What is Critical Chain Project Management?

What is Critical Chain Project Management?
...

Eshna Verma

Published on January 1, 2012


  • 16590 Views
Critical Chain Project Management

A Brief Overview

Critical Chain Project Management was developed and publicized by Dr. Eliyahu M. Goldratt in 1997. Followers of this methodology of Project Management claim it to be an alternative to the established standard of Project Management as advocated by PMBOK® and other Standards of Project Management. This article attempts to provide a brief overview of the Principals of Critical Chain Project Management and its applicability to manage Projects across all organizations and verticals.

The Critical Chain Method has its roots in another one of Dr. Goldratt’s inventions, namely, The Theory of Constraints (TOC). This Project Management Method comes into force after the initial Project Schedule is prepared, which includes establishment of the task dependencies. The evolved Critical path is reworked based on the Critical Chain Method. To do so, the methodology assumes constraints related to each task.

A few of these constraints are listed out below:

  • There is a certain amount of uncertainty in each task
  • Task durations are often overestimated by the Team Members or Task Owners. This is typically done to add a safety margin to the task so as to be certain of its completion in the decided duration.
  • In most cases, the tasks should not take the time estimated, which includes the safety margin, and should be completed earlier.
  • If the Safety Margin assumed is not needed, it is actually wasted. If the task is finished sooner,it may not necessarily mean that the successor task can start earlier as the resources required for the successor task may not be available until their scheduled time. Hence, the saved time cannot be passed on to finish the Project early. On the other hand, if there are delays over and above the estimated schedules, these delays will most definitely get passed on, and, in most cases, will exponentially increase the Project Schedule.

With the above assumptions, the Critical Path Methodology of Project Management recommends pooling of the task buffers and adding them at the end of the Critical path

Critical Path Methodology

The Critical Path Project Management defines three types of Buffers - 

  1. Project Buffer -  The total pooled buffer shown above (Fig 1.1) is referred to as the Project Buffer.
  2. Feeding Buffer - In a Project Network, there are path/s which feed into the Critical path. The pooled buffer on each such path represents the Feeding Buffer to the Critical Path(Fig1.2) resulting in providing some slack to the critical Path.
  3. Resource Buffer- This is a virtual task inserted just before critical chain tasks that require critical resources. This acts as a trigger point for the resource, indicating when the critical path is about to begin.

CCPM Methodology

As the Progress of the Project is reported, the Critical Chain is recalculated. In fact, monitoring and controlling of the Project primarily focuses on utilization of the Buffers. Hence the Critical Chain Method considers the basic Critical Path based Project Network and Schedule to derive a completely new Schedule.

The Critical Path Project Management Methodology is veryeffective in organizations which do not have evolvedProject Management Practices.

However, the methodology does not advocate multi-tasking, and in Projects with complex Schedule Networks, the results of implementing the Critical path Methodology have proven to be deterrent to the overall Project Schedule. In addition, there is no standard method for calculating and optimizing the Project Buffers. The Critical Path Project Management Methodology has had a fair amount of success in manufacturing domains though it has not achieved any noteworthy success in the IT Sector.

Along similar lines, the Event Chain Methodology of Project Management focuses on determining the uncertain events and the chain Reactions they propagate. It is a method of modelling uncertainties and is based on Monte Carlo Analysis, Bayesian Believe Network, and other established simulation methodologies. When they occur, events can cause other events, triggering an Event Chain, which will effectively alter the course of the Project. Events and Event Chains are identified and a Quantitative Analysis is performed to determine the extent of the uncertainty and the probable impact of the same on the Project. From this exercise, Critical Event Chains are derived, which have the potential to impact the project significantly. Event Chain diagrams are visual representations of Events, Event Chains, and their impact.

It is clear that neither the Critical Path Project Management Methodology nor the Event Chain Methodology can be considered as alternatives to the standard Methodology for project Management as advocated by PMBOK®. While the Critical Path Project Management Methodology can be at best used as a tool for deriving Project Schedule networks, the Event Chain Methodology for Project Management can be used as a tool for Quantitative Risk Analysis.

Loved the article? Looking to learn more about Project Management? Visit our free resources library for more lessons!


We provide CAPM certification training in the following cities:
 
PUNE DELHI EDMONTON
BANGALORE KOLKATA VANCOUVER
HYDERABAD AHMEDABAD VICTORIA
MUMBAI MONTREAL RENO
CHENNAI MISSISSAUGA PLANO

About the Author

Eshna is a writer at Simplilearn. She has done Masters in Journalism and Mass Communication and is a Gold Medalist in the same. A voracious reader, she has penned several articles in leading national newspapers like TOI, HT and The Telegraph. She loves traveling and photography.


{{detail.h1_tag}}

{{detail.display_name}}
...

{{author.author_name}}

Published on {{detail.created_at| date}} {{detail.duration}}

  • {{detail.date}}
  • {{detail.time}} {{detail.time_zone_code}}

Registrants:{{detail.total_registered_number}}

Downloaded:{{detail.downloads}}

About the Webinar

Hosted By

...

{{author.author_name}}

{{author.about_author}}

About the E-book

Register Now!

Webinar Expired

Download the Ebook

Name
Email
Please enter valid email id!

Show full article video

About the Author

{{author.about_author}}