larry leach, pmp - nasa. 4: 2/27/04 2 objectives • identify why the critical chain, not the...

38
Rev. 4: 2/27/04 1 Larry Leach, PMP 208-345-1136 Advanced-Projects.com [email protected]

Upload: phamanh

Post on 28-Apr-2018

215 views

Category:

Documents


1 download

TRANSCRIPT

Rev. 4: 2/27/041

Larry Leach, PMP208-345-1136

[email protected]

Rev. 4: 2/27/042

Objectives• Identify why the critical chain, not the critical

path, is often the constraint of a project• Exploit the constraint (critical chain) of a project• Subordinate everything else to the project goal• Define buffers used in Critical Chain Project

Management• Exploit the multi-project constraint

Rev. 4: 2/27/043

Successful Users & Clients Include

• Harris Semiconductor• Lucent Technologies• Honeywell DAS• Israeli Aircraft Company• UA Air Force• US Navy

Rev. 4: 2/27/044

PHNSY-FMB Improvements

⇓ 25%83110Customer Backlog⇓ 57%12.5%28.75%Overtime

⇑ 22%220

(99%)180

(93%)

Job Completion Rate(same time period)

⇓ 41%2,2023,741Man-Days

⇓ 23%$4,700$6,113

Average Cost per Job(incl. overtime)

⇑ 133%93%

(25 of 27)40%

(8 of 20)ON-TIME(Scheduled Availabilities)

METRIC BEFORE CCPM AFTER CCPM IMPROVEMENT

Rev. 4: 2/27/045

Rev. 4: 2/27/046

2. Critical Chain1. Remove resource conflicts

3. Mean Task Duration

A B C

E CB

A C D

4. Project Buffer

5. Feeding Buffer

Resource Leveled Critical (?) Path

6. ‘Late’ start

Time

9. Relay racer task performance

Rev. 4: 2/27/047

Goldratt’s Theory of Constraints

Products(or Projects)

toCustomers

Raw Materialfrom

Suppliers ProductionFunctions

System Throughput Limitedby a Constraint

Rev. 4: 2/27/048

The Theory of Constraints Focusing Steps

• IDENTIFY constraint• EXPLOIT constraint• SUBORDINATE everything else to

the constraint• Only then, ELEVATE the

constraint• Do not let INERTIA prevent future

improvement

Rev. 4: 2/27/049

Identify: Is the critical path the constraint?

Rev. 4: 2/27/0410

Resource Leveled CP

Rev. 4: 2/27/0411

Critical Chain Identified: The longest path through the project…after resource leveling.

Rev. 4: 2/27/0412

Example Group ResultHistogram

0

1

2

3

4

5

6

5 10 20 30 40 50 60 70 80 MoreBin

Freq

uenc

y

.00%

20.00%

40.00%

60.00%

80.00%

100.00%

120.00%FrequencyC umulative %

Rev. 4: 2/27/0413

All Project Activity Times Are Uncertain Estimates

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 0.5 1 1.5 2 2.5

Activity Time or Cost

P

MinimumTime/Cost

Most LikelyTime/Cost

Long ‘tail’ means no definite upperlimit

Rev. 4: 2/27/0414

Focus On Milestones And Variances Drives Low-risk (90%+) Activity Duration Estimates

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 0.5 1 1.5 2 2.5

ScheduledDuration

CumulativeCompletionProbability

Rev. 4: 2/27/0415

Critical Path Schedule Hides Contingency In Each Activity

Activity 1 Activity 2 Activity 3 Activity 4 Activity 5

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 0.5 1 1.5 2 2.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 0.5 1 1.5 2 2.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 0.5 1 1.5 2 2.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 0.5 1 1.5 2 2.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 0.5 1 1.5 2 2.5

Rev. 4: 2/27/0416

Date-driven Human Behavior Uses Scheduled Activity Time

0

1

2

3

4

5

6

0 0.5 1 1.5 2 2.5Activity Time or Cost

P

1 = Plan Time or Cost

Rev. 4: 2/27/0417

Exploit the Project Constraint

• Uncertainty:– Variation in estimate– Variation in task performance

• Dependent events: resources

Rev. 4: 2/27/0418

EXPLOIT variation by taking contingency out of each task, and moving it to the end of the chain.

Task 1 Task 2 Task 3 Task 4

Task 1 Task 2 Task 3 Task 4

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 0.5 1 1.5 2 2.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 0.5 1 1.5 2 2.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 0.5 1 1.5 2 2.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0 0.5 1 1.5 2 2.5

•Combining variances•Central limit theorem

Rev. 4: 2/27/0419

Critical chain differs from critical path by:• Resolving resource contentions first (Identify)• Using 50 % probable activity times (Exploit)

A B C

C D

(Smaller) aggregated Buffer at end of chain (Exploit)

Rev. 4: 2/27/0420

Buffer Provides AnticipatoryMeasure to Exploit Constraint

1 2 3 4 5 BUFFER

WatchWatch PlanPlan ActAct

Rev. 4: 2/27/0421

Buffer Tracking Predicts Action Need

Time0

1/3

2/3

1

xx

xx

xx

xx

xx

Plan

Act

Project Buffer

Rev. 4: 2/27/0422

Some Applications Deploy Dynamic Buffer Threshold

Project Buffer

%Buffer

xx

xx

xx

xx

xx

Plan

ActRED

YELLOW

GREENGREEN

% Chain

Rev. 4: 2/27/0423

Subordinate Merging Paths With ‘Feeding Buffers’

FB

FB

Project Buffer

Rev. 4: 2/27/0424

Example project as a CCPM schedule.

Rev. 4: 2/27/0425

Subordinate to the Critical Chain

• Eliminate start and stop dates for each activity (Only start dates for chains, and end of Project Buffer!)

• Late start feeding chains• Intermediate milestone (hard) dates

(But...technical milestones are necessary, and there is a way to meet client or regulator demands: buffer milestone dates.)

Rev. 4: 2/27/0426

• Critical chain task gets priority over non critical chain task

• Priority to task causing greatest project buffer penetration

• Non-project work lowest priority

Rev. 4: 2/27/0427

2. Critical Chain1. Remove resource conflicts

3. Mean Task Duration

A B C

E CB

A C D

4. Project Buffer

5. Feeding Buffer

Resource Leveled Critical (?) Path

6. ‘Late’ start

Time

9. Relay racer task performance

Rev. 4: 2/27/0428

Rev. 4: 2/27/0429

• Resources must multi-task• Projects are late• Quality deteriorates

Rev. 4: 2/27/0430

Rev. 4: 2/27/0431

Task ATask BTask C

SwitchingInefficiency

Task A Task B Task C

Rev. 4: 2/27/0432

Consider Unloading Ships...Five ships arrive. Each requires 5 person-days to unload.Each owner wants his ship unloaded ASAP. You have fivepeople to unload the ships. Simple…assign one to each ship.

Starting each one right away (the sooner you start…)each ship is unloaded on the end of the fifth day.

Rev. 4: 2/27/0433

Put all five resources on ship 1 the first day, ship 2 thesecond day, etc. Result:Ship New (days) Old (days) Saved1 1 5 42 2 5 33 3 5 24 4 5 15 5 5 0

Nobody loses. Four of five clients done sooner. Cost = $ 0

Rev. 4: 2/27/0434

• IDENTIFY: Multi-project resource constraint

• EXPLOIT: Prioritize projects (Drum)• SUBORDINATE: Stagger project start• ELEVATE• INERTIA

Rev. 4: 2/27/0435

Prioritize & Sequence Projects to Accelerate Completion!

BUFFER

Individual Project Schedules (Note resource contention)

BUFFER

Synchronized Multiple Projects Accelerate and ReduceResource Contention

BUFFER

Synchronizing (Constraint) Buffer

Constraint Resource

BUFFER

Rev. 4: 2/27/0436

Objectives• Identify why the critical chain, not the critical

path, is often the constraint of a project• Exploit the constraint (critical chain) of a project• Subordinate everything else to the project goal• Define buffers used in Critical Chain Project

Management• Exploit the multi-project constraint

Rev. 4: 2/27/0437

Implement effective process for:• Management leadership and behavior • Client alignment• Resource behavior• Buffer Management • Organization specific obstacles• Potential unintended consequences

Path ForwardPath Forward

Rev. 4: 2/27/0438

For Further InformationLeach, Lawrence P.Critical Chain Project ManagementArtech House, Boston, 2000

Available from PMI Bookstore,Amazon.com,and other major online book sellers.

[email protected]. Home: 208-345-1136