1. Trang chủ
  2. » Giáo án - Bài giảng

Module 7 - Schedule Risk Analysis - Rev 0

53 276 1

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 53
Dung lượng 5,26 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

The complete training program consists of the following modules: Module 1 - Introduction To Project Controls Module 2 - EPC Schedule Development including P6 user skills Module 3 - Servi

Trang 1

MODULE 7– SCHEDULE RISK ANALYSIS

Trang 2

MODULE 7 - SCHEDULE RISK ANALYSIS

0 Released for Global Implementation Ed Cimic Project Controls

R5 Management Team

Project Controls R5 Management Team

1 Nov 2011

This document has been prepared for the exclusive use of WorleyParsons

Copying this document without the permission of WorleyParsons is not permitted

SPECIAL ACKNOWLEDGEMENTS:

Mark Spanos,

“A pessimist because of intelligence, an optimist because of will”

Trang 3

NOTE: Review of Module 1– Introduction to Project Controls is required prior to studying this module.

This Training Module is part 7 of an 8 modular training program designed to provide the participants with an overall introduction to the skills & knowledge required by Project Controls when executing an EPCM / PMC project

The complete training program consists of the following modules:

Module 1 - Introduction To Project Controls

Module 2 - EPC Schedule Development (including P6 user skills)

Module 3 - Services Management (including InControl V8.0 user skills)

Module 4 - Commercial Performance Management

Module 5 - Introduction to TIC Cost Estimation

Module 6 - TIC Management (including Prediction Plus / InControl V10 user skills)

Module 7 - Schedule Risk Analysis (including Primavera Risk Analysis user skills)

Module 8 - Cost Risk Analysis (including @Risk user skills)

The aim of this document is to provide a hands-on guideline to assist the project controller in obtaining

a basic understanding of the Schedule Risk Analysis process

Upon completion of Module 7, participants will be able to:

 Understand the concept of Schedule Risk Analysis

 Convert an EPC Schedule into a Schedule Risk Analysis Model

 Understand the Risk Ranging Process

 Generate Schedule Risk Analysis Reports / Graphs

 Understand and Interpret Schedule Risk Analysis Reports

 Utilise the basic functions of Primavera Risk Analysis

Trang 4

Module Content:

1.1 Uncertainty and Risk in Cost Estimation 6

2.0 Project Risk Management 8 2.1 Risk Planning 8

2.2 Risk Identification 8

2.3 Qualitative Risk Analysis 10

2.4 Quantitative Risk Analysis 13

2.5 Risk Response Planning 15

2.6 Risk Monitoring & Control 18

3.0 Quantitative Schedule Risk 19 3.1 Schedule Risk Analysis: Key Steps 19

3.2 Basic Principles 21

4.0 Cost Risk Analysis Process 28 4.1 Background 29

4.2 Can we meet the deadline? 30

4.3 Main Execution Contracts 32

4.4 Contract 1- EPCM 32

4.5 Contract 2 - Module Fabrication 32

Trang 5

6.6 Contract 3 - Transport & Installation 33

6.7 Contract 4 - Brownfield Modifications / Tie-ins / HUC 33

6.8 Contract 5 - Accommodation Vessel 33

Training Exercises

Exercise 1 - Develop Cost Risk Analysis Model 34

Exercise 2 - Risk Analysis Process 44

Exercise 3 - Risk Analysis Results & Reports 51

Attachment 1 - Risk Model (042_TRN007_xx.xls)

Trang 6

ules more often than not overrun their targets

Schedule slippages can result in schedule Critical Path changes;

Changes in the Critical Path often impact originally planned project execution strategies

And so on…

So why does all this happen?

Most of the schedule slippages are usually explained by one of the following factors:

imposed unrealistic targets

completeness/correctness of activities logical sequencing

improper use of constraints

inadequate resources loading However, the fundamental rea-son for schedule slippages lies in the very nature of CPM (Critical

CPM technique itself leads to the optimistic result due to “as soon as possible” approach

Project completion date gets predicted, and regarded as a certain, solid commitment against which a number of project performance targets are established

The fact that activity durations (and associated costs) are only estimates, and therefore uncer-tain, means that they may not go

as planned, but may take more

or less time to complete

This is true even for activities repeated many times over a number of projects

Figure 1 on page 7 illustrates that fact by showing the original (likely) activities’ durations as bars, along with triangular shapes at the bars right end points representing possible ranges of optimistic and pessi-mistic activity durations

Supported by experience and measured evidence from pro-jects, this likely variability of ac-tivities durations, enhanced by complexities of their logical rela-tionships, often impacts major milestone(s) or overall schedule

1.1 CPM (CRITICAL PATH

METHOD) & CERTAINTY

versus UNCERTAINTY

PCDP Module 2 - EPC Schedule

Development described the

pro-cesses, techniques and tools

used by WorleyParsons to build

project schedules

Not much different than with any

other organization engaging in

project delivery: project plans

and schedules are one of the

essential tools of project

man-agement

PMI (Project Management

Insti-tute) suggest in their best

prac-tices documents that all projects

must be managed to their

sched-ules

And yet, despite all knowledge,

sophisticated software and

en-gagement of experienced Project

Delivery teams, project

sched-“When you reach the top, keep climbing”

~ / ~ Zen proverb

Trang 7

Sometimes this impact may

take place as a surprise,

be-tween two reporting periods

and have dramatic

conse-quence, and some other times,

a number of small,

incremen-tal changes over longer

peri-ods may add to a significant

impact on project schedule

With the repeated reference to

the PCDP Module 2, where

aspects of schedule

uncertain-ty are brought up in its sections

5.8 Risks and Opportunities

and 5.13 Schedule Reserve,

this PCDP module 7 is

dedicat-ed to the review of probabilistic

approaches and related

pro-cesses, techniques and tools

The processes of project risk

management will be described

in more detail in the

subse-quent sections

Schedule risk analysis comes

with answers not possible or

not available in CPM planning/

scheduling approach:

 Probabilistic View offering

 Uncertain durations (and costs) are defined by three-

point estimates - optimistic (low or minimum), likely and pessimistic (high or maxi-

mum)

Durations (and costs) are expressed as PDFs (Probability Distribution Func-tions)

The range of expected values (dates, costs) are obtained by simulation

Some of the benefits of schedule risk analysis are:

It provides a range of possible completion dates (range of expected costs) along with corresponding probabilities

Provides the extent of possible overruns and required contin-gency reserve

Identifies the areas of greatest risks, inclusive of analysis of near-critical paths

Provides inputs to risks sponse plans

re-And more…

But before continuing with the more focused and detailed train-ing in quantitative schedule risk analysis, the entire next chapter

is dedicated to the broader ject of project risk management, and as such it is shared / repeat-

sub-ed in the PCDP Module 8 - Cost Risk Analysis

Figure 1 – Activity Duration Uncertainty

Trang 8

Risk management is an essential

and integral part of the

Wor-leyParsons project delivery

pro-cess

Understanding project risks is

key for successful

implementa-tion of cost risk analysis

As per PMI PMBOK Guide – 4th

Edition (ANSI/PMI

99-001-2008):”The objectives of Project

Risk Management are to

in-crease the probability and impact

of positive events and decrease

the probability and impact of

negative events in the project.”

Project Risk Management

in-cludes the processes of

conduct-ing risk management plannconduct-ing,

identification, analysis, response

planning, and monitoring and

control on a project

2.1 RISK PLANNING

Planning for risk management is

the process that defines how to

approach, plan, and execute the

risk management activities for a

project It creates a roadmap for

the remaining risk management

processes

This process is general and high

level in nature and therefore

takes place early on the project

The output of the risk

manage-ment planning is the Risk

Man-agement Plan (RMP)

The RMP details the risk

man-agement activities that will be

undertaken by the project ing the purpose, scope, process, responsibilities and extent of technical risk studies

includ-Another important part of risk management plan is a descrip-tion of how risks will be catego-rized

A tool for creating consistent risk categories is the Risk Break-down Structure (RBS)

In the RBS, the categories of risks are decomposed into fur-ther details An example of RBS showing risk categories is shown

in Figure 3

The risk management plan is plotted out by meeting with all appropriate stakeholders

This is followed up with a further analysis to determine the appro-priate level of risk and the ap-proach warranted on the project

The RMP is either referred to or included in the Project Execution Plan (PEP) as required For more information, please refer to the EMS Task Sheet PAP-9002

2.2 RISK TION

IDENTIFICA-Risk identification is a formalized process that identifies which risks could impact the project and to understand the nature of these risks

Risk identification builds the “risk

register”, which is a list of all risks, their causes, and any pos-sible responses to those risks that can be identified at this point

in the project (Please refer to WorleyParsons Risk Manage-ment Software Ver 4.05, its risk register template and guideline) Typically, identifying the risks is the first step in the Cost Risk Analysis process There are various tools available for the risk identification process:

Documentation Reviews

A documentation review is tured review of project documen-tation, including cost estimate and schedule basis, assump-tions, prior project files, and oth-

struc-er information

The documentation is reviewed for completeness, correctness, and consistency

Information Gathering Techniques

There are numerous techniques for gathering information to cre-ate the risk register

“My education was interrupted only by my schooling.”

~/~

Winston Churchill

Trang 9

The techniques most commonly applied in the context of risk are:

Although it may not be tive, this tool provides structure

exhaus-to the Risk Identification process

Assumption Analysis

Assumptions should not only be documented, they should also be analysed and challenged if nec-essary

Diagramming Techniques

Ishikawa diagrams, also called cause-and-effect diagrams and fishbone diagrams, are another way to show how potential caus-

es can lead to risks

Another diagramming method used to identify risks is Influence Diagram This diagram shows how one set of factors may influ-ence another

For instance, late arrival of rial may not be a significant risk

mate-by itself, but it may influence other factors, such as triggering overtime work or causing quality problems later on in the project due to inadequate time to properly perform the work

Figure 3– Example Risk Breakdown Structure (RBS)

“I have a

Trang 10

Finally, flow charts are useful in

identifying risks Flow charts are

graphical representation of

com-plex process flows

They are especially helpful when

used to “sketch” something very

complex into an understandable

diagram

SWOT Analysis

Strengths, Weaknesses,

Oppor-tunities and Threats (SWOT)

analysis is another practical tool

used to identify potential risks

and group them into four chart

quadrants representing strengths

(S), weaknesses (W),

opportuni-ties (O), and threats (T)

Strengths and weaknesses are

usually of internal nature, while

opportunities and threats present

themselves as external risks to

project

SWOT analysis can give another

perspective on risks that will

often help identify the most

sig-nificant project risk factors

WorleyParsons provides a

brain-storming prompt list to aid in the

identification of Threats and

Op-portunities which may arise

Please refer to the EMS

CRP-0013 Risk Brainstorming Prompt

List for additional details

2.3 QUALITATIVE RISK

ANALYSIS

Qualitative risk analysis process

helps to rank and prioritize the

risks so that the right emphasis

is put on the right risks

It helps to ensure that time and resources are spent in the ap-propriate risk areas

Qualitative risk analysis is a risk probability and impact assess-ment process

It takes each risk from the risk register and analyses its proba-

bility of occurring and impact to the project

Risk Event = Risk Probability x

Impact (Value)

Probability = Frequency of

Rel-evant Event / Total Number of Possible Events

Impact = Value of Loss / Gain

Figure 4– SWOT Analysis Chart

“Between two evils, I always choose the one I never tried before”

~/~ Mae West

Trang 11

By using the probability and impact matrix (PIM), a prioritiza-tion and ranking can be created, which is updated on the risk register

Each risk in the risk register is evaluated for its likelihood of occurring (probability) and its potential impact on the project

Each of these two values are given a ranking:

Risk Probability Scale falls tween 0.0 – no probability, and 1.0 – certainty

be-Risk’s Impact Scale can be scriptive, i.e very low, low, me-dium, high, very high; or numeric 0.1/0.3/0.5/0.7/0.9

de-The risk probability and impact are multiplied together to get a risk score

This resulting score is used to set priorities and relative risk ranking WorleyParsons pro-vides guidelines for Likelihood and Consequence scales in risk assessments (For more, please

refer EMS document CRP-0012) Teams are advised to review the categories and determine a

scale that is relevant to their project

Trang 12

“Risk Analysis is no more about risk than astronomy is about telescopes

~/~ Edsger W Dijkstra

Figure 5– Sample Risk Register

Trang 13

The main output from the

Quali-tative Risk Analysis is an

updat-ed Risk Register The next step

is to add more details to the

register including the following:

Relative ranking or priority of

project risks

The urgency of the risks

The categorization of the risks

The Risk treatment plan, and

Any trends that were noticed

in performing the qualitative

risk analysis

An example of the risk register is

shown in Fig 5 on page 14

2.4 QUANTITATIVE RISK

ANALYSIS

Performing Quantitative Risk

Analysis generally follows the

risk identification and qualitative

risk analysis

It is the process of numerically

analysing the effect of identified

risks on project objectives

It is performed on risks that have

been prioritized by the

Qualita-tive Risk Analysis process as

potentially and substantially

impacting the project’s

compet-ing demands

Quantitative Risk Analysis

anal-yses the effect of those risk

events and assigns a numerical rating to those risks individually

or evaluates the aggregate fect of all risks affecting the pro-ject

ef-It also presents a quantitative approach to making decisions in the presence of uncertainty

There are various tools and methods available for quantita-tive risk analysis process:

Data Gathering & tion techniques (Interviewing)

Representa-Interviewing uses a structured interview to ask experts about the likelihood and impact of identified risks

After interviewing several perts, for instance, the project manager might create pessimis-tic, optimistic, and realistic val-ues associated with each risk

ex-Sensitivity Analysis

Sensitivity analysis is used to determine which risks have the most potential impact and the

degree of overall project ity to any of the evaluated risks while all other variables are kept constant

sensitiv-It’s the simplest form of risk ysis, which helps to determine which risks have the most poten-tial impact on the project

anal-It examines the extent to which the uncertainty of each project element affects the objective examined, when all other uncer-tain elements are held at their baseline values

The advantage of this method is that it gives a range of possible outcomes in which critical varia-bles are easily compared in a sensitivity diagram

The weakness of this method is that variables are treated individ-ually, limiting the extent to which combinations of variables can be assessed, and a sensitivity dia-gram gives no indication of antic-ipated probability of occurrence

Trang 14

Probability Analysis

Probability analysis overcomes

the limitations of sensitivity

analy-sis by specifying a probability

distribution for each variable

Probability distributions are

math-ematical representations that

show the probability of an event

occurring

The probability is usually

ex-pressed as a table or graph

Consider flipping a coin as an

example

There would be two possible

outcomes from this event: head

or tail

Now imagine flipping this coin six

times Doing this, the probability

of the coin landing on heads a

given number of times can be

analysed

Probability distributions are very

useful for analysing risks

They consider situations where

any or all of risk variables can be

changed at the same time,

allow-ing the project manager to take a

good look at the probability of an

event occurring and to make a

rational decision about how to

approach the risk

The most typical probability

distri-butions used in quantitative risk

analysis are:

Triangular, if Optimistic (Min), Pessimistic (Max) and Most Likely scenarios are used

Normal or Log Normal, if mean and standard deviation are used

Other common distribution types include: trigen, uniform, beta, pert, etc

The disadvantage of using the probability analysis method is that defining the probability of occurrence for any specific varia-ble may be difficult, as every project is different

Expected Monetary Value Analysis (EMV)

Expected monetary value sis takes uncertain events and assigns a most likely monetary value

analy-It is a statistical concept that calculates the average outcome

of future scenarios

Opportunities are expressed as positive and threats are ex-pressed as negative values

EMV is calculated by multiplying the outcome’s values and proba-bilities, and adding them togeth-

er

EMV is typically calculated by using decision tree analysis

Decision Tree Analysis

Decision trees describe a sion under consideration and the implications of choosing one or another of the available alterna-tives It incorporates probabilities

deci-of risks and the costs or rewards

of each logical path of events and future decisions

“When someone says he’s going to put all his cards on the table, always look up his sleeves”

~ / ~ Lord Leslie Hore-Belisha

Trang 15

Solving the decision tree cates which decision yields the greatest expected value to the decision maker when all the un-certain implications, costs, re-wards, and subsequent decisions are quantified

indi-Modelling and Simulation

Modelling and simulation ods are approaches that trans-late the uncertainties into their potential impact on project objec-tives

meth-There are almost as many types

of simulation as there are jects; however, one technique used for schedule and cost risk analysis is Monte Carlo simula-tion

pro-Cost risk modelling and Monte Carlo simulation using @Risk software is the preferred method used by WorleyParsons Sched-

ule risk modelling and Monte Carlo simulation using Pri-mavera Risk Analysis Expert (formerly Pertmaster) is the pre-ferred method used by Wor-leyParsons

2.5 RISK RESPONSE PLANNING

Earlier, in the process of Plan Risk Management, we created a general approach to risk ( the risk management plan)

Then, in risk identification cess, we created a list of risks and started our risk register

Then we qualitatively and tatively analysed the risks, and now we are ready to create a detailed plan for managing the risks

quanti-This is exactly what Risk sponse Planning does; it creates

Re-a plRe-an for how eRe-ach risk will be handled The resulting plan is actionable, meaning that it as-signs specific tasks and responsi-bilities to specific team members

Remember that risk can be a positive (opportunity) or negative (threat) event

Figure 6 – Sample Decision Tree

EMV of the Chance Node $ 41.5M

EMV of the Decision

$ 49

Build or Upgrade?

Build New Plant

Upgrade Existing Plant

Strong Demand

Weak Demand

Strong Demand Weak Demand

Trang 16

“If an expert says it can’t

be done, get another expert”

~ / ~ David Ben- Gurion

Therefore, careful consideration

must be given to each risk,

whether the impact of that risk is

positive or negative

Avoidance

Avoidance is changing project

plan to eliminate risk, to isolate

the project objectives form the

risk’s impact, or to relax the

ob-jective that is in jeopardy

Examples of this method are

extending the schedule, reducing

scope to avoid high-risk

activi-ties, adopting familiar approach

instead of innovative one, and

avoiding an unfamiliar

subcon-tractor

Transference

Transferring a risk is shifting the

negative impact of a threat, along

with the ownership of the

re-sponse, to a third party

Contractual agreements,

warran-ties, and insurance are common

ways to transfer risks

Mitigation

Mitigating a risk is the reduction

in the probability and/ or impact

of an adverse risk event to an

acceptable threshold

For instance, if you were

con-cerned about the risk of winter

weather damage to a

construc-tion project, a mitigaconstruc-tion plan can

be to construct the building side of the winter season

out-As stressed earlier, risks can be positive or negative, and where positive risks are concerned, the project manager wants to take steps to make them more likely

The following are specific gies taken to capitalize on the positive risks

strate-Exploit

Exploit means eliminating the uncertainty associated with an upside risk by making the oppor-tunity definitely happen

For instance, if a positive risk of finishing the project early is iden-tified, then adding more talented resources to ensure that the project is completed early would

be an example of exploiting the risk

Share

In order to share a positive risk, the project seeks to improve their chance of risk occurring by work-ing with another party

For example, if a contractor tifies a positive risk of getting a large order, they may determine that sharing that positive risk by partnering with another contrac-tor would be an acceptable strat-egy

iden-Enhance

Enhancing is modifying the “size”

of an opportunity by increasing probability and/or positive im-pacts, and by identifying and maximizing key drivers of these positive-impact risks

Enhancing a positive risk first requires understanding the un-derlying causes of the risk

By working to influence the derlying risk triggers, you can increase the likelihood of the risk occurring

un-For example, an airline might add flights to a popular route during holidays to enhance traffic and profitability during heavy travel times

Trang 17

that didn't tell

you all about

When accepting a risk you are simply acknowledging that the best strategy may not be to avoid, transfer, mitigate, share,

or enhance

Instead, the best strategy may be simply to accept it and continue with the project

There are two kinds of ceptance strategies:

ac-Passive Acceptance: requires

no action, leaving project team to deal with the threats or opportu-nities as they occur

Active Acceptance: establishing

a contingency reserve, including amounts of time, money, or re-sources to handle known, or sometimes potential, unknown threats or opportunities

Acceptance may be the best strategy if the cost or impact of the other strategies is too great

Contingent Response Strategy

A contingent response strategy is one where the project team may make one decision related to risk, but make that decision con-tingent upon certain conditions

It is a response designed for use only if certain events occur, or predefined conditions take place

For example, a project team may decide to mitigate a technology risk by hiring an outside firm with expertise in that technology, but that decision might be contingent upon the outside firm meeting intermediate milestones related

devel-In Risk Response Planning cess, appropriate responses are chosen, agreed-upon, and in-cluded in the risk register

pro-Components of the risk register

at this point can include:

Identified risks, their tions, their causes (eg RBS element), and how they may affect project objectives

descrip-Risk owners and assigned responsibilities

Outputs from the qualitative and quantitative risk analysis, including prioritized risks and probabilistic analysis of the project

Agreed-upon response gies

strate-Specific actions to implement the chosen response strategy

Symptoms and warning signs

of risks’ occurrence

Budget (or schedule) activities required to implement the cho-sen responses

Contingency reserves signed to provide for stake-holders’ risk tolerances

de-Contingency plans and triggers that call for their execution

Fallback plans for use as a reaction to a risk that has oc-curred, and the primary re-sponse proves to be inade-quate

Residual risks that are pected to remain after planned responses have been taken, as well as those that have been deliberately accepted

ex-Secondary risks that arise as a direct outcome of implementing

a risk response

Contingency reserves that are calculated based on the quanti-tative cost risk analysis

Trang 18

“If opportunity doesn’t knock, build a door”

~ / ~ Milton Berle

2.6 RISK MONITORING &

CONTROL

Plans have to be re-assessed

and re-evaluated

Where risk is concerned, we’ve

done quite a bit of planning,

iden-tifying, analysing, and predicting,

but the process of Risk

Monitor-ing & Control takes a look back

to evaluate how all of that

plan-ning is liplan-ning up with reality

Monitor and control risks is a

process that is performed almost

continually throughout the

pro-ject

Risk Assessment

As you perform a project, your

information about risks changes

You should assess this

infor-mation as often as necessary in

order to make sure that the risk

needs of the project are current

and accurate

Risk Audits

Risk audits are focused on

over-all risk management In other

words, they are more about the

top-down process that are about

the individual risks

Periodic risk audits evaluate how

the risk management plan and

the risk response plan are

work-ing as the project progresses and

also whether or not the risks that were identified and prioritized are actually occurring

Variance and Trend Analysis

Variance analysis focuses on the difference between what was planned and what was executed

Trend analysis shows how formance is trending

per-The reason trend analysis is important is that a one-time snapshot of cost may not cause concern, but a trend showing worsening cost performance may indicate that things are steadily worsening and may indicate that

a problem is imminent

Technical Performance Measurement

Performance can take on many flavors In the risk context, tech-nical performance measurement focuses on functionality, looking

at how the project has met its goals for delivering the scope over time

re-Status Meetings

This particular technique is not necessarily suggesting that spe-cially called status meetings related to risk are called

Instead, it is suggesting to create

a project culture where bringing

up items related to risk is always acceptable and risk is discussed regularly

Trang 19

3.1 SCHEDULE RISK ANALYSIS: KEY STEPS

In Section 1 we briefly addressed the subject of CPM (Critical Path Method) and its deterministic nature in relation to uncertainty and probabilistic approach

It is important to understand that the schedule risk analysis does not replace the CPM but it takes

it beyond its reach

The CPM remains the key ing block in the whole process,

build-as the quality of the CPM ule is directly related to the quali-

sched-ty of risk analysis outputs

In other words, the results of the schedule risk analysis (and the same applies to cost risk analysis for cost estimates), do not change the project schedule (or cost estimate) but may directly or

indirectly help to improve them based on the informed decisions made in conjunction with these results

In practice, we also see more of

“risk adjusted schedules”, but more as a result of informed decisions made

The major steps in schedule risk analysis are:

CPM Schedule Development

Develop a quality CPM ule that reflects the project scope and execution strategy

sched-The schedule should show the important project structure and clearly define parallel paths and their meeting points

In the case of large number of activities, focus on those on critical and near critical paths

first, then expand if necessary

— use of “risk banding” or QRTs (Quick Risk Templates) may be an option for large numbers of activities

Avoid open ends in the ule logic, they compromise the schedule integrity

sched-Date constraints should be removed, or minimal

Risk Inputs and Activity tion Ranges

Dura-Risk inputs into the model can be performed in a number of ways, depending on which tool is cho-sen for it: Primavera P6 or Pri-mavera Risk Analysis (previously known as Pertmaster), and using one or combination of techniques explained in Section 2:

Trang 20

Assess the activity duration

ranges as three point

esti-mates: optimistic, likely and

pessimistic

Keep in mind that in the CPM

schedule, original activity

dura-tions may not be the most

likely ones

Choose / Determine

appropri-ate PDFs (Probability

Distribu-tion FuncDistribu-tion)

Simulation, Reporting,

Deci-sion Making

Simulation is performed using the

Primavera Risk Analysis

(Pertmaster), a Monte Carlo

Method based schedule and cost

analytics tool

The results of simulation provide

the answers to a number of

criti-cal questions like:

Are the major milestones dates

and project completion date

feasible or achievable

How likely those dates are,

therefore whether the overall

project duration is the most

likely one or not

How much time or how many

days of contingency might be

needed to bring the completion

date(s) to an acceptable risk

tolerance levels

Schedule Risk Analysis and

Flow Diagram

The following flowchart illustrates

the major steps and processes

involved:

Review Project ule and Aspects of each Project Stage

Sched-Develop Schedule Risk Model in Primavera P6

or in Primavera Risk Analysis

Conduct Risk Ranging Session

Run Simulation

Generate Analysis Graphs

Prepare Schedule Risk Analysis Report

Schedule Basis Document Critical & Near-Critical Paths, Logic, Constraints, Calendars,

Key Schedule Drivers

Risk Inputs Layout

Appropriate Participants Risks Register

Choice of PDFs

Monte Carlo Simulation using Primavera Risk Analysis

Probability Distribution Sensitivities, Index ‘Tornado’

Graphs, P10 / P90 Windows and Mean Dates

Detailed narrative of Schedule Development

Rationale behind Key Schedule Drivers Conclusion / Recommendation Risk Analysis Outputs and Graphs

“The truth is like sunlight, people used

to think it was good for you”

~ /~ Nancy Gribble

Trang 21

3.2 BASIC PRINCIPLES

Single Logical Path Schedule

To demonstrate the basic

princi-ples of what was described on

previous pages, we will start with

the simple schedule shown in

Figure 3.2.1 - Single Logical Path

Schedule

The activities in the CPM

sched-ule are sequential, with all FS

(finish-to-start) relationships,

(with the exception of project

finish milestone having FF,

finish-to-finish relationship)

The activity durations are fixed

and because of no overlap

be-tween them, the total project

duration is the sum of all activity

durations

The CPM also predicts the finish date But how likely is the pre-dicted project finish date?

As the Figure 3.2.2 shows, the introduction of schedule probabil-istic view, where activities dura-tions are not certain but can take any value between defined mini-

mum and maximum, a number of project finish dates are obviously possible

Figure 3.2.3 shows an example of

a triangular PDF for one activity minimum, likely and maximum (Activity A1010 - Design Line #1)

Figure 3.2.1 - Deterministic Single Logical Path Schedule

Figure 3.2.2 - Probabilistic Single Logical Path Schedule

Figure 3.2.3 - Triangle PDF (for A1010)

Trang 22

Figure 3.2.4 shows the result of

simulation with the range of

pos-sible project finish dates

Given the defined risk inputs

(Figure 3.2.2), the risk outputs

show that the original

(deterministic) project finish is

unlikely - only 15% (P15)

A number of days of contingency

would be needed to bring the

project completion date to P50 or

higher

Parallel Logical Paths

Schedule

Most of our project schedules are

not as simple as the one used on

the previous page

Typical scenario is that there are many more activities, with more complex logical relationships, with multiple logical paths, etc

To prove that the more complex schedules are more risky, we expand the single logical path schedule to two parallel logical paths schedule

Also, the second logical path added is identical to the first one

(See Figure 3.2.5 on page 23)

The activity durations, length of both paths and project finish date are the same

It is also assumed that the tainties around both paths’ activi-ties are the same

uncer-Performing the simulation based

on these risk inputs generates the output report with the range

of different expected project ish dates

fin-More importantly, the output shows that the deterministic pro-ject finish is now only 2% likely, a product of two independent logi-cal paths probability of 15% each(15% X 15% = 2.25% or P2!)

Figure 3.2.4 - Single Path Range of Project Finish Dates

“Being on a tightrope is living, everything else

is waiting”

~/~

Karl Wallenda

Trang 23

The comparison of results shows

that:

Two-paths schedule is more

risky because each logical

path may delay the project

The risk is increased at the

logical paths converging points

(that can be said for any

inter-im project milestone where two or more logical paths merge)

Two-paths schedule is more risky at the optimistic and mean ranges of dates than at the pessimistic ranges of dates

As the range of expected finish dates is different, in this scenario

we would need to add more time (days) in contingency to bring the project finish to P50 or more This is illustrated by Fig 3.2.6

Figure 3.2.5 - Probabilistic Parallel Logical Paths Schedule

Figure 3.2.6 - Parallel Paths—Range of Project Finish Dates

Trang 24

Criticality Index

The CPM schedule critical path

analysis is useful for a number of

reasons:

It represents the longest

logi-cal path determining the

earli-est project finish date

Because of that, the delay on

the critical path delays the

project

It is usually the path that

re-quires most attention

Figure 3.2.7 shows a slightly

modified schedule from the

previ-ous page example, only one

activity has changed as follows:

A0120 - Supply, Prefab &

In-stall Line #1 is now 45 instead

of 50 days

The logic for Piping Line #1

has different inputs for

mini-mum and maximini-mum ranges

The shorter likely duration

“promoted” the second logical

path to be critical (Logic Path

Piping Line #2)

If we were to follow the CPM

schedule, the logical course of

action would be to focus agement attention to the activi-ties on the critical path Pipeline

Therefore, the CPM approach can potentially miss the risks by focusing on the critical path ac-tivities instead on those that are more uncertain and risky Criticality Index represents the percentage of iterations for each activity that was on a critical path during the simulation

Criticality index of 100% means that regardless of how the task durations varied, the critical path always included that activity

Activities with the high criticality index are more likely to cause delay on projects

Criticality Index is typically ted in the form of “Tornado Dia-gram”

plot-Probabilistic Branching

When the schedule was created the most likely path and activities have been created

Unlike with CPM approach, the schedule risk modeling allows for probabilistic branching in situa-tions when it is not clear what the outcome of an activity may be

The successor activities may be

on different logical paths (branches), depending on the probability of the predecessor outcomes

Figure 3.2.9 shows that two logical paths are possible after the lines are declared ready for testing:

Pass the test (70% chance) and go to commissioning, or

Fail the test, for which 30%

chance of occurrence is given, which would then require lines

to be fixed and re-tested, thus delaying the system commis-sioning

“Look twice before you leap”

~/~ Charlotte Bronte

Figure 3.2.7 - CPM Technique Can Hide Risks

Trang 25

For every iteration of the tion one action is chosen ran-domly using the assigned proba-bility and the other outcomes are ignored

simula-The results of risk analysis, as in Figure 3.2.10, show that:

Frequency distribution results (histogram) get a shape of distinct humps that represent

branched probabilities

Cumulative probability tion gets a “shoulder” shape at the branching probabilities

distribu-Conditional Branching

Similar to probabilistic branching, the conditional branching models special project conditions and their consequences

It is helpful in what-if scenarios where triggers like missed dates

or excessive costs reach beyond preset thresholds

The outcomes and logical paths beyond these triggers are then different than originally planned

Figure 3.2.8 - Criticality Index

Figure 3.2.9 - Probabilistic Branching

Trang 26

Figure 3.2.10 - Probabilistic Branching Result

Correlation

In broad statistical terms,

correla-tion represents a relacorrela-tionship

between two or more random

variables…

Correlation can be positive or

negative, and is expressed as a

range between 1 (perfect

in-creasing correlation) and –1

(perfect decreasing correlation)

Correlation value of 0 (zero)

indi-cates that variables are

uncorre-lated

Using correlation in schedule risk

modeling is useful and

recom-mended, as it prevents

unrealis-tic situations during the

simula-tion

The random sampling gets

“driven” in a sensible way to reflect the degree of correlation between variables

For example, if the foundation size increases, the excavation requirement will likely increase which in turn will proportionally increase the time required for back filling and compacting

In this case of positive tion, a single iteration random sampling will choose the values from the variables PDFs reflect-ing the degree of correlation

correla-PDF Selection

Probability Distribution Functions (PDFs) were already mentioned earlier

In this sub-section just a few additional details are added

It is clear that PDFs are used to model the range of activity possi-ble durations (or costs)

There is a number of available PDFs to be chosen, each meant

to provide the best tion of possible values and corre-sponding probabilities for a varia-ble, in this case activity duration

representa-Using the example of two PDFs, used quite often, we want to demonstrate the importance of choosing the appropriate PDF for activities risk inputs modeling:

Ngày đăng: 15/05/2018, 23:32

TỪ KHÓA LIÊN QUAN