel.
6. Developing a clear logical network is also troublesome. This depends upon the data input a
thus the plan can be no better than the personnel who provides the data.
7. Determination of the level of network detail is another troublesome area. The level of detail
varies from planner to planner and depends upon the judgement and experience.