StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Concept of PERT Network - Math Problem Example

Cite this document
Summary
This math problem "The Concept of PERT Network" calculates the expected value and the standard deviation for the expected value of the time required for each activity. Using the time given by the expected value calculations, the paper determines the critical path for the project…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
The Concept of PERT Network
Read Text Preview

Extract of sample "The Concept of PERT Network"

Assignment 3 Value: 10% Due 24 June 2005 Word Length: Not applicable(exercise) Format: Essay (APA Referencing) Copy and Turnitin Copy Attempt both questions below:1 Consider the PERT network: ActivityOptimisticEstimateMost LikelyEstimatePessimisticEstimate1-22451-33451-46792-33562-55783-52454-5567Designate the start of the project as time 0, and the scheduled time to complete the project (by contract) is 14 days. Using the 3-time estimate shown above, calculate the expected value and the standard deviation for the expected value of the time required for each activity.

B Using the time given by your expected value calculations determines the critical path for the project. C computes the probability associated with the project being completed by the time specified in the contract. The expected time between events can be found from the expression:te= (o+4m+p)/6Where:o=Optimistic Timem=Most Likely Timep=Pessimistic TimeIn order to calculate the probability of completing the project on time, the standard deviations of each activity must be known. This can be found from the expression: the = (p-o)/6 where he is the standard deviation of expected time, te.

ActivityOptimisticEstimateMost LikelyEstimatePessimisticEstimateExpected Value Standard Deviation, 21-22453,80,50,251-33454,00,30,111-46797,20,50,252-33564,80,50,252-55786,80,50,253-52453,80,50,254-55676,00,30,11BThe PERT network by expected value calculations: 4 7 5 4 4 7 6So there are 2 Critical Paths: 1-2-3-5 and 1-4-5. Each of them takes 13 days the critical path standard deviation is calculated by the square root of the sum of the squares of activity standard deviations using the following expression:c = 21-2-3-5: = (0,25 + 0,25 0+ 0,25 + 0,25 + 0,11) = 1,05We know C=13 (the expected completion time for the critical path) so probability z = (T-C)/ z = (14-13) / 1,05 = 0,95 or 95%2 Below are shown the activities for a project and how they are related(i) RelationshipsActivity C depends on AActivities D, F, K depends on BActivity G depends on FActivity E depends on C, D, and GActivity H depends on E, and K(ii) Activity duration and resourcesActivityDuration (Days)ManningA102B43C21D43E22F21G11H22K42A using the information given above, draw the network and calculate the forward and backward paths.

B Determine the Critical Path. C Construct the Grantt and the manning requirements.D Assume that 5 people have been assigned to the project and that all five can do the activities. Redesign the Gantt chart so that manning requirements do not exceed the resources. The network with the forward (upper) and backward (lower) paths. The Critical Path is A-C-E-H, and its length is 16 days the Gantt chart and the manning requirements:(Number of resources are from the left of the bars)DRedesign of the Gantt chart :(Number of resources are from the left of the bars)

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“PERT network Math Problem Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1508447-pert-network
(PERT Network Math Problem Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/miscellaneous/1508447-pert-network.
“PERT Network Math Problem Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1508447-pert-network.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Concept of PERT Network

The Self and the Culture of Social Network Sites

The paper "The Self and the Culture of Social Network Sites" focuses on the critical analysis of the existing knowledge base on psychology and culture through examining the concept of the self which exists in the fairly new culture of social network sites today.... First, it intends to comprehend the concept of the self.... On the one hand, given the technological advancement, the culture of social network sites has emerged.... ith the conduct of this research investigation, supplementary knowledge regarding the self within the culture of social network sites is contributed to the field of psychology....
13 Pages (3250 words) Term Paper

Information and Network Centric Operations

This book is intended to describe with analytical rigor the concept of distributed networked operations, which is a refinement of what have popularly been called "network centric operations.... To reach its full potential, network Centric Warfare must be deeply rooted in operational art.... his book aims at the network Centric Warfare concept; to explain how it embodies the characteristics of the Information Age; to identify the challenges in transforming this concept into a real operational capability; and to suggest a prudent approach to meeting these challenges....
13 Pages (3250 words) Essay

Network Intrusion Detection Systems

The paper "network Intrusion Detection Systems" discusses that the working of the intrusion detection system depends on the network and the functionalities within the network.... It is mandatory for network systems to install an intrusion detection system to manage the attacks and resolve the issues easily.... There are various types of intrusion systems and they are implemented based on the network system.... According to Mun, the intrusion detection system works well only if the system is selected based on the type of network....
5 Pages (1250 words) Essay

Within a Network of Computers

The paper "Within a network of Computers" discusses that communication protocol plays a significant role in controlling the speed and mode of communication among computer systems through a well-designed software package.... The design is TCP/IP protocol and Distributed network protocol.... Distributed network protocol on the other hand supports communication in process automation systems and supports peer-to-peer and master-to-slave communications....
3 Pages (750 words) Essay

The Idea of the Networked Society

"The Idea of the Networked Society" paper provides an analysis of the concept of the networked society and brought forward in various scholarly works.... Scholars have developed numerous theories in an effort to explain how technology has resulted in the shaping of the concept of the networked society.... Scholars have developed numerous theories in an effort to explain how technology has resulted in the shaping of the concept of networked society....
10 Pages (2500 words) Essay

Barabasi-Alberts Scale-Free Network and Watts-Strogatz Small-World Network

This case study "The Barabasi-Albert Scale-Free network and the Watts-Strogatz Small-World network" is about several models, as well as, theories that have been applied to explicate the dynamics in the world's network systems, especially in the fields of technology, and information systems.... This paper thereby digs deeper into two most commonly used network models: (i) Barabasi-Albert's scale-free network, and (ii) Watts-Stogatz' small-world network....
21 Pages (5250 words) Case Study

Complexity and Network Thinking

The paper "Complexity and network Thinking" is a great example of marketing coursework.... network thinking is becoming common in professions and fields of practice that bring different disciplines together.... The paper "Complexity and network Thinking" is a great example of marketing coursework.... network thinking is becoming common in professions and fields of practice that bring different disciplines together.... The paper "Complexity and network Thinking" is a great example of marketing coursework....
12 Pages (3000 words) Coursework

Concept of Network Security

The paper "concept of Network Security" suggests that understanding network security is identified as the inclusion of multiple layers used to defend the network.... At each level of network security, different controls and policies promote access to a particular security network.... A virtual private network (VPN) is a network that connects an existing body network to another network or one machine through a public network, usually the network as the centre for establishing a connection....
5 Pages (1250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us