Methods of reliability prediction, Computer Networking

Assignment Help:

INTRODUCTION

Reliability  prediction  is  an  important  method  for  evaluating  a  system design, right from its conceptual stage through development and manufacture and also to assist in controlling changes during the production. This also provides a rational basis for design decisions, choice between alternate concepts, application               of             component            derating         factors,           choosing                      parts                     quality  levels, possibility of redundancies, suggesting environmental control and other related factors. An accurate reliability prediction of a product at the design stage (before it is actually manufactured) is essential for accurate forecasting of supporting and service costs, maintenance planning, warranty costs, marketability etc.

At the early stages of design, reliability is predicted using the parts count method. This is an approximate method, and comparatively easy to perform. This is  generally  used  to  compare  alternate  design  concepts.  As  the  design progresses and more information becomes available, accurate predictions are made using parts stress method.

4.2       SOURCES OF DATA

Reliability prediction is accomplished by generating a reliability model for the system and using appropriate failure rates at part or component levels. The sources for these failure rates are many, such as MIL-HDBK-217 F for electronic components, Non-Electronic Part Data (NPRD), Government Industry Data Exchange Programme (GIDEP) or derivatives from tests on products, or data from devices, which are in use. Appropriate corrections should be applied for getting accurate results. These data are based on extensive in-house tests and feedback gathered by RADC, GIDEP and EXACT.GIDEP    provides     various    data    related     to    engineering,   reliability, maintainability and environment. The Exchange of Authenticated component Test Data (EXACT) mostly operates among European countries.

Major industries manufacturing components and equipment also track field failures and are capable of providing such data, while some manufacturers even conduct component / module life testing.

4.3       OTHER REQUIREMENTS

In addition to failure rate data, Reliability analysis requires the following inputs.

(a)       Part Description :Parts and their applications in the circuit need to be correctly described for any prediction based on part failure rates.

(b)       Environmental Data :These data include the associated natural and induced environments in which the device operates.

(c)        Part Operating Temperature :This includes the internal temperature rise as determined by thermal analysis, junction temperature etc.

(d)       Stress Data :In the case of parts Analysis; operating stress on each part should be analysed  and  appropriate  correction  factors  should  be  applied  to  the failure rate, to account for the effect of applied stress.

 

4.4       RELIABILITY PREDICTION METHODOLOGIES

There are different approaches of predicting the reliability of the electronic equipment or system depending on the period when the information is required and to what extent information is available. Reliability prediction can be classified into three types:

(1) Feasibility prediction

(2)  Preliminary design prediction

(3)  Detail Design Prediction

Feasibility prediction is intended for use in the conceptual phase of item development. During this phase, the level of design information is restricted to overall aspects of the unit. The configuration data are normally limited to those derived from existing components having functional and operational requirements similar to those of the item being developed.

Parts count and Parts Stress method are the most important methods followed for reliability prediction. In general, Parts Stress Method provides a higher value of equipment reliability as compared to that by the Parts Count Method. Both these techniques are discussed in following sections.

 

 


Related Discussions:- Methods of reliability prediction

Describe network topology and vpn, Describe Network Topology and VPN Ne...

Describe Network Topology and VPN Network Topology refers to the layout of a computer network. It presents how devices and cables are physically laid out, as well as how they j

Illustrate 802.11b HR DSSS, 802.11b HR DSSS a) High-rate DSSS using a ...

802.11b HR DSSS a) High-rate DSSS using a 2.4 GHz band b) Similar to DSSS excluding for encoding method c) Uses complementary code keying (CCK), encoding 4 or 8 bits to

Define the difference among trusted and untrusted networks, Can you define ...

Can you define the difference among trusted and untrusted networks?

Switching, SWITCHING: A switched LAN has a single electronic device th...

SWITCHING: A switched LAN has a single electronic device that sends frames among the connected devices. A hub with several ports simulates a single shared phase. However a swi

Wide area network, XYZ INC. is a large manufacturing firm that operates 5 f...

XYZ INC. is a large manufacturing firm that operates 5 factories in Dallas, 4 factories in Los Angeles, and 5 factories in Albany, New York. It operates a tightly connected order m

Basic working of spanning tree, Q. Basic working of Spanning Tree? Spa...

Q. Basic working of Spanning Tree? Spanning Tree - Redundant bridges may be installed to provide reliability - To prevent infinite looping of packets between bridges,

Determine the definition of hdlc, Determine the definition of HDLC HDLC...

Determine the definition of HDLC HDLC has only one address field. In a LAN, any station may transmit to any other station. The receiving station needs to see its own address in

Internet infrastructure, Thus now you know how packets travel from one comp...

Thus now you know how packets travel from one computer to another computer over the Internet. however what's in-between? What in fact makes up the Internet infrastructure or backbo

Encryption authentication - point to point , Encryption Authentication ...

Encryption Authentication One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet En

Transport layer , Transport Layer In computer networking it the transp...

Transport Layer In computer networking it the transport  layer is where  sessions are  exchanged between  hosts. This layer resides  between  the application layer and  networ

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd