Ada 375284

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 94

DEFENSE SYSTEMS MANAGEMENT COLLEGE

Scheduling Guide
For Program Managers
m HUHU

GANTT MILESTONE CPM


z
0 m
z -i
<
_!

<
o
CD
U.
0
UJ
2
g
Z o
<

than a listing of acnviries and events, organized oy rime.

PERT PRECEDENCE DIAGRAM

Defense Systems Management College Press


Fort Belvoir, VA 22060-5565
Form Approved
REPORT DOCUMENTATION PAGE OMB No. 0704-0188
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources,
gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this
collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson
Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188), Washington, DC 20503.

1. AGENCY USE ONLY (Leave blank) REPORT DATE REPORT TYPE AND DATES COVERED
January 2000 Guidebook
4. TITLE AND SUBTITLE 5. FUNDING NUMBERS

Scheduling Guide for Program Managers


6. AUTHOR(S)

William W. Bahnaier

7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION


REPORT NUMBER
Defense Systems Management College
Atta FD-PML
9820 Belvor Road
Ft. Belvoir VA 22060-5565

9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING / MONITORING


AGENCY REPORT NUMBER

Same as 7.

11. SUPPLEMENTARY NOTES

12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE

Distribution unlimited

13. ABSTRACT (Maximum 200 words)


This guide provides an introduction to scheduling intended for use by government managers and industry program of project
managers and their respective staffs. This version addresses many of the topics contained in their earlier versions, especially
those relating to the different types of scheduling techniques.

14. SUBJECT TERMS 15. NUMBER OF PAGES


Program Management; Scheduling; Acquisition Process; Schedule Types; Milestone Charts; 92
Production Scheduling; Time Management; and Automated Scheduling. 16. PRICE CODE

17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF
OF REPORT OF THIS PAGE OF ABSTRACT ABSTRACT
Unlimited Unlimited Unlimited
Standard Form 298 (Rev. 2-89)
Uucl<»MfiiAl
NSN 7540-01-280-5500 Prescribed by ANSI Std. Z39-18 298-102
USAPPC V1.00
SCHEDULING
GUIDE
FOR
PROGRAM
MANAGERS

January 2000

PUBLISHED BY THE
DEFENSE SYSTEMS MANAGEMENT COLLEGE PRESS
FORT BELVOIR, VA 22060-5565
For sale by the U.S. Government Printing Office
Superintendent of Documents, Mail Stop: SSOP, Washington, DC 20302-9328
11
FOREWORD
This guide provides an introduction to scheduling intended for use by government
program managers and industry program of project managers and their respective staffs.
It is the third version of a 1986 publication prepared by Mr. David D. Acker, Mr. J. Stanley
Baumgartner, and Mr. Michael B. Patterson. A second version, published in 1994, was
prepared by Mr. William W. Bahnmaier and Mr. Paul T. McMahon.

This version addresses many of the topics contained in their earlier versions, especially
those relating to the different types of scheduling techniques. The major difference
between this and the previous versions is the treatment of scheduling as part of the
acquisition process and the overall program management effort, particularly as it relates
to the planning and control functions of program management. Scheduling is discussed
in the context of the development of integrated master plans and schedules, the risk
management process, and earned value management.

This guide is not intended as a detailed treatment of scheduling techniques. Instead, it is


more of a primer on the subject, addressing the importance of scheduling and the
application of basic scheduling techniques. It is a compilation of information from various
sources, and hopefully will serve as a starting point for those who desire to delve deeper
into the various scheduling techniques.

The proliferation of microcomputers has greatly enhanced the capability of managers at all
levels to develop and analyze schedules. Chapter 9 provides an overview of the types of
automated tools available and information on desirable features of scheduling software
applications.

This document reflects the efforts of many people. Mr. William W. Bahnmaier and Mr.
Paul T. McMahon and Lt Col. David Bachman, USAF, of the DSMC faculty provided
invaluable strategic guidance and advice. Mr. Gregory T. Caruth of the DSMC Press was
very helpful in the composition of the guide. SFC Frances M. Battle, USA, provided
desktop publishing skills. Mr. Van Kinney, Ms. Joni Forman and Mr. Tom Parry of the OSD
Acquisition, Resources and Analysis staff provided comments on the draft and overall
support for the project. Special recognition also goes to the Institute for Defense Analysis
team of Mr. Lou Simpleman, Mr. Jim Lloyd, Mr. George Tolis, Ms. Patti Phillips, Ms. Tina
Higgins, and Ms. Yolanda Prescott, who wrote, edited, and prepared the major portions
of the text.

Norman A. McDaniel William W. Bahnmaier


Chair Editor
Program Management and Leadership Program Management and Leadership
Department Department
iii
IV
CONTENTS

Chapter 1 INTRODUCTION 1
1.1 Overview 2
1.2 Purpose of This Guide 2
2
1.3 Guide Content
2
1.4 Other Sources of Data
Chapter 2 PROGRAM MANAGEMENT AND THE ACQUISITION PROCESS 3
2.1 Program Management Overview 3
2.2 The Evolution of Program Management 4
2.3 The Acquisition Process and Scheduling 5
2.4 Risk Management and Scheduling 6

Chapter 3 PROGRAM MANAGEMENT AND SCHEDULING 7


7
3.1 Program Planning and Scheduling
3.2 Work Breakdown Structure 8
3.2.1 Integrated Master Plans/Schedules 10
3.3 Program Controlling and Scheduling H
3.3.1 Earned Value Management H
3.4 Schedule Preparation • 13
3.4.1 Activity Definition 13
3.4.2 Activity Sequencing 14
3.4.3 Activity Duration Estimating 14
3.4.4 Schedule Development 15
3.4.5 Schedule Control 15
i6
3.5 Schedule Risk
3.6 Summary 17
Chapter 4 SCHEDULE TYPES AND THEIR EVOLUTION 19
4.1 Introduction 19
4.2 Schedule Types I9
4.2.1 Gantt and Milestone Charts 19
4.2.2 Network Schedules 21
4.2.3 Production Schedules 23
4.3 Summary 24
Chapter 5 GANTT AND MILESTONE CHARTS 25
5.1 Description 25
5.2 Constructing Gantt and Milestone Charts 31
5.3 Gantt and Milestone Chart Advantages and Disadvantages 32
5.3.1 Advantages 32
5.3.2 Disadvantages • 32
5.4 How and When Gantt and Milestone Charts Are Employed 32
v
5.5 Summary 33

Chapter 6 NETWORK SCHEDULING 35


6.1 Description 35
6.1.1 PERT ZZ'Z'Z 36
6.1.2 CPM or ADM 37
6.1.3 PDM 38
6.2 Network Scheduling Advantages and Disadvantages 40
6.2.1 Advantages 41
6.2.2 Disadvantages 41
6.3 How and When To Network Schedules Are Employed 41
6.3.1 PERT Example 42
6.3.2 CPM or ADM Example 44
6.3.3 PDM Example 45
6.4 Network Scheduling When Resources Are Limited 48
6.5 Summary 51

Chapter 7 PRODUCTION SCHEDULING 53


7.1 Description 53
7.1.1 Objective Chart 54
7.1.2 Production Plan Chart 54
7.1.3 Program Status Chart 56
7.1.4 Line of Balance 56
7.2 How and When To Use the Line of Balance Techniques 57
7.2.1 General 57
7.2.2 Analysis 57
7.3 Line of Balance Advantages and Disadvantages 58
7.3.1 Advantages 58
7.3.2 Disadvantages 58
7.4 Summary 58

Chapter 8 TIME MANAGEMENT 59


8.1 Time Management and the Program 59
8.1.1 Time Reserve 59
8.1.2 "Now" Schedule "I"""".""."".'"" 59
8.1.3 Value of Time 60
8.2 Time Management and the Program Manager 62
8.3 Summary 63

Chapter 9 AUTOMATED SCHEDULING TOOLS 65


9.1 Automated Planning Aids 65
9.2 Functional Characteristics and Features 66
9.3 Evaluating Project Management Software Projects 68
9.4 Finding Out More 70

VI
APPENDIX A INTEGRATED MASTER SCHEDULE 71
77
APPENDIX B TIME ROBBERS
79
APPENDIX C GLOSSARY
83
APPENDIX D BIBLIOGRAPHY

FIGURES
3-1 Generic Aircraft System WBS 9
10
3-2 IMP/IMS Sample
20
4-1 Gantt Chart Example
4-2 Milestone Chart Example 21
22
4-3 Network Schedule Example
25
5-1 Example Gantt Chart Symbols
26
5-2 Example Gantt Chart
27
5-3 Example Milestone Chart Symbols
28
5-4 Example Milestone Chart
29
5-5 Example Combination Chart •
5-6 Gantt Chart with Amplifying Information 30
6-1 Beta Distribution with PERT Time Estimates 37
6-2 Example PDM Relationships/Constraints 39
6-3 Example PDM Constraints with Lag Time 40
40
6-4 Example PDM Activity Node
42
6-5 PERT Example
43
6-6 PERT Example with Slack Time
U
6-7 CPM Example
47
6-8 PDM Example •
6-9 PDM Example—Example and Late Start and Finish Times 47
48
6-10 PDM Example with Lag Time
4
6-11 Network Schedule with Constrained Resources 9
50
6-12 Personnel Loading Chart
51
6-13 Revised Personnel Loading Chart •
6-14 Revised Network Schedule with Constrained Resources 52
7-1 Line of Balance Technique • 55
8-1 Total Cost Analysis for Selecting "Optimum" Program Duration 60
9-1 On-Screen Data Entry Using Gantt Chart Feature
68
(AEC Software Fast Track Schedule)

TABLES
46
6-1 CPM Example Time Estimates
9-1 Project Management Software Functions and Criteria 69

Vll
VUl
1
INTRODUCTION

1.1 OVERVIEW Effective scheduling supports the follow-


ing key program management activities:
In its simplest form, a schedule is a listing
of activities and events organized by time. • Provides the basis for effective com-
In its more complex form, the process ex- munications within the government team
amines all program activities and their re- and with contractors,
lationships to each other in terms of realis-
tic constraints of time, funds, and people, • Identifies a baseline for program status
i.e., resources. In program management monitoring, reporting, and program control,
practice, the schedule is a powerful plan-
ning, control, and communications tool • Facilitates management, and
that, when properly executed, supports
time and cost estimates, opens communi- • Provides the basis for resource analysis
cations among personnel involved in pro- and leveling, exploration of alternatives,
gram activities, and establishes a commit- and cost/time tradeoff studies.
ment to program activities.
On the other hand, poor scheduling can
A key aspect of program management plan- adversely impact a program in a number
ning, scheduling is integral to a program's of areas. Haphazard schedules make it
acquisition strategy and to risk manage- difficult, at best, to determine a realistic
ment, financial, and technical management completion date and to efficiently allocate
plans. In addition, scheduling is an impor- resources to the entire program. This cre-
tant element of the other management func- ates financial problems—escalation of
tions: organizing, staffing, controlling, and costs, increased support costs, delayed
leading. For example, controlling is per- return on investment, funding cuts, or
formed to keep abreast of program execu- program termination.
tion. To achieve this goal, it is necessary to
know whether the program is behind, on, Since scheduling is a powerful planning,
or ahead of schedule, and what adjust- control, and communications tool avail-
ments are necessary to keep the program able for program management, PMs must
on schedule once it's back on track. have a good working knowledge of sched-
uling practices and applications (such as
Why do Program Managers (PMs) sched- Gantt, milestone, and network schedules)
ule? The simple answer is they need a road in order to achieve program goals. PMs
map for all program players. In reality, will not always have to construct detailed
scheduling can accomplish far more than schedules, but they must be able to under-
providing a list of activities and times. stand and analyze schedules created by
others (e.g., contractors) to successfully the various types of schedules and how
manage a program. Since scheduling is an and why they evolved. This chapter is a
intrinsic and indispensable element of the precursor for Chapters 5,6, and 7, which
management process, it is treated within present a more detailed discussion of
the context of program management. the key schedule types. These chapters
focus on Gantt and milestone schedules,
1.2 PURPOSE OF THIS GUIDE network schedules, and production
schedules.
This guide is an introduction to sched-
uling. It is meant for people who already Chapter 8 introduces the concept of time
have some experience in program man- management as it relates to the program
agement and those who seek to learn more and to the PM. Chapter 9 presents the
about the subject. It is not a detailed subject of automated project planning tools
treatment of the subject, but instead, ex- and summarizes some of the desirable fea-
plains how scheduling fits into the overall tures of currently available software prod-
program management effort and how to ucts. In addition to an overview describing
accomplish schedule planning. It also il- the types of automated tools available, this
lustrates different scheduling concepts and chapter provides some suggestions on how
techniques and how they can be applied to find and evaluate the latest products.
and analyzed to manage effectively. Fi- The chapter concludes with a summary of
nally, it is intended as a road map to other information sources that will be useful for
useful and more comprehensive docu- further inquiry.
ments and texts on the subjects of project
management, planning, and scheduling 1.4 OTHER SOURCES OF DATA
that are available in the literature.
As previously noted, this guide is intended
1.3 GUIDE CONTENT as a primer. There is a considerable body of
literature on the subject of scheduling. Much
In order to provide a suitable context for of it is of an academic nature not specifi-
the topic of scheduling, Chapter 2 provides cally keyed to defense acquisition. A num-
an overview of both program management ber of these texts are listed in the Bibliogra-
and the acquisition process and the role phy Appendix of this guide. Additionally,
scheduling plays in each. an enormous amount of relevant informa-
tion can be secured by searching the web
Chapter 3 expands on the role of schedul- using some of the popular search engines.
ing in program management and addresses Of particular use to PMs is the Defense
the following topics: work breakdown Acquisition Deskbook, available on the
structure, integrated master plans and Internet (http: / / www.deskbook. osd.mil).
schedules, and earned value management. The Deskbook includes a database contain-
It concludes with a discussion of schedule ing mandatory and discretionary policy
preparation and schedule risk. documents, Department of Defense and
component discretionary practices, soft-
Chapter 4 introduces the topic of schedul- ware tools and descriptions, front-line wis-
ing techniques with a general discussion of dom and advice, and sample formats.
2
PROGRAM MANAGEMENT AND
THE ACQUISITION PROCESS

2.1 PROGRAM MANAGEMENT For purposes of this guidebook, Program


OVERVIEW Management consists of the planning, or-
ganizing, staffing, controlling, and leading
The Department of Defense (DoD) consid- (POSCL) management functions. Other
ers program management to consist of the functions sometimes included in a pro-
tasks and activities that must be done in gram management context are scheduling,
order to design, develop, field, and sup- budgeting, monitoring, directing, and
port a weapons system. DoD directives maintaining consensus and support. For
describe an Acquisition Program as: "A this guidebook, these latter functions are
directed, funded effort that is designed to considered subcategories of the basic five
provide a new, improved, or continuing functions, when appropriate.
weapons system or automated informa-
tion system (AIS) capability in response to • Planning addresses the program mis-
a validated operational need."1 DoD con- sion, objectives, goals, and strategy and
siders the "program" to include the ele- includes all management activities that re-
ments of the acquisition process, such as sult in selection of a course of action.
the planning, programming, and budget-
ing process, and the design, development, • Organizing considers the resources in-
and production of the system. Practically volved and how are they related. This func-
speaking, a DoD program consists of a tion addresses the alignment of people,
combination of organizational resources, funds, equipment, facilities, etc., and the
assembled to create a weapons system to structure of the organization in order to
meet a specific operational requirement. meet program goals; it identifies:

Four key considerations typically involved - Authority—The power to make final


in a program are: decisions

• Cost to produce the system, - Responsibility—The obligation to per-


form assignments
• Time required to complete the effort,
- Accountability—The state of being
• Capability/technical performance re- answerable for the completion of an
quired to meet needs, and assignment.

• Contribution of the system to the over- • Staffing addresses the qualifications


all defense operational and strategic plans. and special skills that may be required
for persons assigned to each position in felt the need to predict the cost, schedule,
the program and the time phasing of as- and performance of its new systems. Mili-
signments. tary organizations (predecessors of cur-
rent "acquisition" organizations), in conjunc-
• ControHm^isthefunctionduringwhich tion with defense contractors, developed
the manager monitors, measures, evalu- much of the early theory and practices of
ates, and corrects program activities to en- program management as new technolo-
sure that actual operations conform to gies emerged.
plans.
The use of "task teams" or program teams
• Leading is the process whereby one and other organizational entities led to the
individual exerts his/her influence over emergence of a program management phi-
others in a group. Directing, an element of losophy for integrating activity in organiza-
leadership, is the process of implement- tions. As the program management disci-
ing, through the talents of others, the plans pline evolved, organizations developed
to meet program objectives. This includes special techniques for planning, organiz-
training, supervising, delegating, motivat- ing, staffing, controlling, and leading pro-
ing, counseling, and coordinating. grams to integrate those activities from a
focal point in the organizational structure.
In a broad sense, the planning phase in- Moreover, program management ad-
cludes the tasks associated with defining dressed the elements of technical perfor-
the work requirements, specifying the quan- mance, cost, and schedule on a continual
tity and quality of work, identifying re- rather than one-time basis in the evolution
sources, and organizing them to best carry of a program and considered them within
out the program. Likewise, the manage- the context of an organization's operational
ment or execution phase includes the tasks of (short-term) and strategic (long-term)
monitoring progress, comparing actual to objectives.
predicted outcomes, analyzing the impact
of differences between planned and actual DoD has recently improved management
achievements, and adjusting the program with the introduction of the concept of
as necessary. Integrated Product and Process Develop-
ment (IPPD) and Integrated Product Teams
2.2 THE EVOLUTION OF (IPTs). IPPD integrates all acquisition ac-
PROGRAM MANAGEMENT tivities to optimize system development,
production, and deployment. Key to the
Formal program management came to the success of this concept are the IPTs, com-
forefront in the late 1950s. The need to posed of qualified and empowered repre-
develop and implement a management sentatives from all appropriate functional
approach to manage large-scale military disciplines who work together to identify
systems, both weapons and support sys- and resolve issues. IPTs are the founda-
tems, stimulated the government and aero- tion for program management. One of the
space industry to devise the means to plan tenets of IPPD is the use of event-driven
and execute complex programs. As the scheduling, which relates program events
cost of weapons systems increased and the to their accomplishment and accomplish-
intensity of the Cold War grew, DoD also ment criteria. Its use reduces risk by
ensuring that product and process matu- support each milestone decision by de-
rity is incrementally demonstrated prior to scribing activities and events planned for
beginning follow-on activities. the upcoming phase and relating the ac-
complishments of that phase to the
2.3 THE ACQUISITION PROCESS program's overall, long-term objectives.
AND SCHEDULING The acquisition strategy is first formally
approved and published at MSI, Program
For the management of programs, the DoD Initiation. It provides a master schedule for
acquisition process provides a framework research, development, test, production,
that consists of a series of phases and mile- fielding, and other activities essential to
stones. The phases are a logical means of program success. This master schedule
progressively translating broad mission also serves as the basis for formulating
need statements into well-defined system- functional plans and schedules.
specific requirements and ultimately into
operationally effective, suitable, and sur- As a program evolves through subsequent
vivable systems. Each phase is designed, phases, new information becomes avail-
among other things, to manage/reduce the able that permits refinement of schedules
risks, ensure affordability, and deliver the and assignment of resources. Understand-
system to the user as soon as possible. ing of program risk becomes more specific
Milestones are the points in time where as the system under development is de-
decision makers evaluate the status of the fined, thereby allowing identification of
program and determine if the program risk-handling initiatives and their effect on
should proceed to the next phase. Prudent schedule. Schedule considerations are an
consideration of schedule implications is integral part of any Source Selection pro-
important in all phases of a program. cess, from preparation of the Request for
Proposal (RFP) through proposal evalua-
Milestone Decision Authority (MDA) and tion. After contract award, the schedule
Service acquisition officials are encouraged serves as a basis to determine progress and
to tailor programs to eliminate phases or assess the need for management action.
activities that result in little payoff in terms
of fielding time or cost. To effectively Government developers should design their
tailor a program, managers must under- contracts with industry to allow time for
stand scheduling, resource availability and milestone decisions, permit demonstration
allocation, and the risk associated with the of exit criteria in time to support milestone
tailoring. reviews and to reflect expenditure of money
with the program's funding profile. A good
An acquisition strategy defines the busi- acquisition strategy allows fiscal control
ness and technical management approach without delaying the acquisition decisions
to meet objectives within schedule and or contracts while adequately considering
program constraints. A primary goal is to risk. In other words, it reflects thoughtful
minimize the time and cost of satisfying a schedule and resource planning.
valid need, consistent with common sense
and sound business practices. A PM pre- As a key element of the planning proess, PMs
pares a preliminary acquisition strategy at must update the schedule as more is learned
Milestone 0 and updates the strategy to about the program and as changes occur.
With each new update, program cost, time, Risk management and scheduling are
and requirements may change. PMs must closely tied. Consideration of one requires
respond by changing the mix and level of a reassessment of the other. For example,
resources and continuously updating the in creating the strategy and plans to handle
program plan and the schedule as needed. program risk, a PM must con-
sider how the approach affects the pro-
2.4 RISK MANAGEMENT AND gram schedule. Similarly, any tradeoffs
SCHEDULING between cost and performance must take
into account schedule implications. Con-
DoD defines risk management as "the act versely, any change to the program sched-
or practice of controlling risk. It includes ule must consider the impact on the overall
risk planning, assessing risk areas, devel- program objectives and on cost and perfor-
oping risk-handling options, monitoring mance. The challenge is to develop a plan
risks to determine how risks have changed, that balances risk, cost, schedule, and per-
and documenting the overall risk manage- formance.
ment program."2 As part of their responsi-
bility to manage risk, PMs must consider Schedule risk is defined as the likelihood
risk in their planning and scheduling prac- and consequences of failing to meet the
tices. Risk management is concerned with program schedule, and it is an integral part
the identification of uncertainties that of program risk. This topic is covered in
threaten cost, schedule, and performance Chapter 3.
objectives, and the development and imple-
mentation of actions to best deal with those
uncertainties.

ENDNOTES
1
DoDD 5000.1, Defense Acquisition, March 15,1996. (Being revised and updated as of 1 January 2000)
2
Ibid.
3
PROGRAM MANAGEMENT AND SCHEDULING

As discussed in the previous chapters, of the program that functional plans will
scheduling is one of the most powerful lay out in greater detail and reflects the
tools available to the PM, and its effective strategy that will be followed to meet pro-
application is essential to program suc- gram objectives and to handle risk in the
cess. While it is a key element in perform- program. The acquisition strategy in-
ing all program management functions, it cludes a program structure/schedule
is also critical to the accomplishment of which depicts a visual overview and pic-
planning and controlling management ture presentation of the acquisition strat-
functions. This chapter discusses schedul- egy. This schedule is a single diagram
ing in the context of these two functions similar to the diagram shown in Figure 3-3,
and addresses the essential elements and and defines the relationship among acqui-
considerations in schedule planning. sition phases, decision milestones, solici-
tations, contract awards, systems engineer-
3.1 PROGRAM PLANNING AND ing design reviews, contract deliveries, test
SCHEDULING and evaluation activities, production re-
leases, and operational deployment objec-
Program planning is the process of deter- tives. It includes quantities to be procured
mining what needs to be accomplished, by and delivered by fiscal year by phase in
whom, when, and under what resource terms of prototypes, engineering
constraints. It is arguably the most impor- developmemt models, low-rate intitial pro-
tant of the program management functions. duction and full-rate production. The pro-
Without a sound and comprehensive plan, gram structure/schedule is a key decision
it is virtually impossible to develop a mean- review/milestone document; it summa-
ingful budget, effectively organize and staff rizes the program and is built from many
the program office, direct the actions of the other more detailed schedules found in
program office, or monitor and control the functional plans such as test and evalua-
program. In addition to determining the tion, contracting, etc. It is sometimes re-
"what, where, who, with what, and when" ferred to as the Master Program Schedule
of a program, planning also helps to iden- (MPS). In addition to this top level struc-
tify risk areas and ways to handle the risk, ture/schedule, the PM may deem it neces-
and establishes the program baselines. sary to have more detailed program man-
agement Integrated Master Plans (IMP) and
There are a number of products of the Integrated Master Schedules (IMS) pre-
planning process. Among them are: pared and submitted by the contractor
during the proposal process. See the DSMC
• Acquisition Strategy—This is the com- Acquisition Strategy Guide1 for information
prehensive, integrated plan the program on structuring, developing, and executing
will follow. It provides an overall concept an acquisition strategy.
• Functional Plans—These are the de- Scheduling is a critical element in the plan-
tailed plans that lay out the approach to ning process. In addition to being an out-
be taken in the different functional areas. put of the process as discussed above, it
Examples include: the Test and Evalua- also contributes to the development of the
tion Master Plan (TEMP) and Command, other outputs. The early involvement of
Control, Communications, Computers, and people who are knowledgeable and experi-
Intelligence (C4I) Support Plan, which are enced in scheduling techniques can contrib-
required; and the Systems Engineering ute to the effective translation of strategic
Master Plan (SEMP), Logistics Support concepts and ideas into detailed logic dia-
Plan (LSP), etc., which are optional. grams, depicting the program activities
and relationships among activities. This
• Work Breakdown Structure (WBS)— can be very useful in developing budget
The WBS provides a basic framework for and detailed functional plans, especially
identifying each element of a project in in identifying the required resources and
increasing levels of detail. In essence, it leveling them throughout the activities.
describes the way work is performed. The
WBS also provides a coherent method for The WBS and the IMP/IMS are important
reporting progress toward plan goals. concepts used in the scheduling process
and are described in more detail in the
• Integrated Master Plan (IMP)—The following sections.
IMP is an event-based plan depicting the
overall structure of the program and the 3.2 WORK BREAKDOWN STRUCTURE
key processes, activities, and milestones.
It defines accomplishments and criteria for During the 1960s, the impetus to develop a
each event. tool to help project managers define a
project in a cohesive way gave rise to the
• Integrated Master Schedule (IMS)— development of the WBS. WBS use has not
The IMS shows the detailed tasks and been confined to the DoD and its contrac-
timing for events in the IMP and depicts tors; rather, it is now used in many com-
the logical progression of events through- mercial enterprises. Several years after the
out the program. These tasks should be emergence of the WBS concept, DoD pub-
directly traceable to the IMP and the WBS. lished a WBS standard for DoD acquisition
organizations as well as their contractors to
• Schedules—A series of schedules are use: MIL-STD-881B. This standard has
developed during the planning process, been superseded by a handbook, MIL-
all of which are derived from the IMS. HDBK-881, dated 2 January 1998. It con-
These schedules are developed to show tains much of the same information as its
the details required to complete key activi- predecessor but is not directive in nature
ties and milestones. and is for guidance only.

• Budget—The budget reflects the cost MIL-HDBK-881defines a WBS as:


of the integration of the scope, schedule,
and resource plan for accomplishing the • A product-oriented family tree com-
work. posed of hardware, software, services, data,
8
Prime Mission System
Level 1 Level 2 Level 3
Aircraft System Air Vehicle Airframe
Propulsion
A/V Application S/W
A/V System S/W
Navigation/Guidance
Central Computer
Fire Control
Data Display and Controls
Survivability
Reconnaissance
Automatic Flight Control
Central Integrated Checkout
Antisubmarine Warfare
Armament
Weapons Delivery
Auxiliary Equipment
Systems Eng/
Program Mgmt
System Test and
Evaluation Development Test and Evaluation
Operational Test and Evaluation
Mock-ups
Test and Evaluation Support
Test Facilities

Training Equipment
Services
Facilities

Data Technical Publications


Engineering Data
Management Data
Support Data
Data Depository

Peculiar Support Test and Measurement Equipment


Equipment Support and Handling Equipment

Common Support Test and Measurement Equipment


Equipment Support and Handling Equipment

Operational/Site
Activation System Assembly, Installation and
Checkout on Site
Contractor Techincal Support
Site Construction
Site/Ship/Vehicle Conversion

Industrial Facilities Construction/Conversion/Expansion


Equipment Acquisition or
Modernization
Maintenance (Industrial Facilities)

Initial Spares & Initial Spares and Repair Parts


Repair Parts

Figure 3-1. Generic Aircraft System Program WBS

and facilities. The family tree results from needs to go unless the items identified are
systems engineering efforts during the ac- high cost or high risk. In that case, the WBS
quisition of a defense materiel item. should be taken to a lower level of
definition.
• A WBS displays and defines the prod-
uct, or products, to be developed and/or WBS's apply to seven specific categories of
produced. It relates the elements fo work defense materiel systems: aircraft; elec-
to be accoomplished to each other and to tronic/automated software; missile, ord-
the end product. nance; ship; space; and surface vehicle.
The WBS should be developed and main-
• A WBS can be expressed down to any tained based on the systems engineering
level of interest. However, the top three efforts throughout the system's life cycle.
levels are as far as any program or contract
Requirement WBS Elements SOW Task

1 Sys lern Specification 1000 Air Vehicle 3.1 »Vehicle (WBS 1000)
J 1100 Airframe Design, develop, produce
1000 Air Vehicle | mowing and verify, complete air
>■
t >■

1—| 1100 Airframe | i vehicles, defined as airframe



■ propulsion, avionics and
I—| mowing | 11n other installed equipment.

Integrated Master Plan


"
Management Plan Events Accomplishment Criteria
1. Preliminary Design PDR
1.a. Duty Cycle Defined
Review b. Preliminary Analysis Complete

Integrated Master Schedule

v
19XX 19XY 19XZ
Program Events PDR Zi CDR ^
Detailed Tasks
1. Preliminary Design Complete f\. /^
2. Duty Cycle Defined Zh ^

Figure 3-2. IMP/IMS Sample

Figure 3-1 is an example of a level 3 program prepared initially by the contractor and
WBS for an aircraft system. The WBS ap- provides the basis for development of sub-
proach provides a powerful technique for ordinate IMPs and other functional plans.
scoping a project in a manner that provides It also identifies those events and activities
management with insight into project re- that will be included in the IMS.
quirements and performance—from the
very top, or systems level, to the lowest The IMS is a networked multi-layered
level of definition of a work product. Plan- schedule generated by the contractor that
ning work using the WBS approach serves begins with all identified IMP events, ac-
as the basis for both estimating and sched- complishments, and criteria. It shows the
uling resource requirement. expected start and finish dates of these
events. It contains all contractually re-
3.2.1 Integrated Master Plans/ quired events/ milestones such as reviews,
Schedules tests, completion dates, and deliveries
specified in the program WBS.
The IMP is a very effective tool of program
management. It is the contractor's event- The IMP is prepared by the contractor dur-
based plan for accomplishing the State- ing the proposal process. It is maintained
ment of Objectives (SOO) and Statement of by the government program office and con-
Work (SOW). It identifies the key activi- tractor through a collaborative effort in-
ties, events, milestones, and reviews that volving all the program "stakeholders." In
make up the program. A program IMP is some cases, a preliminary IMP may be

10
developed by the government, with indus- can be used by the manager as a basis for
try input, during pre-solicitation. The IMP corrective action. However, considering
defines contract requirements stated in the schedule information alone can be mis-
RFP and contractors use it to develop the leading. Successful management requires
IMS and detailed functional schedules. the integration of the technical, schedule,
These integrated schedules tie together all and cost aspects of a program. Thus, some
program tasks by showing their logical form of integrated performance measure-
relationships and any constraints control- ment is needed for monitoring and control-
ling the start or finish of each task. This ling a program. The concept of earned value
process results in a hierarchy of related management provides such a capability.
functional and layered schedules derived
from the WBS that can be used for monitor- 3.3.1 Earned Value Mangement
ing and controlling program progress. An
example (suggested format) of an IMP/ Earned Value Management (EVM) is the
IMS for an aircraft development program use of an integrated management system
is depicted in Figure 3-2. The IMS should that coordinates work scope, schedule, and
be expanded down to the level of detail cost goals and objectively measures pro-
appropriate for the scope and risk of the gress toward these goals.2 The purpose of
program. Programs with high risk should EVM is to provide contractor and gov-
show more detail in the IMS to provide the ernment PMs with accurate data to moni-
visibility necessary to manage risk. A more tor program execution. It is also intended
detailed discussion of IMS's is contained in to provide an adequate basis for sound
contractor and government decision mak-
Appendix A. A Data Item Decription (DID)
ing by requiring that the contractor's inter-
has been developed by the Department of
nal management control systems produce
Defense for the IMS; the identification num-
data that: (1) indicate work progress; (2)
ber is DI-MISC-81183A. This DID is at Tab 1 properly relate cost, schedule, and techni-
to Appendix A. cal accomplishments; (3) are valid, timely,
and able to be audited; and (4) provide
3.3 PROGRAM CONTROLLING DoD component managers with informa-
AND SCHEDULING tion at a practical level of summarization.
The controlling function contains all those The DoD earned value process holds the
activities that a program manager under- contractor responsible for effective imple-
takes in attempting to ensure that the ac- mentation of an EVM system. DoD does not
tual program conforms to the developed prescribe a specific EVM system for con-
plan, to include the implementation of nec- tractors to use; instead, it has established a
essary action to get the program back on set of criteria that the contractors' systems
the plan if possible. To control a program, must meet to be acceptable. The require-
the PM needs the means to monitor pro- ment to use an EVM system that meets the
gram progress against the established plan, criteria is dependent on the type and size
or the program baseline. In its simplest of the contract. DoD Regulation 5000.2-R
form, the program schedule can serve as a defines the contracts that must use such an
baseline against which to measure progress. EVM system as well as the criteria for an
If there are indications that an activity is acceptable system. For contracts that do
falling behind schedule, this information
11
not meet these thresholds, contractor man- Analysis of these data points over time
agement information is provided to the also identifies trends that may affect or
government using a Cost/Schedule Status impact the future performance for the re-
Report (C/SSR). This report should be mainder of the contract. This is important;
based on an underlying management sys- it enables PMs to isolate causes of recur-
tem that uses an earned value approach for ring variations and to take alternative ac-
tracking progress. Such a system does not tions that will improve performance. Quan-
have to meet the EVM criteria of DoD titative techniques can also be applied to
5000.2-R; however, the government should EVM data to predict program performance
negotiate with the contractor to ensure that at completion in terms of cost and sched-
the system does emphasize earned value ule. The DSMC EVM Textbook* provides
methodology. detailed information on the application of
EVM techniques.
Basically, earned value relates resource
planning to schedules and to technical per- Success of EVM techniques is dependent on
formance requirements. All work (identi- several things, not the least of which is
fied in the Program and Contract Work effective and accurate contractor schedul-
Breakdown Structures) is planned, bud- ing. EVM system criteria do not require
geted, and scheduled in time-phased contractors to use specific scheduling tech-
"planned value" increments constituting a niques. However, they do seek formality,
performance measurement baseline. As consistency, and discipline throughout the
work is performed, it is "earned" on the scheduling process. The contractor's sched-
same basis as it was planned, e.g., in bud- uling system:
geted dollars or labor-hours. Planned value
[budgeted cost of work scheduled (BCWS)] • Provides a summary or master sched-
compared with earned value [budgeted cost ule and related subordinate schedules
of work performed (BCWP)] measures the showing vertical traceability from the mas-
dollar volume of work planned versus the ter to the detailed schedules
equivalent dollar value of work accom-
plished. The difference, if any, is termed • Identifies key milestones and activities
the "schedule" or "accomplishment" vari- and indicates significant constraints and
ance. Earned value (BCWP) compared relationships
with the actual cost of the work performed
(ACWP) provides an objective measure- • Provides current status and forecast of
ment of cost performance. Any difference completion dates of scheduled work that
is called the cost variance. enable comparison of planned and actual
status of program accomplishments
The three data points—BCWS, BCWP, and
ACWP—are outputs of the EVM system and • Establishes a schedule baseline
are provided to the government ona monthly
basis. They, along with the schedule and cost • Provides horizontal traceability show-
variances, provide the basic information ing interrelationships among various ac-
needed to determine program status at a tivities.
given time, and to identify the elements that
are driving each of the variances.
12
The scheduling baseline usually consists more detailed schedule information. The
of a hierarchy of vertically integrated schedule for the out-year phases will be
schedules, with each lower-level sched- adjusted based on the most current infor-
ule more fully identifying and expanding mation. However, this should not be taken
the tasks necessary to meet the program's as a license to make easy changes in the
objectives. Generally, three sets of sched- schedule. Every effort should be made to
ules are prepared: maintain the original schedule.

• Master Schedule (MS)—The top-level In all programs, there will always be a


schedule that summarizes key program requirement to make tradeoffs between
activities and milestones and depicts the cost, schedule, and performance. Cost in-
logical progression of events throughout a cludes all resources—people, money,
contract. Program Structures/Master Pro- equipment and facilities. Performance in-
gram Schedules developed by the govern- cludes quality and supportability param-
ment PM reflect information contained in eters. The best schedule supports the best
the contractor's Master Schedule. tradeoff between these competing de-
mands, taking into account the risks that
• Intermediate Schedules—The sched- are associated with each tradeoff and the
ule that ties the MS to the detailed sched- impact on the overall program.
ules. It allows for rollup of detailed sched-
ules to summary levels that are useful for The preparation of program schedules
management. should be done within a formal structure.
The procedures to be followed should be
• Detailed Schedules—The schedules at specified, to include such things as soft-
the control account or work package level. ware applications to be used, the formats
Work packages must be distinguishable for displays, and the type of symbols to be
from each other and must include definite used. Also, clear lines of authority and
start and completion dates. They are pre- responsibility should be established. The
pared by the contractor with government remainder of this section discusses the logi-
concurrence. cal steps that should be followed in pre-
paring schedules, to include sources of
3.4 SCHEDULE PREPARATION information, tools and techniques, and the
outputs of the steps. These steps are based
As stated earlier, scheduling is a critical on those described in the Program Man-
element of the planning process. Con- agement Institute's Guide to the Program
versely, planning is critical to the devel- Management Body of Knowledge.* While they
opment of effective schedules. Near-term present a somewhat different approach
scheduling can and should be accom- than the IMP/IMS method, they have ge-
plished in sufficient detail to support neric applicability over the range of plan-
management at each level. Far-term, or ning methods.
rolling-wave, scheduling will be less pre-
cise, accounting for the alternative paths 3.4.1 Activity Definition
that the program may take. As the pro-
gram approaches each phase, the sched- This step involves the identification and
ule for that phase will be fleshed out with definition of those activities that must be
13
accomplished to achieve the objectives. There are several inputs to this step:
The WBS is a logical source for such • The activity list developed in the activ-
descriptions. If a WBS is not available, ity definition step,
more planning must be done in order to
identify project activities clearly. Other • The product description and character-
inputs to the definition step are the pro- istics,
gram scope, historical information, pro-
gram constraints and assumptions, and • Mandatory constraints/dependencies,
events required by the Planning, Program- such as the fact that a prototype must be
ming, and Budgeting System (PPBS), the fabricated before it can be tested,
requirements generation system, and DoD
acquisition management process. • Discretionary constraints/depend-
encies developed by the program manage-
Decomposition and templates are tech- ment team based on "best practices" or
niques commonly used in activity defini- specific sequences desired by management,
tion. Decomposition involves the succes-
sive breakdown of program elements into • External dependencies, such as avail-
smaller, more manageable components, ability of test sites, and
which eventually describe the activities to
be scheduled. This technique is essen- • Other constraints and assumptions.
tially the same used in WBS development.
A template is an activity list or WBS ele- A number of tools and techniques are use-
ment from another similar program that ful in developing the logic diagrams that
can serve as a model for the current pro- reflect the desired activity sequencing.
gram and provide a starting point for de- They include various network scheduling
fining specific activities. techniques that are discussed in Chapters 4
and 6. In addition, a number of scheduling
The primary output of this step is the activ- software programs develop activity se-
ity list, which should contain a complete quencing. Their selection and use are dis-
description of each of the activities neces- cussed in Chapter 9.
sary to complete the program. This list
should be linked to the WBS, which should The output of this step is a network dia-
be reviewed and revised/clarified as nec- gram that reflects the sequence of activities
essary to incorporate changes resulting based on the inputs described above. This
from the activity definition process. Sup- diagram should be augmented with a
porting details for each activity, such as narrative description of the sequencing ap-
constraints and assumptions, should also proach and a detailed discussion of any
be developed and documented. unusual or complex sequences. Activity
lists should be reviewed and revised to
3.4.2 Activity Sequencing reflect any changes necessitated by activity
sequencing.
This step involves the accurate identifica-
tion of constraints /relationships among ac-
tivities and establishing the order in which
the activities will be accomplished.
14
3.4.3 Activity Duration Estimating activity. An iterative process, schedule
development takes into account activity
Activity duration estimating is the determi- sequencing, duration estimates, resource
nation of the time required to complete the requirements and availability, calendars
activities that make up the program. This that show when work can be performed,
is one of the most difficult aspects of sched- constraints, assumptions, and risk.
ule development and should be performed
by people who are most familiar with the The output of this step is a set of sched-
activity. Two key inputs to the estimation ules for the program. These include the
process are the resources required and as- master program schedule and the support-
signed for the activity and the capabilities ing detailed schedules, which should re-
of the resources assigned. Historical infor- flect the best balance possible between com-
mation from other programs and from com- peting demands of time and resources.
mercial databases can also be helpful in They should also take into account the risk
developing accurate estimates. associated with time, cost, and performance
tradeoffs and the impact on the overall
The following techniques are commonly program.
used in estimating activity durations:
A number of techniques and tools are useful
• Expert judgment guided by historical in developing schedules, many of which are
information, contained in various scheduling software
applications. Many of these applications
• Analogous estimating based on expe- contain the capability to perform various
rience of similar programs, types of mathematical analyses to calculate
theoretical start and finish dates for each
• Parametric estimating based on formu- activity based on the overall sequencing of
las describing relationships among pro- the program activities. Two of the more
gram parameters and time, and commonly known analysis techniques are
critical path method (CPM) and the Pro-
• Use of simulation to develop distri- gram Evaluation and Review Technique
butions of probable duration of each (PERT). They are discussed in greater
activity. detail in Chapter 6.

The output of this step is an estimate of the Other scheduling development techniques
likely amount of time to complete each that are commonly used focus on schedule
activity. These estimates should also in- development in light of resource (time,
clude a range of possible values, e.g., 3 people, funds, material) constraints. These
weeks ± 1 week, and a clear statement of techniques provide the means to manage the
the assumptions made in the estimation affect of these constraints through the com-
process. pression of activity duration and the leveling
of resources throughout activities. Schedule
3.4.4 Schedule Development compression and resource leveling are dis-
cussed in more detail in Chapter 6.
This step involves the development of
realistic start and finish dates for each
15
3.4.5 Schedule Control change control system can also serve as a
good database of lessons learned. Conse-
The final step in the schedule preparation quently, information concerning sched-
process is to identify schedule variations and ule variations, their evaluation, and the
to manage actual changes to the developed development of corrective actions should
schedules. A schedule change control sys- be documented and made readily avail-
tem that defines the procedures by which able to members of the program's man-
changes can be made should be established agement team, and to other programs.
and integrated into the program's overall
change control system. The schedule 3.5 SCHEDULE RISK
change control system should address such
things as the methods of schedule perfor- In Chapter 2, we discussed the relation-
mance tracking and the approval process ship between risk management and pro-
for authorizing changes. The need for sched- gram scheduling. In this section, we dis-
ule changes can be caused by a number of cuss the risk associated with the program
factors, to include: schedule. Uncertainty exists in every
schedule. It is impossible to predict, with
• Failure to achieve planned dates for complete confidence, the length of time
specific activities or events, necessary to complete an activity, meet a
milestone, or deliver a system. Little in-
• Internal program management assess- formation exists in the early phases of a
ment and replanning, and program, and planners must rely on per-
sonal experience and the estimates of ex-
• External direction, such as reallocation perts. As a program progresses through
of funding. the acquisition cycle, more information
becomes available. Schedules developed
When evaluating these factors, it is im- in the latter phases of a program are based
portant to determine what, if any, sched- on more information and analyses, but
ule change is necessary. For example, if they still lack complete certainty. Uncer-
an activity that is not on the critical path is tainty introduces the element of risk in the
planning process. Schedule risk is the
not completed as planned, it may not have
likelihood of failing to meet schedule plans
any effect on the overall program sched-
and the effect of that failure.
ule. Consequently, it may not require any
significant schedule change. When creating a schedule, or when deter-
mining overall program risk, the PM must
The schedule change control system assess the risk associated with the sched-
should also include procedures for imple- ule. One technique for assessing this sched-
menting schedule changes. Such proce- ule risk involves estimate contributions
dures should address the requirement to for each activity's duration and aggregat-
keep all program stakeholders, especially ing these distributions using a Monte Carlo
the users, advised of any significant sched- simulation or other analytical tools. The
ule changes. They should also address the resulting program-level schedule is then
process for adjusting the schedule baseline analyzed to determine the actual sched-
and the overall program plan when neces- ule risk and to identify the schedule risk
sary schedule changes are severe. The drivers.
16
This technique uses a range of times that it planning phase, it contributes to the
will take to complete each activity instead development of detailed functional plans
of single-point estimates. This approach and budgets and to identification and allo-
results in a more realistic estimate of sched- cation of required resources throughout
ule risk because it accounts for much of the program activities. During this phase is
uncertainty inherent in the use of single- developed a set of integrated multi-lay-
point estimates. Their use invariably leads ered schedules that tie together all pro-
to underestimating the time required to gram activities, showing their logical rela-
complete the program and, therefore, tionships and any constraints. The level of
schedule overruns, primarily because the detail developed for these schedules de-
point estimates do not adequately address pends on program scope and risk. This
the uncertainty inherent in the individual process provides a hierarchy of functional
activities. and layered schedules that can be useful in
monitoring and controlling program
This range of values for each activity de- progress.
fines a probability distribution for the du-
ration of the activity. These distributions Effective program control depends on some
are then combined to determine the pro- form of integrated cost, schedule, and tech-
gram-level schedule estimate. This ap- nical performance management, such as
proach enables PMs to estimate early in a the earned value management system
program if there is a significant likelihood (EVMS). Effective scheduling is key to the
of overrunning the program schedule and success of this technique. EVMS criteria do
by how much. It also identifies program not dictate the use of specific scheduling
activities that are on the "highest risk path." techniques. However, they do seek for-
mality, consistency, and discipline
This technique can be used in any acqui- throughout the scheduling process.
sition phase beginning with the comple-
tion of the first statement of work. The A five-step process for schedule prepara-
schedule probability distribution function tion that is commonly used in program/
for each key activity should be developed project management includes:
as soon as the activity is included in the
master schedule. The distribution func- • Activity definition,
tions should be periodically reviewed and
revised, if necessary, at least once per phase. • Activity sequencing,

The technique should be applied by a small • Activity duration estimation,


government-industry team consisting of
schedule analysts and technical experts • Schedule development, and
who understand the significance of previ-
ous risk performance assessments. See the • Schedule control.
DSMC Risk Management Guidebook5 or the
Defense Acquisition Deskbook, Section 2.5.2.46 Risk is inherent in all programs, and sched-
for more details on the application of this uling is one element of risk. Uncertainty
technique. introduced in estimating the duration of
each activity causes most schedule risk.
3.6 SUMMARY PMs must assess the likelihood of failing
to meet schedule plans and the impact of
Scheduling is critical to the successful exe- that failure. Probabilistic techniques have
cution of the planning and controlling proven to be very useful in conducting
functions of program management. In the these assessments.
17
FY93 FY94 FY95 FY96 FY97 FY98 FY99 FYOO FY01 FY02 FY03 FY04 FY05 FY06
Milestones
& Phases CM PDRR

1
^NGR& MANUFDEV
A0 ~[
A
PRODUCTION

# of Kr's LRIP
A:
IOC
(An example)

Final RFP
Release
(Acq. Strategy
A
PDRR PROD
EMD Disposal/
Approval) Demil
Contract
Award
A
CE/D
A PDRR
A
EMD
A
PROD
Technical
Reviews
A A
ASR SRR
A
SFR
A A A AA
PDR CDR PRR PCA PRR
AAM
Prototype Fly-Off
Al ^A-A
DT/OT DT&E LFT&E
Testing
Deliveries EOA|
EOA
AA
OA IOT&E FOT&E
Funding: (eng dev models) EDM I LRIP Production

*MDA usually approves advance procurement for LRIP.

Figure 3-3. Program Schedule/Structure (Example)

ENDNOTES
1
Defense Systems Management College, Acquisition Strategy Guide, Fort Belvoir, VA, January 1998.
2
Defense Systems ManagementCollege, Earned Value Management Textbook, Fort Belvoir, VA, April 16,1998,
3
Ibid.
4
ftogramMamgementlnstitute,AGuictetotheProgramMamgemm
1996.
5
Defense Systems Management College, Risk Management Guidebook, Fort Belvoir, VA, May 1999.
6
Information on schedule risk techniques is in the Risk Assessment Techniques of the Front Line Wisdom
& Advice portion of Section 2.5.2.4, Defense Acquisition Deskbook.

18
4
SCHEDULE TYPES AND THEIR EVOLUTION

4.1 INTRODUCTION • Events or milestones, that take place at


a point in time, such as a Defense Acquisi-
Previous chapters of this guide stress the tion Board (DAB) milestone review.
point that scheduling is an intrinsic, indis-
pensable part of program management and Dependencies or constraints among activi-
a key output of the planning function of ties or events.1
that process. They also describe the rela-
tionship between the program Work Break- Currently, four types of schedules are in
down Structure and scheduling, and intro- common use and depict the categories of
duce the concepts of the Integrated Master information described above. They are the
Plan and the Integrated Master Schedule. Gantt or bar chart, the milestone schedule/
Properly prepared and accurate schedules chart, the network schedule, and the pro-
are invaluable tools in the overall manage- ductionschedule. The evolution, character-
ment of programs. They provide a road istics, and uses of each of these schedules
map of where the project is going, the are described in the following paragraphs,
resources required to accomplish the vari- and a more detailed treatment of each of
ous project tasks, a means to determine them is contained in subsequent chapters.
progress, and an effective way to present
status information. This chapter contains 4.2.1 Gantt and Milestone Charts
information on the various types of sched-
ules generally in use today, their character- Gantt charts and milestone charts are nor-
istics, advantages and disadvantages, and mally combined to show a program's sched-
how they have evolved. Subsequent chap- ule; therefore, they are discussed in this
ters provide more detailed information on context. The Gantt chart is used to provide
each of the schedule types, along with in- informationconcerningactivities. Itis com-
formation on the selection and use of monly referred to as a bar chart, since it
scheduling software. depicts an activity as a horizontal bar im-
posed over a time-line, or calendar. It
4.2 SCHEDULE TYPES shows the planned start and finish dates
for the activity and may provide informa-
Schedules can be presented in a variety of tion about task progress, including sched-
ways. Regardless of how they are dis- ule slips or gains. Figure 4-1 is an example
played, schedules essentially convey in- of a simple Gantt chart that shows the
formation concerning one (or a combina- planned schedule for four activities.
tion) of the following categories: Progress in accomplishing each activity
can be shown on each of the bars, as shown
• Activities or tasks to be accomplished by the shaded portions of activities 1 and 2.
over a period of time, and
19
The Gantt chart was the first formal sched- improving its utility. The Gantt chart is
uling technique developed. It dates back very useful in reporting project status and
to the early 20th century when Henry L. in managing individual activities or simple
Gantt first introduced it while working at projects with few tasks.
the Frankford Arsenal during World War
I. It was developed to provide a more Subsequent to the development of the Gantt
formal and systematic way to schedule chart, planners and managers used a simi-
tasks when time was an imprtant factor. lar approach to depict information about
significant project events, focusing on spe-
The Gantt chart has survived in its basic cific points in time. These events repre-
form to this day and continues to be sented project milestones—hence the in-
widely used as a scheduling tool at all troduction of the milestone chart. The mile-
levels within organizations. Its value stone chart shows when an event is sched-
lies in its simplicity and its ability to uled and when it is actually accomplished.
convey considerable information in a Figure 4-2 is an example of a milestone
clear and concise manner. In the past, the chart showing the status of four events;
principal shortcoming of the traditional each of these events represents the comple-
Gantt chart was its inability to clearly tion of the four activities shown in the
depict dependencies or constraints example Gantt chart in Figure 4-1.
among activities, making it difficult to
analyze schedules and optimize the allo- Like the Gantt chart, the strength of this
cation of resources to the activities. Some milestone chart as a scheduling technique
scheduling software programs now make lies in its relative simplicity and its ability
it possible to show relationships, thereby to concisely display project information,

Activity Jan Feb Mar Apr May Jun

|
«■
L:,
Identify User Requirements

Identify Performance Requirements 1 7

Identify Interface Requirements A^ \/


1
Prepare SW Requirements Spec 1 A v
1
Legend 1
1
Planned A V
Actual ^H
1
1
Now
Figure 4-1. Gantt Chart Example

20
Event Jan Feb Mar Apr May Jun

User Requirements Identified

Performance Requirements Identified

Interface Specs Identified A

SW Requirements Spec Completed

Legend

Planned A
Actual A

Figure 4-2. Milestone Chart Example

especially at the "big picture" level. How- Perhaps the biggest shortfall of the Gantt
ever, it does have shortcomings that limit and milestone charts is that neither of
its effectiveness in day-to-day project man- them, nor the combination of both, allow
agement. As shown in Figure 4-2, the mile- detailed schedule analysis. However,
stone chart can depict the events corre- every PM must know and understand
sponding to the completion of an activity. Gantt and milestone charts for two simple
reasons: everybody uses them, and nor-
However, it does not reflect the progress in mally, one of the first steps in the planning
accomplishing the activity. In this case, a process is to construct a schedule using a
manager relying on this milestone chart Gantt chart.
information could be surprised if the
planned completion date is not achieved. 4.2.2 Network Schedules
With no warning or indicators of schedule
slippage, the manager loses any flexibility Network scheduling was developed to
in attacking the underlying problems caus- overcome the primary shortcoming of the
ing the slippage. This shortcoming can be Gantt and milestone charts—the inability
compensated for by the addition of interme- to clearly portray the relationships, depen-
diate events or through the use of combined dencies, and constraints among the project
Gantt and milestone charts. This is discussed activities and events. A network schedule
in more detail in the next chapter. is a graphical display of a project, includ-
ing a representation of these relationships.
Another weakness of the milestone chart is Figure 4-3 shows an example of a network
the difficulty to clearly visualize the schedule for a simple project.
relationships, dependencies, and con-
straints among the various project/pro-
In this example, the lines represent project
gram activities and events. In spite of these
activities A through H; the nodes repre-
shortcomings, the milestone chart can be
an effective way of presenting the project sent the events associated with the begin-
or program status at higher levels of man- ning and end of the activities. The net-
work shows the following constraints
agement review.
21
Figure 4-3. Network Schedule Example

among the activities: activity A must be was being applied to large, complex pro-
completed before activities B, C, or D can grams. The first major network schedul-
begin; B must be completed before E can ing technique developed was the Pro-
begin; F cannot begin until D is completed; gram Evaluation and Review Technique,
G cannot begin until C and E are done, and or PERT, which was used as a manage-
H cannot begin until F and G are com- ment tool for scheduling and controlling
pleted. In addition to showing this type of the Navy's Polaris missile program. PERT
sequencing constraints, network schedules enables managers to visualize the entire
can also show the time and resources program, see interrelationships and de-
planned for each activity and thus provide pendencies, and recognize when and
managers with a mechanism to monitor where delays are acceptable. One of the
and control the project. A later chapter key features of PERT is the use of prob-
covers network schedules in detail. ability techniques to develop a set of time
estimates for each program activity, mak-
The advent of network schedules can be ing it particularly well-suited for pro-
traced back to the 1920s and the evolu- grams where it is difficult to make accu-
tion of operations research. Analysts re- rate estimates with high confidence. Con-
alized the inability to depict dependen- current with the development of PERT,
cies and constraints was a major short- the construction industry developed a
coming of existing scheduling techniques, network scheduling system based on the
and attempted to solve the problem concept of critical path. A project's criti-
through the application of network theory. cal path is the most time-consuming route
The translation of this theory into a usable through the network activities that must
scheduling tool was hindered by the in- be completed in order to finish the project.
ability to process network-related data This approach, named Critical PathMethod
in a timely fashion. The development of (CPM), was designed to focus on perfor-
the computer provided the means to au- mance time and total program cost. Some
tomate this data processing and, by the publications refer to CPM as the Arrow
1950s, the concept of network scheduling Diagram Method (ADM).
22
PERT and CPM scheduling techniques have In spite of the strengths of network schedul-
many similarities. For example, each shows ing techniques, there are some limitations.
the relationships among activities and The value of network schedules is directly
events, both include the projecf s critical dependent on the validity of the time esti-
path, and the structure of each allows analy- mates for each activity. In addition, it is
sis of the tasks to be done, resources as- sometimes difficult to accurately portray
signed to do them, and the time associated all activities and relationships, especially
with each task. Both techniques use nodes to for very large, complex programs. Thus,
represent events (beginning and end of ac- considerable "up front" work is required
tivities) and lines to represent the activities. to develop an effective network schedule.
Detailed networks, once developed, tend
A third network scheduling technique is the to be the focus of management attention
Precedence Diagram Method (PDM), which when, in fact, there will undoubtedly be
was developed subsequent to the PERT/ other factors not on the display that will
CPM techniques. Its function is to permit a require management attention.
more accurate depiction of relationships
among various activities than is possible 4.2.3 Production Schedules
using the other two techniques. PERT/
CPM techniques are essentially limited to Production scheduling involves the plan-
"finish-start" relationships (i.e., activity B ning, execution, and control of repetitive
cannot start until activity A is completed). activities, such as the manufacture of a
The PDM technique can depict other rela- large number of identical items. Efficient
tionships that permit a more accurate and production requires the proper balance of
realistic portrayal of the program's activi- materials, facilities, and personnel skills. It
ties, such as "start-start" (i.e., activity B also requires a means to monitor the
cannot start until activity A starts). The production process.
technique accomplishes this through the
use of nodes to depict activities and lines to The Line of Balance (LOB) technique, while
depict relationships. These three techniques not truly a scheduling tool, is such a moni-
are discussed in greater detail in Chapter 6. toring technique that can provide early
Network scheduling techniques provide warning of potential problems that can
managers with a powerful tool for schedul- affect program schedule. It is especially
ing and controlling their programs /projects. useful for monitoring repetitive processes
In general, they permit the graphic por- where it is essential to balance inventory
trayal of project activities and relationships acquisition with the production process
among the activities. This provides the and delivery requirements. The LOB tech-
basis for determining the project's critical nique consists of four elements: (1) objec-
path, predicting shortages, and identifying tives of the program, i.e., contract sched-
possible reallocation of resources to solve ule and actual deliveries; (2) production
problems. Through the use of readily avail- plan; (3) current program status or inven-
able software, network schedules are fairly tory; and (4) a comparison between where
easy to update and rework, thus providing the program is and where it's supposed to
managers with current program/project be, (that is, program inventories versus
status information and control over activi- the LOB). These elements are discussed in
ties and schedules. more detail in Chapter 7.
23
The origin of LOB is not clear, but it is the method that allows them to meet their
believed it was developed to help manage goals. The choice of schedule type depends
defense-related contracts in the 1940s and on a number of factors, such as, the purpose
50s. It is still used today in both defense and of the schedule, its intended use, and the
commercial industry. While government decisions to be made from the information
PMs or their staffs will probably not need to presented. For example, day-to-day man-
directly develop or apply the LOB tech- agement of a project consisting of a number
nique, they should understand it and real- of related and complex activities may re-
ize that it can be a valuable tool for contrac- quire a schedule that depicts the tasks, their
tors to monitor the status of production planned duration, dependencies, progress,
contracts and to present status information. and resources allocated to each of them. If
a PM must do detailed schedule analysis of
This technique can point out problems be- this type of project, then the PM will most
fore their impact on finished product deliv- likely use a network schedule. This method
eries shows up, thereby allowing managers is the only way to use probability distribu-
to make corrections. It also allows manag- tions for time estimates rather than complet-
ers to see, in the middle of a contract, whether ing an activity and project in a certain time.
they can meet the contract schedule if they
continue working as they have been. An- On the other hand, the management of a
other advantage of LOB is that it focuses single activity may require a schedule that
attention on the production activities where reflects only the time planned for accom-
there are problems, thereby facilitating ini- plishing the task and the current status.
tiation of corrective action. Schedules showing only events, such as the
completion dates of planned activities, or
There are some limitations with the LOB bar charts may be sufficient in those cases
technique. First, it is best suited for produc- when the audience may not be concerned
tion and/or assembly-type processes that with the details of the activities.
are stable. The activities that make up the
production plan must be definable and well As a rule of thumb, Gantt and milestone
understood. Second, while this technique charts are useful to present information and
pinpoints where a problem exists, it cannot summarize program activities. They are
identify the specific problem. also usually the starting points for detailed
planning and creating a network schedule.
4.3 SUMMARY Network schedules are usually created for
detailed planning and analyses. They are
Each scheduling method has strengths and necessary to determine the feasibility of
limitations. Program Mangers must be fa- meeting program goals, assessing risk, and
miliar with all of the techniques and choose conducting sensitivity analyses.

ENDNOTES
1
Quentin W. Fleming, John W. Bronn, and Gary C. Humphries, Project and Production Scheduling, Chicago,
IL, Probus Publishing Co., 1987, p. 45.

24
5
GANTT AND MILESTONE CHARTS

5.1 DESCRIPTION There is no standard set of Gantt chart sym-


bols. Planners should define them and con-
As discussed in Chapter 4, the Gantt chart sistently use them throughout the chart. Fig-
is one of the oldest planning tools in ure 5-1 shows an example of the symbols that
existence and is still used today at all could be used in Gantt charts.
levels of project management. For ex-
ample, PMs use Gantt charts to report The schedule is displayed as a series of hori-
information concerning program activi- zontal bars representing the duration of ac-
ties at milestone decision briefs, while tivities. Amanagermayshowactual progress
engineers may use them to manage the against the schedule by shading in each bar
tasks associated with design activities. as activity progresses or may use a colored
Because PMs often use Gantt and mile- bar that is parallel to the schedule bar. Figure
stone charts to report information to re- 5-2 shows a simple Gantt chart that illustrates
view groups, they are treated jointly in activities involved in developing components
this chapter. of a weapons system. This type of display
canbeusefulforconveyinginformationabout
In its simplest form, a Gantt chart is a the program to those involved in its review
schedule that shows the start/stop dates or those charged with its day-to-day man-
of a program's individual activities. It agement.
uses symbols superimposed on a calen-
dar to provide information about the From this example, we can see that as of late
original plan, the status of the activity, March, the design, fabrication, and assembly
and any forecasted changes to the plan. of the payload are ahead of schedule, [A].

Symbol Meaning

K 57 Planned activity schedule

Status of activity

K 3?:.y Forecasted completion behind schedule

K 3^_V Forecasted completion ahead of schedule

Figure 5-1. Example Gantt Chart Symbols

25
N

1 [A] [B]
1 1

Payload Assembly A_
■ V[A1[C1
Test & Rework
1
1
A Y
Guidance & Control
Design
I
I

Guidance & Control A 'v""y[D][Ei


Fabrication
j
i
i
Guidance & Control XZ::_T [E]
Assembly

Guidance & Control


Test & Rework
A v
System Integration A V
System Test & Rework A A7

Now
Figure 5-2. Example Gantt Chart

Based on this information, and an analysis of the guidance and control subsystem is
of the activities, the PM has revised the not going as well as planned. As of late-
planned completion date for the payload March, the fabrication is well behind sched-
fabrication, [B]. In analyzing the current ule, [D]. After reviewing the progress and
status, the PM has determined that much of remaining work, the PM has slipped the
the work in payload assembly will have to planned completion dates for the fabrica-
be done toward the end of the planned tion and assembly activities, [E]. They be-
activity period. (In other words, the work lieve that it is too early to revise the planned
is not uniformly distributed throughout completion dates for test and rework, and
the period.) Thus, even though this activity the system integration and test activities.
is ahead of schedule now, the PM has However, the slippage already experienced
decided not to revise the planned comple- should serve as a warning that this entire
tion date for assembly and test, [C]. This development effort may be in trouble and
Gantt chart also shows that development will require close monitoring.
26
While the Gantt chart focuses on activities The important thing is that the symbols be
and their duration, the milestone chart fo- clearly defined and consistently applied.
cuses on planned significant events sched-
uled to occur at specific times in the pro- Figure 5-4 shows an example milestone
gram. Such events could be the initiation chart for the program described in the
or completion of a particularly important Gantt chart in Figure 5-2. Note that events
or critical activity, equipment deliveries, displayed correspond to the beginning of
reviews, or approval dates. Like the Gantt some activities and the completion of all of
chart, the milestone chart uses symbols them. Other events displayed represent
imposed on a calendar to provide informa- important occurrences and key decision
tion about planned and actual completion points within each of the activities, e.g.,
dates and any revisions to the milestone preliminary and critical design reviews,
schedule. There is no standard set of sym- "make or buy" decision, etc. In this ex-
bols for milestone charts. Figure 5-3 shows ample, we see that as of late-March pay-
the symbols prescribed for reporting mile- load design has progressed on schedule,
stone information within the Air Force [A], and that planned completion date for
Material Command. Different scheduling fabrication has been revised ahead of the
software will often use unique symbols. original schedule, [B]. As discussed in the

Standard symbols have been adapted for Air Force milestone


schedules. The most common symbols used and their meanings are
shown below.
Basic Symbol Meaning

Schedule Completion

Actual Completion

Previous Scheduled Completion—Still in Future

Previous Scheduled Completion—Date Passed

Representative Uses Meaning

Anticipated Slip—Rescheduled Completion

± u Actual Slip—Rescheduled Completion

4 * Actual Slip—Actual Completion

1 Actual Completion Ahead of Schedule

* 0 Time Span Action

u o Continuous Action

Figure 5-3. Example Milestone Chart Symbols

27
J F M A M J J A S 0 N D

Payload Design
Begin Payload Design t V
Payload Preliminary Design Review (PDR) t
Payload Critical Design Review (CDR) i
Complete Payload Design

Payload Fabrication
Make or Buy Decision
Tooling Complete \ r [B]
Fabrication Complete ft 0
Assemble Payload
Begin Assembly t
Delivery of Parts Complete ft
Assembly Complete 1>
Payload Test & Rework
Test Plan Complete i
Test Readiness Review
Test & Rework Complete ft

Guidance & Control Design


Begin G&C Design
G&C PDR
G&C CDR
\
V
Complete G&C Design \

Fabricate G&C
Make or Buy Decision 1 hg
Tooling Complete t [D]
Fabrication Complete 0 0
Assemble G&C
Begin Assembly t [D]
Delivery of Parts Complete 0 ft [D]
Assembly Complete 0 ft

Test and Rework


Test Plan Complete ir
Test Readiness Review i k

Test & Rework Complete ft

Integrate Payload and G&C


Begin Integration ft
Complete Integration ft

Test & Rework


Test Plan Complete
Test Readiness Review \r
Test & Rework Complete ft
Now
Figure 5-4. Example Milestone Chart
28
M M o

Payload Design

Payload Preliminary Design Review (PDR)


Payload Critical Design Review (CDR)
Complete Payload Design 7ft
Payload Fabrication

Make or Buy Decision


Tooling Complete
Fabrication Complete I a 0
Assemble Payload T
Delivery of Parts Complete ft
Assembly Complete ft

Payload Test & Rework K


y
Test Plan Complete ft
Test Readiness Review ft
Test & Rework Complete ft

Guidance & Control Design

G&C PDR
G&C CDR
Complete G&C Design \

Fabricate G&C

Make or Buy Decision


Tooling Complete
Fabrication Complete
s o
V. y

ft
Assemble G&C
1
Delivery of Parts Complete O ft
Assembly Complete o ft

Test and Rework K


3
Test Plan Complete
Test Readiness Review
Test & Rework Complete
4 I
System Integration Payload and G&C A:
3
Complete Integration FQ"
System Test & Rework
K. y
Test Plan Complete ft
Test Readiness Review ft
Test & Rework Complete ft

Figure 5-5. Example Combination Chart


29
4-»

S ®
» O)
O T # ^o ^P
5 o O CO
3 o
1— O
O)
o
1—
■""
CD
CO o
•5
o
^9
o

■*< o o o
(0 o o o o o
o o o o_ o o
Ü o" o_ CM" N."
en
T— a>~ T— T— en o o
CO CO CO to CO CO CO

♦4
® o o O o o o o
Ol o o O o o o o
■o o o O o o o CD
3 o o CM CO T— LO CM
m T-
CO co «O «o «O CO eo
c
o
(D
CM
> <>♦
E
0>
Y"
0>
0)
^_
3
"5 c
CM
T- > <

Q.
IO
E
< <
Pb
oo
CM
N>_
1
O)

c
3
CM

^1
ka
1
LI
<p
.cto
O
c
J
"3 (0
O
ri>_

r-
b J (O
in
o
i_
3

O)
CO CO
James

O) c
>>
Peter

CD
Chris

■« <E eco
w E CO a)
All

< 2 -3 a. <
o
CD
5 o
o
my mi erface

Reqiuiremtsnts S|

CD
O)
E _c CO
Requirements

CO
requ ireme nts

CO
>- B
perform an ce

z 10 CD
requireme nt

.22 o O CD C
c X
Preptare S'

a) CD 5 O CO CD
Software

■> E -!2 Q. = E
Identify

Review

t CO
Ü £ .E .5 «3 o >< "53
< -a
requ
Iden

'S « o
DC en CL CO 2
DC CL

30
As discussed in the Gantt chart example, activity, is a standard feature of the par-
there are problems in the fabrication of the ticular program used to create this Gantt
guidance and control subsystem. One of chart.1 The Assignment, Cost, and Cost/Bud-
the events selected as a milestone was the get ratio columns are not standard features
completion of the tooling necessary for but were added to the database to demon-
fabrication. From the example, we see that strate how the charts may be customized to
this event experienced an actual slip of meet individual needs. Note that the user
approximately one month, [C]; this, in turn, may create computation fields, such as the
has caused the Program Manager to revise percentage and totals fields shown in the
the scheduled completion dates for fabri- figure.
cation, parts delivery, and assembly, [D].
5.2 CONSTRUCTING GANTT AND
Managers rarely use pure Gantt or mile- MILESTONE CHARTS
stone charts. Normally they integrate the
information from these charts and display Gantt and milestone charts are relatively
it in a combination chart. Such a chart can easy to construct when compared to the
be useful in displaying the planned and complexity of network charts. The first
actual duration of activities using the Gantt step is to decide the level at which the
chart symbols and in monitoring the project is to be planned, tracked, and re-
progress for completing key events in these ported. This decision should consider such
activities using the milestone symbols. Fig- things as the needs of the entire project
ure 5-5 is a combination chart showing the team, and the degree of risk associated
activities and events described in Figures with the various program activities. Most
5-2 and 5-4. likely there will be a need to manage and
track at a low level and report at a higher
Whereas the simple Gantt, milestone, or level. Current scheduling software has the
combination charts may be suitable for capability to handle activities at various
reporting program status, most managers program levels allowing insight and man-
need additional information to plan, moni- agement at the lower levels and permitting
tor, and control activities. New software roll up of information at higher levels for
applications increase the utility of these reporting purposes. To accomplish this,
charts by making it easy to add informa- charts must be developed in a logical and
tion, such as budget, cost, resources, etc. consistent manner.

Today's programs use databases to store The next step in constructing the charts is
related schedule information and then al- the identification of activities and mile-
low users to filter, sort, and display infor- stones to be displayed, tracked, and moni-
mation in a variety of ways. They also tored. The WBS should be used as the
allow users to tailor the software to their primary source for this identification. If a
needs by adding customized information WBS is not available, or if it does not go
to the database. Figure 5-6 shows how to down to the necessary level, additional
display the relationship of one activity with planning must be done to clearly define
another by drawing lines between related and identify activities to be managed,
activities. The Budget column, in which the tracked, and reported. Other sources for
manager enters the budgeted cost for the identifying activities and events include
31
the Acquisition Strategy, the Acquisition 5.3.2 Disadvantages
Program Baseline, the Risk Management
Plan, and the Integrated Management Plan, (1) Difficult to use for detailed sched-
and the Integrated Management Plan. ule analysis

5.3 GANTT AND MILESTONE (2) Do not show the effects of late or
CHART ADVANTAGES AND early activity starts
DISADVANTAGES

Gantt and milestone (or combination) charts (3) Do not represent dependencies
provide a simple, effective means to present among activities as well as other schedul-
project information, and a way to monitor ing methods
and control smaller projects. Using these (4) Do not reflect the uncertainty in the
charts as scheduling tools has many advan- planned activity duration or event date
tages, but also limitations that should be
understood. These pros and cons are pre- (5) Only as reliable as the estimates on
sented below. Evolving scheduling soft- which they are based; looking at the chart
ware includes features that overcome some doesn't indicate which estimates are the
of the shortcomings to varying degrees. most reliable

5.3.1 Advantages (6) Do not allow quick or easy explora-


tion of the consequences of alternative ac-
(1) Simple to prepare and update, tions.

(2) Information portrayed in easily un- 5.4 HOW AND WHEN GANTT AND
derstood format, MILESTONE CHARTS ARE
EMPLOYED
(3) Relatively inexpensive to prepare
using software tools, Gantt and milestone charts are best used
for displaying the planned activities and
(4) Relate activities and calendar dates, events of a project and the progress in
meeting them. This makes them very use-
(5) Easy to roll up information into sum- ful for presenting schedule and program
mary form, status information in a concise simple for-
mat at such things as programor activity
(6) Useful first step for preparation of reviews.
more complex type schedules
Because of its simplicity and ease of inter-
(7) Reliable estimates canbe developed pretation, it is a particularly good tool for
when the work is repetitive and when the communicating to higher management
product is easy to measure quantitatively. when information must be presented

32
quickly and efficiently. These charts may 5.5 SUMMARY
also be sufficient for management and con-
trol of simple projects. However, they As scheduling tools, Gantt and milestone
have limited utility for managing more charts provide a simple and effective means
complex projects, since they do not easily for displaying actual versus planned
capture interrelationships among activi- progress of a program and for showing
ties and events or reflect the uncertainty schedule changes that have occurred. The
associated with time and resource esti- major drawback of Gannt and milestone
mates. Generally, they do not provide the charts is the limited degree fo detail and
level of information necessary for the effec- dependency information they can portray.
tive monitoring and control of such projects. However, recently developed software
scheduling applications now make it pos-
sible to show more of the relationships
among project activities and events.

33
ENDNOTES
This figure is an adaptation of sample charts from Fast Track Schedule sample charts.

34
6
NETWORK SCHEDULING
6.1 DESCRIPTION Accomplishingthese things may requirethat
can be delayed) without affecting the over-
Driven by the increase in project complex- all scheduled completion date for the pro-
ity, managers developed the need for bet- gram?
ter schedule and control methods than those
provided by Gantt and milestone charts. • Among program tasks, where should
The shortcomings of these charts gave rise management efforts be concentrated at any
to network scheduling. Over time, differ- particular time?
ent applications of network theory were
developed to address the needs of manag- Networks are a graphical portrayal of the
ers. Today, essentially three networking activities and events of a project. They show
techniques are in use: the Program Evalu- how each activity relates to others in the
ation and Review Technique (PERT); the project, the sequence of activities, and the
Critical Path Method (CPM) [these two need to perform some tasks before others.
techniques are also known as Arrow Dia- Figure 4-3 is an example of an ADM net-
gram Methods (ADM)] and the Precedence work schedule. Networks also facilitate the
Diagram Method (PDM). Each is discussed determination of the impact of early or late
later in this chapter. starts or finishes, provide information about
the allocation of resources, and allow man-
All of these techniques provide the man- agers to do "what if" analyses. With this
ager with powerful tools to plan, analyze, information, managers may view the status
monitor, and control the project and to of the plan, analyze progress, and evaluate
manage the resources necessary to accom- alternatives.
plish project tasks. They can help the man-
ager answer the following questions: To apply these networking techniques, the
following conditions must exist:
• When is each activity or task of the
program scheduled to begin and end? • All program activities must be clearly
defined, including identifiable start and
• Which activities must be finished on completion points.
time to avoid missing the scheduled pro-
gram completion date? • A logic diagram showing the sequence
and interrelationships of activities must be
• Can resources be shifted to critical parts developed.
of the program (those that must be com-
pleted on time) from noncritical parts (those • The time to complete each activity must
considerable effort and the involvement of be estimated as accurately as possible.
35
people familiar with the overall project and The expected time, t is the weighted aver-
those responsible for executing various age, or mean time, for an activity based on
groups of activities. This up-front effort the beta distribution and is determined
provides an understanding of project re- from the following formula:
quirements and early identification of a + 4m + b
potential problem areas. t=

6.1.1 PERT Using the expected times and other statis-


tical properties of the beta distribution for
In 1958, the U.S. Navy introduced the con- each activity, determine an expected time
cept of network scheduling techniques by for completion of the project and the likeli-
developing PERT as a management con- hood (probability) that it will be met. It is
trol system for the development of the also possible to determine the critical path
Polaris missile program. The focus of PERT for the project—the most time-consuming
was to give managers the means to plan path through the network activities and
and control processes and activities so the events to project completion. Any delay
project could be completed within the speci- will delay the completion of the project.
fied time period. The Polaris program in-
volved 250 prime contractors, more than PERT is most useful when it is difficult to
9,000 subcontractors, and hundreds of either accurately estimate the time required
thousands of tasks. for project activities or to determine the
percentage of work accomplished within
PERT was introduced as an event-oriented, an activity. The percentage of work accom-
probabilistic technique to increase a PM's plished can be especially important when
control in projects where time was the criti- analyzing the adequacy of resources ap-
cal factor and time estimates were difficult plied to an activity. Projects best suited for
to make with confidence. The events used PERT are one-of-a-kind complex programs
in this technique represent the start and that involve new technology or processes
finish of the activities. PERT uses three and research and development.
time estimates for each activity: optimistic,
pessimistic, and most likely. From these Following the success of the Polaris pro-
estimates, an expected time is calculated gram, PERT became widely used through-
based on a beta probability distribution for out the systems acquisition community, to
each activity. The developers of PERT chose include attempts to combine it with cost
the beta probability distribution because it data or other nonscheduling aspects of pro-
could accommodate nonsymmetrical situ- gram management. As a result, PERT be-
ations. They assumed that the probability came so cumbersome that the cost of main-
of an estimate being too optimistic would taining it far outweighed the benefit. Con-
not be equal to the probability that the sequently, the use of PERT declined and,
same estimate would be too pessimistic. by the 1970s, it was only occasionally em-
That is, if estimated times could be com- ployed in defense system programs. Over
pared against actual completion times in a the last few years, it has again become
number of cases, the variation would look relatively popular, particularly in the pri-
like the curve in Figure 6-1. vate sector. This resurgence is due, in part,
to the development of PERT software or

36
Probability
of Meeting
Schedule

Most Most Most


Optimistic Likely Pessimistic
Time Time Time

Figure 6-1. Beta Distribution with PERT Time Estimates

other networking software programs that Although CPM and PERT are conceptu-
can be run on microcomputers. ally similar, some significant differences
exist, most as a result of the type of projects
In spite of misuses that have occurred in best suited for each technique. As discussed
PERT applications, the technique can be a earlier, PERT is better to use when there is
very useful tool because it enables the man- much uncertainty and when control over
ager to visualize the entire program, see time outweighs control over costs. PERT
interrelationships and dependencies, and handles uncertainty of the time required to
recognize when delays are acceptable. complete an activity by developing three
Thus, the manager is better able to assess estimates and then computing an expected
problems as the program evolves. time using the beta distribution. CPM is
better suited for well-defined projects and
6.1.2 CPMorPERT activities with little uncertainty, where ac-
curate time and resource estimates can be
The CPM scheduling technique was intro- made, and the percentage of completion of
duced at approximately the same time as an activity can be determined. In CPM,
PERT. 'It was developed by J. E. Kelly of because of the greater certainty, a single
Remington-Rand and M. R. Walker of time estimate is used. This estimate is the
DuPont to aid in scheduling maintenance time planned for the activity under normal
shutdowns in chemical processing plants. conditions; it approximates the most likely
Over the years, CPM has enjoyed more use time estimate in PERT. The normal cost
than any other network scheduling tech- estimate is the cost associated with finish-
nique. It is based on the concept of critical ing the program in the normal time. A
path and was designed to focus on the time second time and cost estimate, the crash
and resources, particularly cost, necessary estimate, is also used in the CPM tech-
to complete the activities of a project. nique. The crash time estimate is the time

37
that will be required to finish an activity if start of an activity is the slack or float. The
a special effort is made to reduce program critical path contains no slack or float time.
time; crash cost is the cost associated with For PERT, the difference between the earli-
performing the effort on a crash basis so as est event time and the latest event is the
to reduce the time to completion. This is slack /float time.
discussed in more detail with a later ex-
ample. The use of these procedures is illustrated
in a later example.
CPM is activity-oriented, concentrating on
activity start (early start, late start) and 6.1.3 PDM
finish times (early finish, late finish);
whereas PERT is event-oriented, concen- PDM is an activity-oriented technique that
trating on early event time and late event was developed subsequent to PERT and
time. The network diagrams used for CPM CPM. The impetus behind this develop-
and PERT are essentially the same (see ment was the need for greater flexibility in
Figure 4-3), as are the procedures for using dealing with relationships and constraints
them. As discussed earlier, certain actions between project activities. PERT/CPM, or
are essential to applying network schedul- the arrow diagram method (ADM), essen-
ing techniques. The activities/events com- tially treats all relationships as "finish-to-
posing the project, the relationships among start" constraints; that is, Activity A must be
them, and their time estimates must be completed before Activity B begins. There
identified, and a network diagram devel- are ways within PERT/CPM to circumvent
oped. Once the diagram is completed, the this limitation, but they are cumbersome
following procedures are applied: and add more complexity to the technique.

• Complete and annotate the cumulative The PDM technique provides the capability
time required to reach each node along the to treat other types of relationships that
paths—this will indicate the earliest time occur in complex projects. Figure 6-2 shows
work can start on the next activity. The final examples of these types of relationships or
number will indicate total time required to constraints.
complete a particular path.
In addition to depicting different rela-
• Identify the critical path—this is the tionship between activities, PDM also
sequence of events, or route, taking the handles time lags that would normally oc-
longest time to complete. cur as the project progresses. Examples of
such lags are the time required for the move-
• Starting at the program completion node ment of parts or components from one activ-
on the right side of the diagram, begin ity site to another, or the timeinvolved in the
working backward and compute the latest reallocation of resources—people, equip-
time an activity can start without delaying ment, and facilities. Figure 6-3 shows ex-
the overall program—for example, if the amples of constraint lags and how they can
total program takes 40 weeks and the final be depicted. These lags could be repre-
activity requires 5 weeks, this activity can- sented as activities in either ADM or PDM
not begin later than week 35. For CPM, the techniques, but this could add needless
difference between the latest and earliest complexity to the schedule.
38
Symbols Constraint

Finish-to-Start .
A Hfffl B cannot start until A is finished-
normal PERT/CPM constraint

A Finish-to-Finish
i1 B cannot finish until A is finished

ABB Start-to-Start
B cannot start until A starts
— w B'

A
Start-to-Finish
B cannot finish until A is started
1r (Rarely used)

äÄ
Percent Complete
-»WU 1
/ u vt> —
Remaining 40% of B cannot be
+ 40% started until 70% of A is completed

*ilHBi
Figure 6-2. Example PDM Relationships/Constraints

PDM uses the same underlying principles lines represent the activities and the rela-
as the other networking techniques: clearly tionship/constraints. Activity time and
defined activities, accurate time estimates, resource estimates are normally shown on
critical path, etc. The difference between the lines. In PDM, the nodes represent the
PERT/CPM/ADM and PDM is in the way activities and are normally shown as rect-
the network is portrayed. In PERT/CPM, angles. Activity identifiers, time and re-
the network nodes represent the events as- source estimates, early and late start and
sociated with activities (i.e., the beginning finish dates, and other appropriate infor-
and end of activities), and the connecting mation are normally shown in the boxes.
39
Figure 6-4 is an example of an activity 6.2 NETWORK SCHEDULING
node. The lines connecting the nodes rep- ADVANTAGES AND
resent the relationships between the activi- DISADVATAGES
ties, e.g., finish-to-start, start-to-start, etc.
The use of PDM is demonstrated later. Network scheduling techniques provide
the mechanisms necessary to conduct a

Symbols Constraint

Lag + 5 days Finish-to-Start with Lag


B cannot start until 5 days after A
is completed

A
Start-to-Start with Lag
B cannot start until 7
Lagnh 7 days days after A has started
^
w B

Lag - 5 days Finish-to-Start with Negative Lag


B B cannot start until 5 days before A
is completed

Figure 6-3. Example PDM Constraints with Lag Time

Early Start Time Early Finish Time


7/12/99 7/14/99

Duration
3 Days

Activity Identi fication


Informati on

Resource
Requirements
Late Start Time Late Finish Time
7/14/99 7/16/99

Figure 6-4. Example PDM Activity Node


40
systematic, disciplined, and thorough re- • Sometimes difficult to portray graphi-
view of what will be required to conduct cally—too many lines, nodes and intersec-
and complete a project. Such an approach tions.
is essential for large, complex projects and
is also useful in managing smaller, less • Not particularly good for conveying
complicated projects. The advantages and information in briefings/reviews.
disadvantages of these techniques are iden-
tified below. • Complex networks, once sketched out
on a large wall chart, tend to become the
6.2.1 Advantages focus of management attention when, in
fact, a manager should be paying attention
• Provide graphical portrayal of project to factors not on the chart, such as manage-
activities and relationships/constraints, ment/labor relations.
• Force communications among team
members in identifying activities, 6.3 HOW AND WHEN NETWORK
SCHEDULES ARE EMPLOYED
• Organize what would otherwise be con-
fusing material, making it easier for man- Network scheduling techniques canbe very
agers to make tradeoffs and develop alter- useful in complex projects that involve
native plans, new technologies or processes and that are
• Provide capabilities to evaluate progress not repetitive, such as production. They
and control project, are not particularly easy to use for presen-
tations because of their complexity; how-
• Allow managers to predict shortages ever, they can be used as the basis for other
and act on them early, scheduling techniques that are more suit-
able for presentation of information, i.e.,
• Once prepared, permit easy update and Gantt or milestone charts.
rework,
Government managers may not use net-
• Give managers more control over ac- work techniques in the day-to-day man-
tivities/events and schedules, agement of their programs. However, they
should have an understanding of the tech-
• Facilitate "what if" exercises, niques to ensure that contractors are using
• Provide the basis for Gantt and mile- them when appropriate.
stone chart information, and
The different types of network scheduling
• Show resources associated with techniques have many similarities. How-
activities and time. ever, each of them provides different types
of information that can be useful to manag-
6.2.2 Disadvantages ers in evaluating progress, developing
alternatives, and managing the allocation
• Network construction can be difficult of resources within their projects. The fol-
and time consuming. lowing examples show the types of infor-
mation resulting from each technique and
• Only as sound as the activity time and
how managers may use them.
resource estimates.
41
6.3.1 PERT Example fore, contain activities that can be com-
pleted before they are required. Therefore,
Figure 6-5 shows a PERT network for a delays along these paths may not result in
project containing 8 activities (A-H), with delays in project completion. In the above
the nodes 1-7 representing the beginning example, critical path activities, D and G,
and end of the activities. The three time will require 17 weeks to complete. On path
estimates discussed earlier in this chapter A-B-E-H, activities B and E will require 5
are shown for each activity. For example, weeks to complete. Thus, there will be 12
for Activity A, the time estimates are opti- weeks of slack along that path. Actually,
mistic time=l week, most likely time=2 this slack is only along path B, E since A
weeks, and pessimistic time=3 weeks. The and H are on the critical path. Likewise
expected time estimate for each activity, t, path C-F has 10 weeks of slack time. This
as derived from the formula associated concept of slack time, sometimes called
with Figure 6-1, is also shown. From this float time or path slack/float, is important
information, the project critical path can be because it allows managers to reschedule
computed by adding the time estimates activities not on the critical path to use
along all paths leading to project comple- resources efficiently.
tion. In this example, the critical path is
determined as follows: The following description of how slack
time is computed is intended to illustrate
Path A-B-E-H=2+3+2+4=ll weeks the concept that managers can use it to their
Path A-C-F-H=2+4+3+4=13 weeks advantage. Fortunately, software programs
Path A-D-G-H=2+8+9+4=23 weeks compute slack time and managers do not
have to make these calculations.
Thus, path A-D-G-H is the critical path
since it requires the greatest time. Any Slack time should be computed for each
delay along this path will cause a delay in activity in the network. One way of doing
project completion. The other paths are this is by comparing the earliest time an
shorter than the critical path and, there- activity can begin, TE, to the latest time the

^K
(2,3,4) y \ (1,2,3)
\F1=2

(T\ A
(^s c
-®-
F
Tft H

W (1,2,3) ^ (2, 3, 4) >& (3, 4, 5)
t=2 \ t=4 t=3 / t=4

(7, s, grv >"(8,9, 10)


1=8 > ' t=9
vlT

Figure 6-5. PERT Example


42
activity can begin, TL. The difference is the the critical path so its value of TL (shown on
activity slack time. For all activities on the node 3) is the difference between TL at node
critical path, TEand TL have the same value. 6 and the time estimate for Activity E,
To determine the values of TE and TL for TL=19-2=17. The activity slack is the differ-
each activity, start with the node represent- ence between Tc and T. at each node. For
ing the beginning of the first activity and Activity E, the slack is TL-TE=17-5=12 weeks.
assign it a value of TE=TL=0. Follow the This activity could start anytime between
critical path and add the activity time esti- weeks 5 and 17 without any adverse
mate to the value of TE of the preceding impact on the critical path. Activity B is not
node to get the value of TE for the next on the critical path so its value of TL is the
node. For example, the node at the comple- difference between TL at node 3 and the
tion of Activity A and the beginning of time estimate for Activity B (17-3=14). This
Activity D has a value of TE=TL=2. Figure is not shown at node 2, since that node also
6-6 shows how TE and TL can be depicted represents the start of Activity D, which is
on a network chart. Continue along the on the critical path. The slack for Activity
critical path to node 7, which has a value of B is TL-TE=14-2=12. (The same approach is
TE=TL=23, the time required to complete used to determine the slack for Activity C.)
the project. Next, compute the values for Slack is not additive along a path; it must
TE for the remaining activities and nodes be shared by all activities on the path.
not on the critical path. The value of TE for Thus, if Activity B starts at week 5 instead
node 3 is the value of TE from node 2 (TE=2) of week 2, Activity E would have only 9
plus the duration of Activity B; for node 3, weeks of slack available. Similarly, Activi-
T =5 ties C and F have a slack of 10 weeks.

To determine the latest starting times for The concept of slack and TE and TL can be
each activity, begin at the completion of the very useful to managers, providing the
project and work backward through the basis for resource allocation and also pro-
activities. Since Activity H is on the critical viding the means to determine the prob-
path, its value of TL=19. Activity E is not on ability of meeting the project schedule.
TE=5
TL=17
ß}
(2,3,4) y \ (1,2,3)
t=3R/ \£t=2
TE=0 TE=2 TE=6 ^v TE=19 T6=23
TL=0 TL=2 TL=16 \T,=19 TL=23
c F H
W (1,2,3) ^^v (3, 4, 5) (2,3,4) J&
m (3,4,5)
(^
^
t=2 N. t=4 t=3 / t=4

(7, 8, 9)\ >^(8,9,10)


> r
t=8 t=9
X§7
TE=10
TL=10

Figure 6-6. PERT Example with Slack Time


43
This latter topic is beyond the intended • Earliest time the activity can start, ES
scope of this guidebook; however, a num-
ber of available books provide detailed • Earliest time the activity can finish, EF
discussion of the application of PERT
techniques. (See the bibliography in Ap- • Latest time an activity can start, LS
pendix D.)
• Latest time an activity can finish, LF.
6.3.2 CPM or ADM Example
To compute ES, start at the first activity and
As discussed earlier, PERT and CPM/ move forward through the network paths.
ADM are conceptually similar, in that both The earliest Activity A can start is at t=0.
techniques use the same type of network The earliest that it can finish is ES plus the
structure, and are the concepts of critical activity duration; thus for A, ES=0 and
path and slack time. The following ex- EF=2. The earliest start for subsequent ac-
ample will be used to illustrate basic ap- tivities is the EF of the preceding activity.
plication of the CPM/ADM technique. For Activity B, ES=2. The earliest finish
time for each activity is the earliest start
Figure 6-7 shows the same project as used time plus the activity duration. For Activ-
in the PERT example, with the single time ity B this is EF=2+3=5. When activities
estimates for each activity. Table 6-1 shows converge, such as E, F, and G at node 6, the
the time and crash estimates for each of the earliest starting time for the next activity is
activities. the latest value of EF of the preceding
converging activities.
The critical path for the CPM approach is
determined in the same way as in the PERT To compute the latest times, make a back-
example. While the concept of slack time ward pass through the network, beginning
is essentially the same as in PERT, it is with the last activity. The date to begin the
normally calculated in a different manner pass can be either an established required
using four different values for each activity: date or the early finish date for the project

XIX

r^ A (ES=0, EF=2) ^X C (2, 6) (J) F(6,9) \- H(19,23) ^


^ 2(LS=0, LF=2) ^v 4(12,16) ^ 3(16,19) y*y 4(19,23) ^

3^> &y&

Figure 6-7. CPM Example


44
completion. The latest starting date for the and a new project completion date. They
final activity is determined by subtracting can then use the new forecast dates to
the activity duration from the date used to determine action that can be taken and the
begin the pass. For subsequent activities, appropriate resource planning and reallo-
the latest finish date is the same as the latest cation, if necessary.
starting date for the preceding activity. In
the backward pass, the value of LF for an The CPM technique provides managers
activity that precedes a set of diverging with the means to investigate ways and
activities in the network (activity A in the impacts of speeding up, or crashing, the
example) is the earliest of the values of LS schedule. As part of the planning process,
of the diverging activities (B, C, D). a set of crash estimates should be devel-
oped if possible. The estimates for this
The values of ES, EF, LS, and LF for all example are shown in Table 6-1.
activities are shown in Figure 6-7. With this
information, one can determine the slack This table shows the time and cost esti-
for each activity. Slack is determined using mates and the crash cost per week. To crash
the following formula: a schedule, some key points must be
considered:
Slack=LF-EF=LS-ES.
• Crash only along the critical path.
The relative certainty of time and resource
estimates enables managers to determine • When an activity is shortened, one or
the percent of work completed in each more new critical paths may emerge. Paral-
activity as the project progresses. Being lel critical paths increase risk dramatically.
able to estimate the percent of completion
provides managers with the means to re- • Generally, least additional cost is the
distribute resources if an activity is falling criterion used to select which activity to
behind schedule. For example, if an activ- crash, but other considerations (e.g., per-
ity has fallen behind schedule, it is possible sonnel hours) could be used.
to estimate the work remaining and the
cost of applying additional resources to In this example, assume that the project
complete the activity on schedule. must be crashed by 4 weeks at the least
additional cost. Looking at the activities on
Network scheduling techniques, particu- the critical path, select the one with the
larly CPM, used on projects with relatively lowest weekly crash cost; in this case it is
certain time and cost estimates can provide Activity D, which can be crashed from 8 to
managers with information to effectively 6 weeks for an additional $6,000. Next,
manage their projects. Using percent of crash Activity G by 2 weeks at a cost of
work completed or that remaining on on- $10,000. Reducing both of these activities
going activities, they can compare the does not change the critical path.
progress at a certain time with the original
plan. Based on this information, they can 6.3.3 PDM Example
develop revised time and cost estimates for
these activities and forecast new start and The PDM technique focuses on program
completion dates for remaining activities activities and the meaning of the constraints
45
Time Required Cost Crash
Cost Per
Activity Normal Crash Normal Crash Week
A 2 1 10,000 16,000 6,000
B 3 2 12,000 17,000 5,000
C 4 3 12,000 18,000 6,000
D 8 6 20,000 26,000 3,000
E 2 - 11,000 - -
F 3 2 14,000 19,000 5,000
G 9 7 25,000 35,000 5,000
H 4 3 16,000 23,000 7,000

Table 6-1. CPM Example Time Estimates

among activities. This technique is used in work with these values, using the activity
many scheduling software applications, format shown in Figure 6-4. Using the
and it relies on the same concepts—critical formula for slack,
path, slack time, etc., as the other network
scheduling techniques. Slack=LS-ES=LF-EF,

Figure 6-8 shows a PDM network for a we see that on path B-D-G-I, activities B, D,
project with Activities A-I. Note that Activ- and G each have a slack of 3 weeks. This
ity B cannot start until Activity A starts, and slack is not additive; if Activity D starts at
Activity D cannot end until Activity C ends. week 8 vice week 7, then Activity G has only
The critical path is determined in essen- 2 weeks of slack remaining. We also see that
tially the same way. In PDM, however, one Activities B, E, and H have 3 weeks of slack
must account for the different types of con- on their path. If Activity B uses 3 weeks of
straints; e.g., Activity D cannot be com- slack, none will be left for either path.
pleted until Activity C is finished—in this
case, 9 weeks. The critical path for this Another concept that can be useful is that of
example is determined as follows: lag time. Lag time reflects the time required
to transition from one activity to another,
Path A-C-F-I=5+4+5+3+17 weeks such as machine set-up time or movement
Path B-D-G-I=4+(2+3)+2+3=14 weeks of material, parts, or components from one
Path B-E-H-I=4+5+2+3=14 weeks site to another. It can be shown on the net-
work and must be accounted for in deter-
Thus, Path A-C-F-I is the critical path. mining critical path and values of ES, EF, LS
and LF. Figure 6-10 shows that in moving
The slack times for the activities are deter- from Activity D to Activity G, there will be
mined in the same way as in the CPM a lag of 1 week. The figure also shows the
technique, using earliest and latest start effect of this lag time on the earliest and
and finish times, ES, EF, LS, LF. Earliest latest start and finish times. The resulting
times are computed by making a forward slack for Activities D and G is now 2 weeks.
pass through the networks paths, and lat- This example shows that the PDM tech-
est times are determined making a back- nique provides considerably greater flex-
ward pass. Figure 6-9 shows the PDM net- ibility in handling different types of
46
5 4 5
'W w c
n > \j
r

> f
4 2 2
V. ~w "W
r D r D r G

W
"w i
3

^
r
5 2
E ■w, H
> r

Figure 6-8. PDM Example

1 5 6 9 10 14

5 5 5
^ ^
A r C F

1 5 6 9 10 1<1
1 4 1
5 9>l> 10 11

4 2 2

"w B D ^ G
> r r
15 17

4 7 11 3
12 13 14 >
r I
fi Q -in 11 v
r
ES EF 5 2 is
Duration
> C H

1-3
8 12 14
LS LF

Figure 6-9. PDM Example—Early and Late Start and Finish Times

47
1 5 6 9 10 14
5 4 5
^ r* c
A
r r

1 5 c) 10 14

1 i. 9> f 10 11
4 2 2
V LAG+1 ^
■^

> D r D ^ G
15 17

4 7 11 > 3
12 13 14
r I
4 Q Q 11 v
r
5 2 15 17
> E V
> H

8 12 13 14

Figure 6-10. PDM Example with Lag Time

constraints than does ADM. Consequently, • Reducing the scope of the program
it is better suited for in complex projects,
particularly those with a lot of parallel Adjusting the schedule to accommodate
activities and constraints other than finish- the resource shortfall. In this section, we
to-start. show how network schedules and the con-
cepts of critical path and slack (float) can be
6.4 NETWORK SCHEDULING WHEN applied to make better use of limited re-
RESOURCES ARE LIMITED sources. Figure 6-11 shows a PDM net-
work with activities A through J. Each
In the previous discussion, the assump- node of the network shows the number of
tion was that a new activity could start as
soon as any constraints were satisfied be- people required to complete the activity
cause sufficient resources were available along with the activity duration and
to perform the work. In practice, however, earliest and latest start and finish times.
resources to proceed are not always avail-
able. To determine adequacy of resources
(people in this example), assume each ac-
In those situations, PMs can take one or tivity will start as early as possible and
more different actions to reduce the ad- determine the resource requirements over
verse impact on the program. time. Figure 6-12 shows personnel load-
ing requirements by time for the duration
Those actions include: of the program. During week one, 11 people
are required to work on activities A, B, and
• Adding additional resources
48
1 2
2
A
3 4 4
People
1
8 9
D
2
9 9
4 5 6 9 10 11

2 4 1 2

E F €
V J
1 3 6 5
r i
3 4 5 6 9
B 10 11
4 4 5 6
6
1 3 1 2
G H
3 4
7 7 8 9
4 5
2
I
1 1 4
1 8 9
C
2
9 9

Figure 6-11. Network Schedule with Constrained Resources

C. Now, let's suppose only nine people are are evened out without scheduling more
available to work during this 11 week pe- work than nine people can do. In this ex-
riod. The chart shows there will not be ample, this rearrangement can be accom-
sufficient workers during the first, fourth, plished quickly by hand. However, with
and fifth weeks. There will be sufficient many activities, it becomes very difficult to
workers to perform the work scheduled find the optimum answer. Fortunately,
during the second and sixth week. During scheduling software applications are avail-
the third and seventh throughout eleventh able to assist in solving the problem. Re-
weeks, there will be a surplus of workers gardless of the approach used (manual or
for the work scheduled. The task becomes automated), the resource-leveling process
one of rearranging the schedule so that, is an iterative step-by-step process using a
insofar as possible, the peaks and valleys set of rules to establish the priority of the
49
16
15
14
13 Personnel Shortage
12 H
■o 11
53 10
o- 9 Personnel Available
0
cc 8 -
tt)
a 7 -
o 6 Personnel
a> <- Surplus
a. 5 B
4
3 B :E-
2
1 H
0
123456789 10 11
Time (Weeks)

Figure 6-12. Personnel Loading Chart

activities requiring the constrained resource, In this example, the approach is to find activi-
and the actions to be taken. ties having the most free float and try to delay
them as long as possible without delaying
As discussed earlier, the concept of float (or the entire program. By delaying the start of
slack) can be useful in the efficient allocation activity C for 2 weeks, Activities A and B can
of resources, and it should be considered in begin simultaneously without exceeding the
establishing the rules to be followed. The limit of nine workers. Similarly, Activities D,
float demonstrated in earlier examples is H, and I can be delayed, resulting in the
commonly called path float. Another type of revised personnel loading chart shown in
float that is particularly useful in resource Figure 6-13.
allocation is free float. Free float is the slack
that a single activity can experience without Figure 6-14 shows the revised schedule
affecting any other activity.1 The free float of using lag times to reflect the delays. It may
a given activity is defined as the difference not always be possible to rearrange the
between earliest start of the succeeding activ- schedule to stay within the resource con-
ity and earliest finish of the given activity. In straints. In those cases, other steps, such as
our example, the free float for Activity A is adding more resources or extending the
schedule, will have to be taken to mini-
FF(A)=ES(J)-EF(A)=9-2=7. mize the adverse impact on the program.

50
ity times and if control of the program
6.5 SUMMARY schedule outweighs other factors. On the
other hand, CPM is more appropriate when
Network scheduling techniques (PERT, activity times can be adjusted readily and
CPM, and PDM) are much alike in provid- when it is important to plan an appropriate
ing such things as interdependences, depth tradeoff between program time and cost.
of detail, a critical path, and slack. The The PDM technique is best suited for com-
choice among these three techniques de- plex projects with different types of rela-
pends primarily on the type of program tionships/constraints between activities.
and managerial objectives. ThePERT In reality, the proliferation of scheduling
method is particularly useful if there is software has blurred many of the differ-
considerable uncertainty in program activ- ences among network scheduling, Gantt,
and milestone techniques.

Figure 6-13. Revised Personnel Loading Chart

51
1 2
2
A
3 5 5
Peop e
1
8 9 Lag+1
D
2
9 9

4 5 6 9 10 11
■W
2 4 £ 2
F
J
6 5
3 4 5 6 9 4
B 10 11
6 4 4 6 7
1 3 1 2
Lag+1
G H
3 4
6 6 8 9
Lag+2
8 9
2
Lag+4
I
3 3
4
1
8 9

2
9 9

6-14. Revised Network Schedule with Constrained Resources

ENDNOTES
1
Fleming, Bonn, and Humphreys, Project and Production Scheduling, Probus Publishing Co., Chicago, IL, 1987,
Chapter 8.

52
7
PRODUCTION SCHEDULING

7.1 DESCRIPTION Production planning and scheduling


should be very detailed. A top-level project
The scheduling techniques discussed in schedule should serve as the production
the previous chapters are best suited for baseline. It should reflect the integration of
one-time development projects. Produc- activities that different organizations in-
tion scheduling, as its name implies, fo- volved in the production process conduct—
cuses on the planning, execution, and con- tooling, material procurement, etc. Lower
trol of repetitive activities, such as those tier schedules should be developed for
involved in the manufacture of several iden- each of the manufacturing activities, with
tical items using the same processes. The special attention to those having potential
objective of production scheduling is to impact on the delivery schedule, e.g., ma-
balance the materials required to produce terial procurement; tool design, fabrica-
the items with the production process and tion, and prove-out; test equipment prove-
the delivery schedule. Such scheduling is out; and capital equipment procurement.
essential to the efficient use of all resources Thorough planning and integration of all
and facilities involved in the manufactur- production process activities are essential
ing process. to manage risk in the manufacturing ap-
proach. This also provides assurance that
While the principles of planning and sched- necessary resources will be available when
uling are essentially the same for both situa- needed, that no resources will be over-
tions, there are differences that should be loaded or completely expended during
considered. For example, in the develop- execution of any manufacturing task, and
ment phase, planning and scheduling that product delivery dates are achievable.
should reflect the uncertainty inherent in
development of the product and processes An understanding of the production pro-
used. Consequently, planning and sched- cesses, to include such things as the se-
uling should permit sufficient flexibility to quence of operations, make or buy deci-
allow for redesign and retest when inevi- sions, inspection methods, tooling, etc., is
table problems arise. In production, there critical to effective production planning
is less uncertainty; the design is relatively and scheduling. The planning and sched-
stable and the processes to be used are uling of all activities must be fully inte-
fairly well-defined. In general, more de- grated and reflect a synchronized flow of
finitive constraints exist in production events that result in product or process
scheduling, such as quantities to be pro- completion when required. The produc-
duced, required delivery dates, and ca- tion schedule describing and integrating
pabilities and availability of production such things as the acquisition of required
assets. materials, fabrication flow, process times,

53
plant facilities to be used, and personnel 7.1.1 Objective Chart
skills required should be developed as early
as possible in the development process and An Objective Chart (Figure 7-1A) is a dis-
included in the manufacturing plan. play of the cumulative contract delivery
schedule over time. It shows cumulative
Once the planning and scheduling are com- units on the vertical scale and dates of
plete and production begins, managers delivery along the horizontal scale. It also
need the means to monitor progress and to shows actual cumulative deliveries to date.
identify problem areas in the process that
could adversely affect the delivery sched- 7.1.2 Production Plan Chart
ule. A technique that is commonly used for
this purpose is the Line of Balance (LOB) This chart (Figure 7-1B) shows the major
technique. It graphically portrays the key production process activities and events
activities of the production plan relative to (control points) that are to be monitored
a required delivery schedule and provides using this technique. It also shows the lead-
a view of the progress being made in each time associated with each of the control
activity. This enables managers to focus points.
their attention on specific problem areas in
the process. The more steps that are monitored, the more
sensitive and more complicated the chart
Government PMs, except those associated becomes. Generally, control points on a
with an activity that builds or re-builds single chart should be limited to 50. If there
equipment, will never be responsible for are more than 50, subsidiary production
developing a production schedule. How- plans can be used to feed the top plan. Thus,
ever, they should understand the process each chart can be kept simple and easy to
of creating one because the success of a understand. The shipping date of subsid-
program is very dependent upon the pro- iary charts is the point at which a subpro-
ducer to plan, schedule, and implement a gram must be ready to join the overall
production plan. schedule.

The ensuing discussion provides a basis On the production plan chart, each moni-
for understanding the fundamentals of tored step is numbered, left to right. Step 1
production planning and monitoring. Most has the longest lead time; the shipping date
companies have tailored planning software is the highest-numbered step. When two
programs to fit their needs, however the steps are done at the same time, they are
principles are the same as those used in the numbered from top to bottom, such as steps
LOB approach. For that reason, LOB is the 8,9, and 10. These control points can also be
subject of discussion. given symbols that show whether they in-
volve purchased items, subcontracted parts,
The LOB technique consists of four ele- or parts and assemblies produced in-house.
ments as described below and shown in Assemblies break down into subassemblies,
Figure 7-1. The application and use of this which break down into parts or operations.
technique is demonstrated in a later sec- Thus, one can develop a production plan for
tion of this chapter. any part or level of assembly.

54
o
CM
1ct =na.
« a
4) o o
"ÖÖ" 1 ■u
2
(0
o
O co
2Q i— ©
I»»
TJ
4> > m
w
■o
(0
n
c
toc n ■
«T c a o E y-
ct>
a>
s>a E JO Si
o 3 (0
"ST _i Q. U (0 < ■ CM

o ■ ► ■ CO
eo
g E ■ ■*

LL (0
CO
(0 ■ IO
a>
"* ¥-> • <o


CO
3 Ä > CO

E
CO
(S "O
«) 5
o
a>
O) a>
3
g E| co
s !> si a> o a-
<
S 3 2 o
c
'E
O
1o
CO
■a 5 o
O
oc p I
'5,
a
CM
1a l-
Q. a> a>
O
■O o
Ü
E
<B «I c
re
p (0
CO
< RJ
m CD
IO O
T-

<—■,>; co
" = k. -5 o
CO
42 >
0) < CM « Y-
3
5 IO ■
w
- -o CO
a>

T
< o *t (0 T-
o >
£
_ O "sr \( eo D
> w a>
LU
(0
5 o T- aj o>
> (0 CM "co
n .a

1 z
k
1- - s 3
u. < <B
E
a> o
CM
o c E3
i^ 3
(0
_l To
CO
(0
UJ - o ,0, a .2 <
o **-
o \\
"3 CO to
° >. Oz "■I CM

CM
< Q IO o CO Ä
H CM

o o o
Q i- o
o o o o
y-
3 CO
CM
CO IO CO CM 5 3- Q
siiun
s I CM
3ES| 0.
IO
ffl CM
CO **

c < CO
o CM
Ü

55
The production plan chart shows the 7.1.4 Line of Balance
interrelationships and the sequence of
major steps, as well as lead times required The LOB represents the number of units that
for each step. An understanding of the should have passed through each control
manufacturing processes involved and point (cumulatively) to satisfy the contract
sound judgment are required to know delivery schedule. Managers use it to ana-
which step and how many steps must be lyze how the status of each control point on a
monitored. Slack or float times for activi- given date will affect future schedules. This
ties are not considered when plotting the LOB is drawn on the Program Status Chart
production/lead-time chart; only the esti- (Figure7-lC)usingthefollowingprocedures:
mated time (and latest finish point) for
each activity is used. (1) Select a control point; for example, 7.

The 12 control points in the production (2) From the production plan/lead-time
plan chart shown in Figure 7-IB represent chart (Figure 7-1B), determine the lead time—
key tasks in manufacturing one lot of mis- the time from control point 7 to the shipment
siles. The plan indicates that control point point, Government Acceptance (12
(1), fabricate ballistics shell, must begin 24 workdays).
workdays before 1 January to meet the first
scheduled delivery of five units by the end (3) Using this number, determine the date
of December (see the objective chart). The that the unit now at control point 7 should be
lead time for other control points can be completed. (May 1 + 12 workdays=just over
related to the scheduled delivery in a simi- halfway through a 22-workday month.)
lar manner. Time for in-house transfer and
storage must be allowed in addition to the (4) Find the point corresponding to this
processing time. date, approximately May 17, on the contract
schedule line and determine how many units
7.1.3 Program Status Chart scheduled for completion this represents by
moving horizontally from the objective chart
This chart (Figure 7-1C) shows the cumula- to the program status chart (they share the
tive inventory status at each control point in same vertical scale).
the process at a given time (in this case, 1
May). Looking at control point 12, we see (5) Draw a line on the program status
that the government has accepted 14 units of chart (Figure 7-1C) at the level (43 units) over
the product. The bar for control point 9 shows control point 7.
that 40 units of the guidance section have
been assembled, and the bar for control point (6) Repeat the above for each control
4 shows that in-house fabrication has begun point and connect the horizontal lines over
on 60 fins. the control points. The resulting line is the
LOB, indicating the quantities of (1) units
The cumulative numbers of units through that should have passed through each con-
every control point can and should be meas- trol point on the date of the study or inven-
ured monthly. Final deliveries (government tory (1 May) if the contract delivery schedule
acceptances) are shown month-by-month on were being met.
the objective chart as actual deliveries.
56
The difference between the LOB and the 7.2.2 Analysis
top of the bar for each control point is the
number of units behind or ahead of sched- Using the LOB charts in Figure 7-1, man-
ule as of 1 May. Thus, control point 12 is 16 agement can tell at a glance how actual
units behind schedule, control point 9 is 5 progress compares with planned progress.
units ahead of schedule, and control point Analysis of the charts can pinpoint prob-
7 is 21 units behind schedule. The main lem areas. Delays at control point 7 in the
impact of control point 7 being behind example may have been causing final de-
schedule will be felt in 12 workdays, which livery problems throughout the contract.
is the lead time for control point 7. As of 1 However, the purpose of LOB analysis is
April, an insufficient number of air vehicle not to show what caused the slippage in the
components (shell, fins, engine) had passed shipping date, but to detect potential fu-
into the assembly (air vehicle body) phase. ture problems.
This will adversely affect final deliveries
12 workdays hence. All other control points In the example, the Government accep-
can be analyzed in the same way. tance point is control point 12. The bar
doesn't reach the LOB; therefore, deliver-
7.2 WHEN AND HOW TO USE THE ies are behind schedule. Control points 10
LINE OF BALANCE TECHNIQUES and 11 are short. However, point 9 is on
schedule. Since point 10 depends on points
7.2.1 General 8 and 9, we know control point 8 is the
offender. Both points 7 and 8 are short, but
The LOB technique should be considered there are more than enough purchased
for use in any project requiring the manu- items (engines) at control point 6.
facture of a specific quantity of a product
using repetitive processes. It is an effective What's the problem with control point 8?
technique for identifying those activities Trace it back to control point 7, which is
that require attention and possibly correc- seriously short. It is obvious that not hav-
tive action and can also be used for report- ing enough completed fins is holding up
ing the status of the manufacturing process the whole process. Control points 2,3 and
and delivery schedule to higher manage- 5 are short, but are not directly responsible
ment. The LOB charts should be updated for the failure to meet the delivery sched-
on a periodic basis (weekly or monthly, ule since 9 is ahead of schedule. Neverthe-
depending on such factors as the size of the less shortages at 2, 3, and 5 could soon
production run, the number of activities/ cause problems at 9. The problem with the
control points, and the level of automated fins 7 should be addressed before manage-
data management). ment attention is devoted to other short
operations. The overages at control points
Government managers will probably not 1 and 6 may be examined from the point of
be involved with the LOB technique in the view of inventory control. Updating the
day-to-day management of their programs. charts requires a good status-reporting sys-
However, they should have a basic under- tem, which can be mechanized if the pro-
standing of the technique, the type of infor- gram is large and complex.
mation it can convey, and its applicability.

57
7.3 LINE OF BALANCE ADVANTAGES Think of the production process as a natu-
AND DISADVANTAGES ral gas pipeline. If a bubble of air gets
into the pipeline, it will eventually be
7.3.1 Advantages carried to the gas users, and the users
will find their burners extinguished as
(1) Points out problems before their the nonflammable air reaches them. The
impact on finished product deliveries show manager of the pipeline company or the
up, thereby allowing managers to correct natural gas utility doesn't want clients to
problems earlier. suffer blowouts from air bubbles in their
lines. The same holds true for the manag-
(2) Allows managers to see, in the ers of a continuous production process.
middle of a contract, whether they can Waiting for problems to show up at the
meet the contract schedule if they continue end of the line is a mistake. Problems
working as they have been. need to be detected when they begin so
corrections are faster, before too much
(3) Focuses attention on those pro- damage (to cost, performance, or sched-
duction control points where there are prob-
ule) is done, and production schedules
lems; this allows a senior manager to pin-
fall too far off contract.
point responsibility for slippages.

7.3.2 Disadvantages To do LOB, the following is needed: (1) a


contract schedule, or objective chart; (2) a
(1) People working on a project may production plan or lead-time chart for
not grasp what the LOB is measuring. the production process itself; (3) control
points cumulative inventories; and (4) a
(2) Limited to production and /or program status chart on which to plot
assembly-type processes. LOB and the cumulative quantities of
units that have passed through the con-
(3) Shows only where the problem trol points of the assembly /production
is, not what it is. process. If the objective and program
status charts are given the same vertical
(4) A monitoring device; not as easy scale, the LOB can be plotted graphically
to use as a planning device. from the former to the latter.

7.4 SUMMARY Remember that the shape of the LOB will


change over time, especially if the produc-
The LOB is a monitoring technique that tion process has a beginning and an end.
gives prior warning of problems within a Remember, too, that LOB charts show
continuous production process. The key is where a problem is, but not necessarily
to catch problems in a production process why the problem exists or what the
early; otherwise, the schedule is lost. The solution is.
LOB technique provides that warning.

58
8
TIME MANAGEMENT

In most programs, especially in DoD and (1) Most PMs establish a time reserve of
defense-related industries, time is a re- about 10 percent. On a 40-month program,
source that must be carefully managed. If for example, a 4-month time reserve would
it is not, it can become a serious constraint be established.
that can threaten the success of the pro-
gram. This chapter addresses time man- (2) The time reserve must be held closely
agement from two perspectives: first, as it by the PM. Otherwise, every manager on
relates to a program, and second, as it his/her program may think "I know there's
relates to the PMs use of time. a time reserve; therefore, I don't really
have to meet my schedule." The PM may
8.1 TIME MANAGEMENT AND place this reserve under "additional sys-
THE PROGRAM tem tests" or another downstream activity.
The point is, it shouldn't be visible. (A
This section concerns three aspects of time built-in safety factor between the manufac-
management related to programs: turing schedule and the delivery schedule
is often used.)
(1) Time reserve
(3) A tough and disciplined approach to
(2) "Now" schedule meeting the published schedule is required
from the start of a program in order to
(3) Value of time. maintain the reserve and, consequently, to
meet the program schedule in spite of slip-
8.1.1 Time Reserve pages caused by the unknown unknowns
(unk-unks) that inevitably arise.
In contractor performance measurement,
much emphasis is placed on "management 8.1.2 "Now" Schedule
reserve," the reserve budget controlled by
the industry PM. What isn't always recog- There is a direct relationship between time
nized is that a time reserve is also needed in and cost for any activity. This relationship
order to accommodate unknowns in the pro- takes into account the people, resources,
gram. However, use of a time reserve should and method used. It also considers the
be approached with caution, because mem- efficiency achieved. Generally, the least
bers of a program office team may be tempted costly schedule is the current one. Speed-
to fall back on it prematurely. ing up the schedule costs more; stretching
out the schedule also costs more.
Literature describing time reserve is scarce.
However, there are some aspects of a time The sum of the direct and indirect costs
reserve that are clear. gives a U-shaped total program cost curve.
59
The optimum schedule for implementing organization causing a slip in schedule
the program is the schedule corresponding becomes a repeat offender. The principal
to the minimum point on this curve. The value of retaining a former schedule lies in
relationship among direct, indirect, and being able to hold the offender's feet to the
total program cost is shown graphically in fire, thus making schedule slips less
Figure 8-1. palatable.

Because schedule stability affects program The significance of maintaining a stable


costs, which may, in turn, affect technical schedule is becoming more widely recog-
performance, it is clear that schedule sta- nized. Appendix A describes the develop-
bility has a great deal to do with whether ment of a master schedule and the impor-
the program meets its cost and technical tance of maintaining schedule discipline.
objectives. Unfortunately, budget con-
straints and other factors, like changes in 8.1.3 Value of Time
quantities (items over which the PM has no
control), have often been imposed on a According to the late John H. Richardson,
program with the comment, "Do the best president of Hughes Aircraft Company,
you can." "A basic reason for adopting project (or
program) management, when tackling the
When a schedule must be revised, the super- difficult and unique tasks associated with
seded schedule is often discarded. If the developing and producing a system, is to
new schedule is superseded, the process is eliminate unnecessary delays in accom-
repeated. However, there is some value in plishing the job at hand. Time is a resource
retaining an obsolete schedule. Often, the in systems management, to be treated with

Total Program
Cost

Indirect Cost

Direct Cost

Optimum,
Time

Figure 8-1. Total Cost Analysis for Selecting


"Optimum" Program Duration

60
indifference or used well like any other forgottenis the fact that a month's delay in the
resource. For projects not yet in full swing, early stages of development is exactly as
it is important to recognize that time has long as a month's delay in the later stages.
economic value, and that we may be taking While it may seem innocuous to put off a
time too much for granted."1 decision for a month or two in the early years
of a project (or program) with an uncertain
(1) Funding could create a problem. In future, that delay may turn out to be just as
hungry years, the schedule is often stretched costly as is procrastination when the final
because of reduced funding. decisions are made. In short, a sense of ur-
gency is essential to decision making in all
(2) A better product could be developed stages of a new venture, not just the later
if it were more thoroughly debugged and stages."3
tested. However, a system does not really
get wrung-out until it is in the user's hands, The useful life of a defense system must be
regardless of advance debugging. taken into consideration. Concentration on
the system or product often overlooks a key
(3) Cost of concurrency (overlap of devel- point: whether the buyer obtains value upon
opment and production) might lead to a delivery. The most costly product is one that
decision not to overlap program phases. appears when it no longer fulfills a useful
Such a decision might be popular in many purpose, even though it has been produced
cases, but it could never be tolerated when at minimum cost. Each month added to the
the pendulum swings toward the impor- development and production of a new high-
tance of time; that is, when top manage- technology system or product tends to re-
ment says, "Get the system out the door, duce by 1 month the operational life of the
never mind what it costs."2 system or product.

Stretched-out schedules incur cost penal- In spite of the 10-20 percent cost premium
ties because of inflation, additional engi- that may be paid for tight scheduling (as
neering changes, and changes in key pro- compared to orderly but stretched-out sched-
gram management office positions. An- uling), the resulting longer operational life
other near-term cost is due to the increased may provide greater economic value. This is
chance that a program will be canceled looking at time only from the viewpoint of
because of obsolescence or competing tech- economies', i.e., acquisition cost per year of
nology. Stretch-outs invite cancellation. operational availabil survival insurance.
Also, long schedules with no opportunities
for incorporation of improvements are a Consideration of alternative plans and sched-
negative factor when considering a new ules will also help; e.g., if event so-and-so
start. occurs, proceed with plan A; if event such-
and-such occurs, proceed with plan B and so
Delayed decisions increase costs. Accord- on. Anticipation and preparation for most-
ing to R. W. Peterson, former DuPont execu- likely events, along with the tools described,
tive, "All businessmen are concerned, and and coupled with effective communication
properly so, about the long time it takes to of the plans, can change the management
move a new development from its incep- style from crisis management to skillful
tion to a profit status. But frequently management.
61
8.2 TIME MANAGEMENT AND THE inability or reluctance to say no. If a subor-
PROGRAM MANAGER4 dinate brings a problem to the PM, the
Manager must be alert to make sure not to
PMs are busy people. They have the re- assume responsibility for the problem,
sponsibility for the management of a unless, of course, the situation warrants
myriad of activities and the resources that such action. If subordinates believe that
make up the program. In addition, they are PMs will assume responsibility for their
often required to perform specific program problems, needless demands on the PM's
activities, especially in smaller programs. time will increase.
Thus, it is important that they manage their
time well. Some managers could be more Meetings are a fact of life in program man-
productive, perhaps as much as 20-40 per- agement. However, unless they are effec-
cent, by better managing their time. A major tively planned and conducted, they can be
difficulty in accomplishing this is the fail- a severe drain on time and resources. A
ure to realize that there is a time manage- number of common pitfalls, if not avoided,
ment problem and that solutions are pos- can turn meetings into a complete waste of
sible. This section discusses various as- time. Among them are: not having a clear
pects of time management and identifies and focused agenda; spending too much
ways to better accomplish it. time on trivial matters; having too many or
too few meetings; not having the right
In the early 1980s, a time management people at the meetings; and not keeping an
survey was conducted to identify the prob- accurate record of decisions and actions
lems in achieving effective time manage- assigned.
ment. More than 300 project managers in
24 industries, including the government, To get the most value out of meetings, the
participated in the survey, which investi- following actions should be considered:
gated 15 different areas. The survey iden-
tified several time management problem (1) Understand the purpose of the meeting
areas. Among the most common were time and what results are expected
robbers and meetings.
(2) Minimize the number of people attend-
Time robbers are simply those things that ing the meeting
can occur on a day-to-day basis that can
take away from the PMs ability and time to (3) Hold the meeting in a setting appro-
accomplish his/her work. There are liter- priate for the meeting objectives
ally dozens, if not hundreds, of such things,
such as incomplete work, delayed deci- (4) Develop and distribute the agenda
sions, poor communications channels, ca-
sual visitors, lack of effective program (5) Start and finish on time
management tools, etc. Appendix B con-
tains a list of common time robbers. The (6) Summarize meeting results and pre-
survey found that delayed decisions and pare and distribute minutes.
poor communications were the most com-
monly cited time robbers. Another com- In addition to focusing on time robbers
mon problem that affects a PMs time is the and the conduct of meetings, PMs should
62
also concentrate on other effective time make the least desirable decision because
management techniques, such as: of lack of time. Establishing a time reserve
. and a "now" schedule, and recognizing the
(7) Prioritize activities value of time in decision making all con-
tribute to the PMs repertoire of good tools.
(8) Devote solid time blocks for important
activities Sir Jeffrey Quill, manager of the British
Spitfire Development Program, com-
(9) Maintain "to do" lists and time logs mented during a visit to DSMC that; "After
1935, costs weren't particularly important.
(10) Delegate What mattered was time. We worked three
shifts a day. Everything was time. Quan-
(11) Manage by exception tity and time. It turned out that we prob-
ably produced at the lowest cost, too; but
(12) Practice calculated neglect the emphasis was on time."

(13) Control access—limit casual visits and PMs must manage their time effectively if
telephone calls. they are to be successful. They must be
alert to those time robbers that affect their
8.3 SUMMARY ability to accomplish their work and un-
derstand the value of proven time manage-
Planning and scheduling can do much to ment techniques.
prevent running out of time and having to

63
ENDNOTES
John H. Richardson, Time Defeats Technology, Hughes Aircraft Company, Culver City, Calif., date
unknown.
Ibid.
Russell W. Peterson, former DuPont executive, Governor of Delaware and White House advisor, "New
Venture Management in a Large Company," Harvard Business Review, May-June 1967, p. 72.
Harold Kerzner, Project Management, Van Nostrand Reinhold, New York, 1998, Chapter 6.

64
9
AUTOMATED SCHEDULING TOOLS

Previous chapters have shown that manag- 9.1 AUTOMATED PLANNING AIDS
ers use schedules in a variety of ways for a
wide range of purposes. Schedules are an The idea to use the power of the computer
integral part of the program planning and to assist in the planning and tracking pro-
decision processes. Managers use them to cess is not new. Industry has used auto-
track progress, predict future work, man- mated scheduling software for at least the
age resources, analyze alternatives, iden- past 30 years. Early versions of these tools,
tify risk, and report program status. In however, usually employed a mainframe
most cases, it is the PMs responsibility to computer that batch processed data off-
construct, revise, maintain, and report line and spewed reams of information for
schedule information. managers to analyze when they arrived at
work on a Monday morning. Despite the
The PM must do these things in a complex automated tools, the process of creating,
environment that cuts across contractor maintaining, and reporting schedule in-
and government boundaries and includes formation was a daunting task.
a wide geographical area. The challenge is
complicated even further by the need for The advent of PCs/workstations and net-
instant information that must be available work technologies has made life easier for
to a wide audience that usually requires managers. The market encourages soft-
the information in a specific format to suit ware vendors to develop a wide range of
unique needs. programs readily available to P Ms to aid
them in effectively and efficiently dealing
It would be impossible to meet these chal- with the details involved in creating a pro-
lenges without automated tools.The gram plan, then tracking progress.
remainder of this chapter discusses charac-
teristics and features of some tools avail- The introductory paragraph of this chap-
able on the market today and suggests ter lists many uses of a "schedule." Soft-
criteria that anyone searching for a tool ware developers have responded to the
should consider. The intent is to provide an managers' needs by creating programs
overview of the types of products that are that build schedules and support pro-
available and the range of functions these gram management functions. Even the
products support. The level of detail pre- simplest program includes some program
sented is keyed to what would be useful to management features. The focus of the
know about the program management soft- following discussion, therefore, is on the
ware tools that would likely be used in a broad category of Program (often called
mid-to-large Program Office. Project) Management Software.

65
The focus is on providing a brief descrip- (1) System-Level Characteristics
tion of the functionality of these products,
highlighting some of the desirable features (2) Project Management/Scheduling
that are available to support program Characteristics
management, and identifying sources that
may be useful in determining what prod- (3) Ease of Use.
ucts are available and how their features
and performance might be assessed. System-level features have a general
applicability, independent of any of the
9.2 FUNCTIONAL CHARACTERISTICS specific project-management activities sup-
AND FEATURES ported, that add to the overall capability
and desirability of the product. These fea-
Most of the Program Management Soft- tures include, but may not be limited to:
ware that is available today is based on a
relational database design and is therefore • Collaboration/Workgroup—Enables
able to support a broad range of program managers/team members to use a com-
management activities including: mon system of communication and allow
access to common databases for the pur-
(1) Scheduling/Tracking pose of assigning tasks, updating project
data, assigning resources, and reporting
(2) Resource Planning/Management status.

(3) Risk Management • Integral e-mail—Allows exchange of


messages and file attachments to other
(4) Cost/Performance/Analysis project team members from within the
project management application.
(5) Reports and Graphics.
• Multiple Project/Multiple Tasks—
The extent to which the different programs Supports multiple programs and tasks
support these activities varies from prod- within a project.
uct to product. For example, some prod-
ucts provide the capability to create only • Security—Limits access to certain data
Gantt charts whereas others provide the by individual or class of user, as well as
tools to make Gantt and network charts. password protection for the system.

Program features, the way in which activi- • Open Data Base Connectivity
ties are implemented, are an important (ODBC)—Enables users to import data
factor in considering the usefulness of a from other data sources and in various
program. A convenient way to profile the formats into their scheduling applications
functional characteristics and associated (e.g., data from your contractor's project
features of automated program manage- database). This is a Microsoft-developed
ment tools is to do so from these three standard for exchanging data with a vari-
perspectives: ety of databases.

66
Most programs include features that focus • Import/Export—Import/Export data
on program management and schedule from/to an external source, such as an-
functions. Some features offered are: other database or spread sheets, facilitates
the ability to create custom reports or con-
• Project Scheduling/Tracking—Data duct analyses.
Entry Templates facilitate the entry of the
initial task, time, and resource data. On- Finally, ease of use or user friendliness, is
Screen Tracking facilitates comparison of the set of qualities that represent the degree
actual performance versus the planned and in which people can employ the software
allows tracking of progress by cost, time, or without an inordinate amount of training
achievement. or regular reference to user's manuals. User
friendliness is an important consideration
• Resource Planning/Management—Re- because program management software
source Leveling is a capability that resolves products can be complicated. Regardless
resource conflicts by delaying tasks and of how powerful a program may be, if it is
assignments as well as by task splitting, difficult to use, managers probably will
which entails dividing tasks into segments not spend the time to learn it. Consequently,
with time gaps as necessary. Resource Cal- PM software is likely to be effective and
endars provide insight into the availability desirable if users can easily learn to use it.
of a particular resource by showing work-
ing and non-working times. Free/Total Slack The following features typify user-friendly
Time is a feature that is useful for adjusting systems:
under-or-over allocated resources.
• Graphical User Interfaces (GUIs)—
• Cost/Performance Analysis—Earned These are the screens in which a user inter-
Value Tools are essential for comparing ac- acts with the program. The operating envi-
tual performance with expected perform- ronments in use today have led to the
ance. Cost Analysis Tool Kits are tools for development of interface screens that en-
analyzing data and making forecasts. This able the user to interact with the software
feature may be integral to the product or in an intuitive way, using a variety of
available by virtue of "exporting" data to buttons, menu lists, and wizards.
another application with this capability.
• On-Screen Data Entry—The capability
• Reports and Graphics—Pre-Defined Re- to create schedule information by using
ports facilitate the presentation of project tools to create an on-screen graph. See Fig-
data. Customization Controls provide users ure 9-1 for an example.
with a convenient way to format reports to
their own specifications. Filters enable the • Help Function—On-screen docu-
user to screen information, e.g., tasks or mentation as well as "context-sensitive"
resources, before capturing a screen-view help in which the software displays the
or preparing a report. Embedded Graphics applicable text based on the functions be-
and Text capability allows a user to import ing performed. This is a particularly useful
data from other applications for inclusion feature for someone learning to use it.
in a project report.

67
j»3 Hast 1 rack Schedule b 0 - [hob li BSD;
9 01» Ed* Sotmdule Bars Arrange Qplions Xaxt fcieJp ■-. '■ 'v' . ^Äjxj

Jun '98 Jul '98


| = *HK Activity Name
7 14 i 21 I 28 I 5 I 12 19 26
1 w Requirements Planning llil.
| 2u Review existing systems ; ^^

I
1
3; !
4! !"!"
Perform work flow analysis
Model process
tgjg 1
\ r=si
!
\
! 1

(f-VH A

5 I Identify user requirements


6 I I ' Identify performance requirements 1 ;4*T v"^7
0=0 !
7 I Identify interface requirements ^H

8:1 Prepare SW Requirements Spec : i 1 ! A==V A-^7


\ CnAun«. Dn^i i!»iHnn^ Dr.^,11 ■*a»j

| 9] 0 A=V
1 10: ♦
Legend
11; 1
I 12: | A==S7 Planned
1i 13; IT"
14; T ™» Actual I [
-T

15
i 16
17; ;
j !
18! ! 1
19; ; 1
20
21
22; I
23
24; !
26 ;
26; 1]
27; !""!"" i ; i ! 1 !
28; 1
; j ; ; ;
^ M ; ! ; 3 ! 4 ; S i 6 ; J : B
r=]csM (—.. .' \*\ .... __ .. !►

^IStl»ft[|ElFn8tTtack Schad... ;<l,0»*> 1:22 PM

Figure 9-1. On -Screen Data Entry Using Gantt Chart Feature


(AEC Software Fast Track Schedule)

• Tutorials—Program instruction on per- 9.3 EVALUATING PROJECT


forming certain functions and guidance MANAGEMENT SOFTWARE
through a "canned" demonstration. PRODUCTS

• Wizards—Templates that guide the Choosing a software program from the


user through various project setup, data wide range of available products can be
entry, and report formatting procedures. complex and time consuming. The selec-
The features discussed above are a sample tion process should begin with an analysis
of the characteristics of various program of what managers want to do with the
management products. Moreover, there is software to identify the functions that are
no common "feature list" or set of defini- needed. Other factors that should be part
tions that defines the various characteris- of the assessment process are consider-
tics. Nonetheless, the summary should give ation of personnel skill levels/training re-
a sense of what is available and provide the quirements, integration with enterprise
basis for a more exhaustive review as (organizational) systems, hardware/sys-
needed. tem requirements, and cost.
68
Table 9-1. Project Management Software Functions and Criteria

USER FRIENDUNESS
Feature Consideration
Graphical User Interfaces (GUIs) Logical, intuitive, all inclusive, windows compliant
Robust Help Function Complete, easy to access, context based, examples
Wizards Exist for major functional areas, intuitive, tailorable results
Tools Exist for major functional areas, intuitive
Tutorials Complete and examples
On-Screen Data Entry Simple, logical, complete, intuitive
SYSTEM LEVEL FEATURES
Collaboration/Workgroup Support Desired capabilities available, non-proprietary
Integral e-mail Exists, simple, compatibility with existing e-mail
Multi-Project & Task Support Roll-up to higher levels, supported by reporting features
Security Meets specific security needs, compatible w/ existing system
Open Data Base Connectivity Data transfer with other program management S/W
PROJECT MANAGEMENT/SCHEDULING FUNCTIONS
Project Scheduling/Tracking
Multiple Schedule Methods Create Gantt, network charts, and go from one to the other
Roll-Up Display and report different levels
Ability to Tailor to Specific Needs Add/delete/modify activity and event information
Relationships Display and report dependencies among events/activities
Progress Tracking Compare and display plans and actual progress
Critical Path Display Highlight critical path
Interoperability w/ Other Programs Import and export data from other programs
Total Free/Slack Time Compute and display free and slack time
Time Estimates Use probability distributions to compute time to complete
Time Roll-Up Use statistical methods to compute roll-up times
Resource Planning/Management
Resource Determination Assist in determining resources needed
Resource Assignment Allow assignment and notification of assignment to activities
Interoperability w/ Other Programs Import and export resource data
Resource Leveling Easy to access, permits "what if" excursions
Resource Calendars Display resources overtime
Task Assignment Filter and display assignment of responsibility
Analysis
Schedule Analysis Allow analysis and comparison of alternative schedules
Earned Value Analysis Assist in complete and accurate EV analysis
Cost Analysis Includes tool kits for analysis of program cost
Resource Analysis Compute resource utilization, identify conflicts
Reports
Pre-Defined Report Formats Automatically create reports based on program data
Customization Controls Allow reports to be tailored for specific purposes
Embedded Graphics and Text Add text and graphics to reports

69
Analyses of requirements and software offices are going to share information, it is
evaluation are beyond the scope of this prudent to use the same software, if pos-
discussion. However, Table 9-1 shows some sible. At the very least, compatibility and
of the functions that are available in avail- interoperability must be demonstrated be-
able program management software and fore making a decision to buy a particular
lists some ideas for consideration when product.
searching for the right software.
There is a considerable information on
9.4 FINDING OUT MORE project management and scheduling soft-
ware from a variety of sources. The Defense
The best method of gaining information Acquisition Deskbook (DAD) has a list of
about a potential project management tool tools that are being used by program of-
is to talk to someone who is using the fices. From a commercial aspect, specific
product. APM in the next office may have product information is available on most
a perfectly acceptable and proven product companies' World Wide Web home pages.
that he/she is using. The company under Virtually all developers provide informa-
contract may have a product that it uses. If tion about their products on a web site and
the government and contractor program show links/contact to additional sources.

70
APPENDIX A
INTEGRATED MASTER SCHEDULE DESCRIPTION

The Integrated Master Schedule (IMS) for a format that greatly facilitates the tracking
program should be a time reference baseline and execution of the program.
for the activities and events that make up
the program. It should be incorporated In some cases, a preliminary IMP and its
into the program plan and linked to ap- corresponding IMS may be developed by
proved performance and cost objectives. the government but include industry in-
The IMS is developed by the contractor puts obtained through open communica-
from the Integrated Master Plan (IMP), tions with potential sources during the
which documents all the tasks required to pre-solicitation phase of the acquisition.
deliver a high quality product and to facili- Contractors are normally required to sub-
tate success throughout the product's life mit formal IMP and IMS with their propos-
cycle. In an Integrated Product and Process als and to develop more detailed IMP/
Development (IPPD) environment, which IMS versions after the contract is awarded.
is the standard approach for all DoD pro-
grams, the IMP and IMS provide an The IMS is event driven and is developed
overarching framework against which the with participation of all program stake-
Integrated Product Teams (IPTs) can func- holders. It should identify all tasks that
tion, helping them understand their work need to be accomplished, their logical or-
within the context of the total program. der, and the input conditions necessary to
complete each task. When documented in
The IMP and IMS evolve as the program a formal plan and schedule, this event-
matures. During the initial stages of Con- driven approach can help ensure that all
cept Exploration, the integrated plan is tasks are integrated properly and that the
preliminary and its purpose is to provide management process is based on signifi-
an understanding of the scope of work cant events in the acquisition life cycle and
required and the likely structure of the not on arbitrary calendar events. Develop-
program. It is constructed to depict a likely ing the program schedule presents an op-
progression of work through the remain- portunity to identify critical risk areas. As
ing phases, with the most emphasis on the IPT members estimate the times to com-
current and/orupcomingphase(especially plete specific tasks, events that may cause
the period to be contracted for next). As the delays will become apparent. These events
program is defined, the IMP is iterated are potential areas of risk that the IPT
several times, each time increasing the level should consider for further analysis.
of detail and confidence at which all essen-
tial work has been identified. The specific The IMS begins as an IMP with dates—the
format for this plan is not critical; however, starting points are the events, accomplish-
it usually reflects an Event/Accomplish- ments, and criteria that make up the plan.
ment/Criteria hierarchical structure—a At a minimum, an IMS shows the expected
71
Start and stop dates for each activity in the they were obtained at the right time. In
plan, but each activity may be broken down addition, the IMS can be useful for the
into lower-level tasks that will be used to following events/activities that are com-
manage the program on a day-to-day ba* mon to all programs.
sis. The schedule can be expanded down-
ward to the level of detail appropriate for PROGRAM REVIEWS
the scope and risk of the program. Pro-
grams with high risk show much lower The IMS can be a framework for periodic
levels of detail in the integrated master program reviews within the program man-
schedule in order to give the visibility agement office (PMO). If constructed prop-
necessary to manage risk. The more de- erly, the schedule will illustrate the vari-
tailed the IMS, however, the greater the ous levels of the program and will be com-
cost to track and update the schedule. patible with the program cost/schedule
Under acquisition reform initiatives, the control system reports.
dates in the IMS usually are not made
contractually binding so as to allow the Program reviews can be an excellent forum
flexibility to take full advantage of event- for resolution of schedule conflicts and the
driven scheduling. genesis for controlled changes to the sched-
ule from within the PMO. Most key mem-
Additional information on the development bers of the PMO team are present at these
of IMSs can be found in various sections of reviews; therefore, proposed schedule
the Defense Acquisition Deskbook and in the changes or slips can receive wide dissemi-
DoD Integrated Product and Process Develop- nation within the organization.
ment Handbook dated August 1998. Com-
mercial standards EIA 632 and IEEE 1220- WHAT IF" EXERCISES
1994 can also be consulted for more infor-
mation on developing master plans and The IMS can serve as the framework for
schedules. See http: / /wwW.eia.org/eng/ "what if" exercises imposed on programs
published.htma nd http:// from outside the PMO. Schedule changes
standards.ieee.org for information on can be plotted manually by using over-
how to obtain these standards. A DoD lays. Using the same grid coordinates on
Data Item Descriptor (DI-MISC-81183A) an overlay allows the PMO team to see,
has been developed for IMS guidance; clearly and graphically, the effect of the
it is attached to this Appendix as Tab 1. compressions or extensions of sub-mile-
stones on the program. It may be even
USE OF INTEGRATED MASTER easier (and more productive) for the PMO
SCHEDULES team to run "what if" exercises on a com-
puterized schedule. Without a master
The primary purpose of the IMS is to track schedule as a baseline, these exercises can
schedule variations. By linking the IMS to take longer to accomplish and they may
the IMP, it can also be used to track the overlook important variances from the
activities that provide functional and life- program's established baseline schedule
cycle inputs to product development. In or plan.
this role it provides a crosscheck not only
that the inputs were obtained, but also that
72
PROGRAM BRIEFINGS justification and an understanding of the
impact of the changes on the overall pro-
The IMS can serve as a baseline for pro- gram. Following are examples of some
gram reviews at higher headquarters and simple procedures that, if practiced, will
other reviews or briefings outside the PMO. instill discipline and prevent the unautho-
Most programs have key milestones taken rized release of schedule information that
from the master schedule and presented in has not been approved for inclusion in the
summary form on viewgraphs or slides. If IMS.
these do not show the detail required to
make a point, the time span shown can be • Program changes, whatever the source,
reduced to the point where the details should start as proposals and, if approved,
become visible. grow into a firm plan. Eventually, they are
incorporated into the IMS as changes. The
SCHEDULE DISCIPLINE question of when to plot these changes is a
matter of judgment and should reflect the
To be effective, an IMS must be kept up- PM's policy. Each change should be plot-
to-date and accurate. Maintenance of the ted as a proposed or tentative change until
IMS requires a process similar to that approved.
inherent in configuration control—one
that establishes discipline through a set of • A permanent record of each change
rigorous procedures for managing sched- should be maintained. If the program
ule change. The degree of schedule disci- schedule slips, it should be documented
pline imposed within the PMO can be a until documentation no longer serves a
major factor in the success of a program. useful purpose.
The underlying philosophy of the sched-
ule control process should reflect central- • Whenever copies of the IMS are made,
ized control of the IMS. That is, changes to they should be dated and authenticated by
the IMS baseline should be made only the signature of the PM or the appointed
with the approval of the PM or his/her schedule manager. Undated and unauthen-
designated representative and with full ticated schedules should not be released
outside the PMO.

73
Form Approved
DATA ITEM DESCRIPTION OMB NO. 07040188
I Publioreportingburden for thiscdledion of information iseSi mated toavetage 1 lOhouraper response, indudingthetimefor reviewing instrudions, searching existing data sources, sphering and mantajningihe
IdataneaS.aidccmpiaingändreviemngthecdledicndirt^^
| butden.loDspa.1mmt of Drfanse, Washington H<BdquartersSarvio«e.Diredcrate1or Intomation OperalionsandRapefls. 1216Jefferson Davi»Highway.Sute12<M Arlington, VA 222024308andtolheOfficeol
| Manaaanait and Budget. Paperwork Redudion Proied (07040168. Washington. DC 20503
!. IDENTIFICATION NUMBER
1. TITLE
Integrated Master Schedule (IMS) DI-MISC-81183A
3. DESCRIPTION/PURPOSE _
The IMS is an integrated schedule developed by logically networking detailed program
activities. The contract Integrated Master Plan (IMP)is the foundation of the program
schedule and provides a hierarchy for schedule traceability and summarization. IMP events,
accomplishments, and criteria are included in the schedule to monitor progress. This
information will be used to verify attainability of program objectives, evaluate the progress
of the government and contractor team toward meeting the program objectives, and to integrate
program schedule among all related components.
5. OFFICE OF PRIMARY RESPONSIBILITY (OPR) 6a DTICAPPLICABLE 6b. GIDEPAPPLICABLE
| 4. APPROVA L DATE (YYMMDD)
960209 F/ASC/FMCS
I 7. APPLICATION/INTERRELATIONSHIP
7.1 This Data Item Description (DID) contains the format and content preparation
instructions for the data product generated by the specific and discrete task requirement as
I delineated in the contract.
7.2 This DID may be applied to programs which utilize the Work Breakdown Structure (WBS)
I during the concept exploration, demonstration and validation, engineering and manufacturing
and development, and production phases.
7.3 This DID supersedes DI-MISC-81183.
IB. APPROVAL LIMITATION 9a APPLICABLE FORMS 9b. AMSCNUMBER
F7180
10. PREPARATION INSTRUCTIONS . ,
10.1 Format . This precedence logic diagram shall be in the contractor's format in the form
of a network, milestone, and Gantt chart. This diagram shall be provided in digital format.
10.2 Content . The schedule shall contain all of the contract IMP events and milestones,
accomplishments, criteria, and activities from contract award to the completion of the
contract. The schedule shall be an integrated, logical network-based schedule that
correlates to the program WBS, and is vertically and horizontally traceable to the
cost/schedule reporting instrument used to address variances (such as Cost Performance Report
(CPR), Cost/Schedule Status Report (C/SSR), etc.) It shall have a numbering system that
provides traceability through the IMP and Statement of Work (SOW). It shall contain program
events and milestones and definitions, summary, intermediate and detailed schedules, and
periodic analysis of progress to date. It shall be possible to access the information by
product, process, or organizational lines. Descriptions of the key elements are as follows:
10.2.1 Program milestones and definitions. Key programmatic events defined by IMP, the
contracting agency or weapon system contractor which define progress and completion in each
WBS element along with the definition for successful completion of the milestone.
10.2.2 Summary master schedules. A graphical display of top-level program activities and
key events and milestones of the IMP which depict major work activities in an integrated
fashion at the summary level of the WBS, e.g. level 1 -3 of the WBS.
S10.2.3 Intermediate schedules. A graphical display of top-level program activities and key
milestones which includes all associated accomplishments of the IMP, traceable to the WBS
element as necessary to display the work effort at the intermediate level of summarization,
e.g. level 3-5 of the WBS as appropriately tailored.
10.2.4 Detailed schedules. A graphical display of detailed activities and milestones which
depict work activities in a particular work breakdown structure element, to include the
criteria associated with each accomplishment of the WBS element as well as any additional
activities necessary to display the work effort to detailed WBS levels, e.g. level 4-8 of the
WBS as appropriately tailored.

It. DISTRIBUTIONSTATEMENT
Distribution Statement A: Approved for public release; distribution is unlimited.
DD Form 1664, APR 89 Previous editions are obsolete RageJLo. _3_

74
04/15/91
DI-MISC-81183

Block 10, Preparation Instructions (Continued)

1
0-2.5 Periodic analysis. A brief summary which identifies progress to date, variances to the planned
schedule, causes for the variance, potential impacts and recommended corrective action to avoid
schedule delays. For each program milestone planned, forecasted and actual completion dates shall be
reported. The analysis shall also identify potential problems and a continuing assessment of the network
critical path. Thresholds for impact reporting shall be identified on the DD Form 1423, CDRL.
10.2.6 Integrated program network. Logical diagram of all activities in the program. The key elements of
the integrated network to be constructed in the diagram are as follows:

a. Milestone or event - A specific definable accomplishment in the program/project network, recognizable


at a particular point in time. Milestones are numbered and may be contained within an activity box.

b. Activity or task - A time consuming element, e.g. work in progress between interdependent events,
represented by an activity box.

c. Duration - Planned length of time needed to accomplish an event/activity.

d. Relationships - A line that defines how two activities or events are logically linked. It can take up to
four (4) forms:

(1) FS (finish to start) - An activity must finish before another can start.

(2) SS (start to start) - An activity depends on the start of another


activity.

(3) FF (finish to finish) - One activity cannot finish until another activity
is finished.

(4) SF (start to finish) - An activity cannot finish until another activity


starts.

e. Slack or Float - Extra time available on an activity before it will impact an activity on the critical path.

f. Lag - The delay or wait period between two tasks.

g. Critical Path - A sequence of activities in the network that has the longest total duration through the
program or project. Activities along the critical path have zero or negative slack/float. It should be easily
distinguished on the report formats, e.g. a thick line, patterned or in red ink. This should be calculated by
computer-based software.

h. Target Start (TS) - A program defined date of when an activity should start. This is an operator-
defined date rather than a computer-calculated date.

i. Target Complete (TC) - A program defined date of when an activity should finish. This is an operator-
defined date rather than a computer-calculated date.

j. Actual Start (AS) - Actual start date of an activity.

k. Actual Finish (AF) - Actual finish date of an activity.

I. Early Start (ES) - The earliest start date an activity can begin the precedence relationships. Computer-
calculated date.

m. Early Finish (EF) - The earliest finish date an activity can end. Computer-calculated date.

n. Late Start (LS) - The latest start date an activity can start without delaying the program or project
target completion date. Computer-calculated date.

Page 2 of 3

75
04/15/91
DI-MISC-81183

Block 10, Preparation Instructions (Continued)

o. Late Finish (LF) - The latest finish date an activity can have without affecting the program or project target completion date.
Computer-calculated date.

p. Percent Complete (PC) - Actual progress of an activity from its start to its finish.

10.3 Master Integrated Program Schedule. It shall display all of the proposed activities, events, and milestones
from contract award to the completion of the contract.
10.4 Descriptive titles. Activities, tasks, events, and milestones shall be labeled with a brief descriptive title,
numbered of coded and contain time constraints (e.g. duration, TS, ES, EF, LS, LF, etc.). Standard abbreviations may be
used to conserve space. Descriptive titles used on activities, events, and milestones shall be identical on all program schedules.
A legend shall be provided to aid in ease of reading the schedules.

1
0-5 Schedule risk. The schedule shall include a description of the approach that will be taken to limit the schedule
risks identified as a result of the contractor's risk assessment. Risk shall be defined considering impact on cost and technical
performance and assessing the probability of schedule change. Additionally, technical performance measurement tasks and
their correlation with contractual cost/schedule elements permit assessment of the program effort in terms of the schedule
as well as cost of work increments. As technical performance measurement tasks, as well as cost reviews, reveal potential
impacts to the schedule these risks will be identified.

10
-5-1 Schedule Risk Assessment (SRA). Optimistic, pessimistic, and most likely durations for each MIPS
activity/task and milestone/event shall be provided as the basis for determining the probability of meeting schedule dates.
The government will assess the durations and use an appropriate cumulative probability (0-100%) for the chosen milestones
to determine expected completion dates.

Page 3 of 3

76
APPENDIX B
Common Time Robbers 1
Incomplete work Misplaced information
A job poorly done that must be done Record keeping
over
Shifting priorities
Poor communications channels
Indecision or delaying decisions
Uncontrolled telephone calls
Procrastination
Lack of adequate responsibility and
commensurate authority Setting up appointments
Poor functional performance and Too many meetings
status reporting
Monitoring delegated work
Changes without direct notification/
explanation Unclear roles/job descriptions
Casual visitors and conversations Unnecessary crisis intervention
Waiting for people Need to get involved in details to get
job done
Failure to delegate, or unwise
delegation Not enough proven or trustworthy
managers
Poor retrieval systems
Vague goals and objectives
Lack of information in a ready-to-use
format Too many people involved in minor
decision making
Day-to-day administration
Lack of technical knowledge
Spending more time than anticipated
in answering questions Lack of authorization to make
judgment decisions
Late appointments
Unreasonable time constraints
Impromptu tasks
Lack of commitment from higher
Having to explain "thinking" to authorities
superiors
Too much travel
Too many levels of review
Lack of adequate project management
Too many people in a small area tools

77
• Poor functional communications/ writ Dealing with unreliable subcontractors
ing skills
Personnel not willing to take risks
• Inability to relate to peers in a personal
Demand for short-term results
way
Lack of long-range planning
• Rush into decisions/beat the deadline
Being overdirected
• Lack of reward ("a pat on the back can
do wonders") Overreacting management
• Expecting too much from one's staff Poor lead time on projects
and oneself
Documentation (reports/red tape)
• Going from crisis to crisis
Large number of projects
• Conflicting directives
Inadequate or inappropriate require-
• Fire drills ments
• Lack of privacy Desire for perfection
• Lack of challenge in job duties Lack of dedication by technical experts
• Bureaucratic roadblocks ("ego") Lack of project organization
• Empire-building line managers Constant pressure
• Too much work for one person to handle Constant interruptions
effectively
Project budget problems
• Excessive paperwork
Shifting of functional personnel
• Lackofclerical/administrativesupport
Lack of qualified manpower
• Workload growing faster than capacity

ENDNOTES
1
Harold Kerzner, Project Management, Van Norstand Reinhold, New York, NY, 1998, Chapter 6.
78
APPENDIX C
GLOSSARY

ACQUISITION STRATEGY — A busi- ages, etc.) scheduled to be accomplished


ness and technical management approach (including in-process work packages), plus
designed to achieve program objectives the amount of level of effort and appor-
within the resource constraints imposed. It tioned effort scheduled to be accomplished
is the framework for planning, directing, withina given time period. (Planned Value)
contracting for, and managing a program.
It provides a master schedule for research, BUDGETED COST OF WORK PER-
development, test, production, fielding, FORMED (BCWP) — A measurement of
modification, postproduction manage- work performed in cost/schedule control
ment, and other activities essential for pro- systems criteria (C/SCSC) terminology.
gram success. Acquisition strategy is the BCWP is a measurement of work performed
basis for formulating functional plans and as compared to the original plan. (Earned
strategies [e.g., test and evaluation master Value)
plan (TEMP), acquisition plan (AP), com-
petition, prototyping, etc.]. BUDGETING — The process of translat-
ing resource requirements into a funding
ACTIVITY—A task or measurable amount profile.
of work to complete a job or part of a
project. CRITICAL PATH METHOD (CPM) — A
technique that aids understanding of the
ACTUAL COST OF WORK PER- dependency of events in a project and the
FORMED (ACWP) — The costs actually time required to complete them. Delayed
incurred and recorded in accomplishing activities that have an impact on the total
the work performed within a given time project schedule are critical and said to be
period. on the critical path.

ARROW DIAGRAM METHOD (ADM) EARNED VALUE MANAGEMENT SYS-


— A type of network diagram that labels TEM (EVMS) — An integrated manage-
the activities on the lines connecting nodes. ment system that coordinates work scope,
schedule, and cost goods and objectively
BAR CHART — The detailed graphical measures progress toward these goals. It is
working plan of a part providing sequence based on an industry-developed set of 32
and time for the job scheduled ahead and guidelines adopted for use by DoD in 1999
progress to date. for evaluation of contractor management
systems. A complete listing of the guide-
BUDGETED COST OF WORK SCHED- lines is contained in DoD 5000.2-R, Appen-
ULED (BCWS) — The sum of the budgets dix VI.
for all work (work packages, planning pack-
79
FLOAT—The period of time that an activ- INTEGRATED PRODUCT TEAM (IPT)
ity may be delayed without becoming a —Team composed of representatives from
critical activity. Also known as slack or all appropriate functional disciplines work-
path float/slack. ing together to build successful programs,
identify and resolve issues, and make
FREE FLOAT — The float that a single sound and timely recommendations to fa-
activity can experience without affecting cilitate decision making. There are three
any other activity. types of IPTs: overarching IPTs (OIPTs)
focus on strategic guidance, program as-
G ANTT CHART—A graphic portrayal of sessment, and issue resolution; working
a project which shows the activities to be IPTs (WIPTs) identify and resolve program
completed and the time to complete repre- issues, determine program status, and seek
sented by horizontal lines drawn in pro- opportunities for acquisition reform; and
portion to the durationof the activity. Some program-level IPTs focus on program ex-
Gantt charts will be able to show the float ecution and may include representatives
for the activity. from both government and after contract
award industry.
INTEGRATED MASTER PLAN (IMP) —
An event-based plan that depicts the over- LINE OF BALANCE (LOB) — A graphic
all structure of the program and the key display of scheduled units versus actual
processes, activities, and milestones. It de- units produced over a given set of critical
fines the accomplishments and criteria for schedule control points on a particular day.
each event in the plan.
MASTER PROGRAM SCHEDULE
INTEGRATED MASTER SCHEDULE (MPS)—The top-level schedule for the pro-
(IMS) — The detailed task and timing of gram. It is prepared by the government
the work effort in the IMP. A networked and includes all policy and contractual
schedule that identifies all IMP events, events/activities. It is derived from the
accomplishment, and criteria, and the ex- Program WBS and provides the baseline
pected dates of each. for all subordinate schedules. It some-
times is called the program structure/
INTEGRATED PRODUCT AND PRO- schedule.
CESS DE VELOPMENT (IPPD)—A man-
agement technique that simultaneously MILESTONE (MS) — The point when a
integrates all essential acquisition activi- recommendation is made and approval
ties through the use of multidisciplinary sought regarding starting or continuing
teams to optimize the design, manufactur- (proceeding to next phase) an acquisition
ing, and supportability processes. IPPD program. Milestones are: 0 [Approval to
facilitates meeting cost and performance Conduct Concept Studies], I [Approval to
objectives from product concept though Begin a New Acquisition Program], II [Ap-
teamwork through Integrated Product proval to Enter Engineering & Manufac-
Teams (IPTs). turing Development (EMD)], and III [Pro-
duction or Fielding/Development and
Operational Support (PF/DOS) approval].
A significant event that marks certain
80
progress, such as completion of a phase of RISK — A measure of the inability to
the project. achieve program objectives within defined
cost and schedule constraints. Risk is asso-
MILESTONE CHART — A graphic ciated with all aspects of the program, e.g.,
portrayal of a program/project that shows threat, technology, design processes, work
the events to be completed on a timeline. breakdown structure (WBS) elements, etc.
It has two components: the probability of
NETWORK SCHEDULE — A scheduling failing to achieve a particular outcome and
technique that provides the means for de- the consequences of failing to achieve that
fining task relationships and relationship outcome.
lags. These may include such precedence
relationships as "Start to Start," "Finish to RISK MANAGEMENT — All plans and
Finish," and "Start to Finish." actions taken to identify, assess, mitigate,
and continuously track, control, and docu-
PERT — See Program Evaluation Review ment program risks.
Technique.
SCHEDULE — Series of things to be done
PERT Chart—A graphic portrayal of mile- in sequence of events within given period;
stones, activities, and their dependency a timetable.
upon other activities for completion and
depiction of the critical path. SCHEDULE RISK — The risk that a pro-
gram will not meet its acquisition strategy
PRECEDENCE DIAGRAM METHOD— schedule objectives or major milestones
A network diagram in which the activities established by the acquisition authority.
are labeled in the nodes, usually boxes.
SCHEDULE VARIANCE — A metric for
PRODUCTION SCHEDULES—Chrono- the schedule performance of a program. It
logical controls used by management to is the algebraic difference between earned
regulate efficiently and economically the value (BCWP) and planned value (BCWS)
operational sequences of production. (Variance = BCWP - BCWS). A positive
value is a favorable condition while a
PROGRAM EVALUATION REVIEW negaive value is unfavorable.
TECHNIQUE (PERT) — A technique for
management of a program from inception SCHEDULING—The prescribing of when
through to completion by constructing a and where each operation necessary to the
network model of integrated activities and manufacture of a product is to be per-
events and periodically evaluating the formed.
time/cost implications of progress.
WORK BREAKDOWN STRUCTURE
RESOURCE LEVELING — A process (WBS) — An organized method to break
whereby resources are sorted out among down a project into logical subdivisions or
tasks and activities to identify and avoid subprojects at lower and lower levels of
conflicts between scheduling and avail- details. It is very useful in organizing a
ability. project. See MIL-HDBK 881 for examples
ofWBSs.
81
82
APPENDIX D
BIBLIOGRAPHY

Q. W. Fleming, J. W. Bronn, and G. C. Defense Systems Management College,


Humphreys, Project and Production Sched- Earned Value Management Textbook, DSMC,
uling, Probus Publishing Co., Chicago, IL, Fort Belvoir, VA, April 16,1998.
1987.
Office of the Under Secretary of Defense
H. Kerzner, Project Management: A Systems (Acquisition and Technology), DoD Inte-
Approach to Planning, Scheduling, and Con- grated Product and Process Development Hand-
trolling, Van Nostrand Reinhold, New York, book, DoD, Washington, DC, 1998.
NY, 1998.
D. T. Hulett, "Project Schedule Risk As-
M. D. Rosenau, Jr., Successful Project Man- sessment," Project Management Journal,
agement: A Step-by-Step Approach WithPrac- March 1995.
tical Examples (2nd Edition), Van Nostrand
Reinhold, New York, NY, 1992. PMI Standards Committee, A Guide to the
Project Management Body of Knowledge,
D. C. Cleland, Field Guide to Project Manage- Project Management Institute, Newton
ment, Van Nostrand Reinhold, New York, Square, PA, 1996.
NY, 1998.
J. R. Knutson, How To Be A Successful Project
J. J. Mayer, Time Management for Dummies Manager, IEEE Successful Management
(2nd edition), IDG Books Worldwide, Inc., Series, Undated.
Foster City, CA, 1999.
J.P. Lewis, Project Planning, Scheduling &
Defense Systems Management College, Co«fro/,McGraw-Hill,NewYork,NY,1995.
Acquisition Strategy Guide, DSMC, Fort
Belvoir, VA, 1998.

83
DSMC PRESS
WANTS TO HEAR FROM YOU

Please rate this publication in various ways using the following scores:
4—Excellent 3—Good 2—Fair 1—Poor O—Does not apply

Name of this publication—Scheduling Guide for Program Managers

This publication:
A. is easy to read.
B. has a pleasing design and format.
C. successfully addresses acquisition management and reform issues.
D. contributes to my knowledge of the subject areas.
E. contributes to my job effectiveness.
F. contributes to my subordinate's job effectiveness.
G. is useful to me in my career.
H. I look forward to receiving this publication.
I. I read all or most of this publication.
J. I recommend this publication to others in acquisition workforce.

How can we improve this publication? Provide any constructive criticism for us to
consider for the future.

What other DSMC publications do you read?

OPTIONAL
Name/
Title
Company/Agency_
Address

Work Phone ( ) DSN FTS_


Fax Email

Please mail me a brochure listing other DSMC publications.


Please send a free subscription to the following at the address above.
Acquisition Review Quarterly Acquisition Reform Today Newsletter

Copy this form and fax it to DSMC Press at (703) 805-2917.

You might also like