Fault tree analysis, Computer Networking

Assignment Help:

FAULT TREE ANALYSIS

Reliability engineering, in a nutshell is concerned with failures.   How failures occur, how often they occur, and how to minimize them are the basic problems. It can be seen very easily that each and every failure has a cause behind it. It is an effect of some change in the parameter of a component or system. It may be a result of poor material, wrong manufacturing technique, improper design or the presence of some other unwanted signal in the system. Finding the real or root cause of a failure is one of the most important aspects of reliability engineering. This is a real challenge to the engineers associated with reliability.

The  fault  -  tree  technique  as  analyse  complex  systems.  It  is  based  upon deductive reasoning. This provides a concise and orderly description of the various combinations of possible occurrence within the system, which can result in a predetermined critical output event.

A fault tree is a diagrammatic representation of all possible fault events, their logical combinations, and their relationship to the system failure. The system fault is normally represented at the top of the tree and faults at the lowest, basic level at the bottom. The events at the lowest level are known as "basic events". Events resulting from the combination of basic events are known as "intermediate events". The failure probabilities of  basic events are combined to obtain the failure probabilities of intermediate events and finding the top event, the system failure. Logical "AND" and "OR" gates are used to combine two or more events

Fault tree can be used for both qualitative as well as quantitative reliability analysis. In qualitative analysis, fault - tree can help in tracing the cause of a specific failure and can effectively locate the root of the basic problem. In quantitative  analysis,  fault  tree  can  help  in  evaluating  the  probability  of occurrence of a particular event from all the possible failure causes.  Probability of occurrence of basic events are evaluated from previous reliability data and are combined using AND and OR gates to get the higher events probability.

Fault tree methods can be applied in the early design phase, and then progressively refined and updated as the design evolves to track the probability of  an  undesired  event.  Initial  fault  tree  diagrams  might  represent  functional blocks, becoming more definitive at lower levels as the design materializes in the form of specific parts and materials.

FAULT TREE CONSTRUCTION

The fault tree itself is a graphical model of the combinations of various parallel and sequential fault events that will result in the occurrence of the undesired event. The faults can be events associated with component hardware failures or human errors, any other pertinent events which can lead to the undesired event.

Before constructing the fault tree we must have a detailed functional block diagram  of  the  system.  The  functional  block  diagram  of  the  system  and equipment must clearly define the critical failure mode in terms of the system level malfunction or symptom to be avoided.

 

The fault-tree logic diagram is constructed relating all possible sequences of events whose occurrence would produce the undesired events identified in the functional block diagram.  The fault tree should depict the paths that lead to each higher level in the functional configuration.

In some cases it may be necessary to construct fault trees for each possible operating mode, function or mission event in the mission sequence. The accuracy of a fault tree is highly dependent on the analyst. Unlike the parts list available in FMECA there is no means of checking back to make sure that a significant potential failure contribution has not been overlooked.

 


Related Discussions:- Fault tree analysis

Error detection-- crc, Error Detection-- CRC Powerful error detecti...

Error Detection-- CRC Powerful error detection system Rather than addition, binary division is utilized A series of redundant bits called "CRC" or else "CRC remai

What are the tools sued for cryptography and web security, Q. What are the ...

Q. What are the Tools sued for Cryptography and Web Security? Tools - Cryptography VPN - remote access PGP - email Dedicated Circuits -tunnels' - IPSec

Describe the dsdm life-cycle with a suitable diagram, Question : (a) De...

Question : (a) Describe how ‘prototyping' is important to RAD. (b) List main features of ‘prototyping'. (c) List main principles of DSDM. (d) Describe the DSDM life-

Explain fdm and tdm with example, Question 1 Explain FDM and TDM with exam...

Question 1 Explain FDM and TDM with example Question 2 Define B-ISDN and explain its services Question 3 What is symmetric key cryptography? Describe one symmetric

What is a management information base, What is a Management Information Bas...

What is a Management Information Base (MIB)? A Management Information Base is part of each SNMP-managed device. Every SNMP agent has the MIB database that having information ab

Explain multipoint connection, Explain multipoint connection. A multipo...

Explain multipoint connection. A multipoint connection is a link among three or more devices. Historically, multipoint connections were used to attach central CPs to distribute

Example of record route ip option, 1. Suppose the datagram source allocates...

1. Suppose the datagram source allocates 12 bytes for this option. Then when the datagram leaves the source host, the RR option area will be like this: 7 12 4 0 0 0 0 0 0 0 0 0

Show the vulnerability of the internet, Q. Show the Vulnerability of the In...

Q. Show the Vulnerability of the Internet? More vulnerable than private network. Wide inter-network connection. Easy access by mass public world-wide. Lack of build in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd