Parts count method calculation, Computer Networking

Assignment Help:

 

METHOD OF CALCULATION

It involves counting the number of each part type and multiplying with the generic failure rate of each part. On summing up the product, we obtain the failure rate of each functional circuit.

The information needed to apply the method is:

(1) Generic failure rate

(2) Part Quality level

(3) Equipment Environment

The equipment failure rate is obtained by looking up a generic failure rate in Table - 4.1, multiplying it by quality factor, and then summing it with failure rate obtained by other components. The general mathematical expression for equipment failure rate with this method is:

1534_PARTS COUNT METHOD Calculation.jpg

Above equation is applied, when the entire equipment is being used in one environment. If the equipment comprises several units operating in different environments, (such as avionics systems with units in airborne inhabited or uninhabited  environment), then this equation should be applied to the period of the equipment in each environment. These "environment equipment" failure rates should be added to determine total .the same values that are used in part stress analysis. Microcircuits  have  an  additional  multiplying  factor,  πL,  which  accounts  for maturity of the manufacturing process. For devices that are in production for two years or more, there is no need to apply learning factor. For those in production less than two years, λg should be multiplied by learning factor πL 

 

 


Related Discussions:- Parts count method calculation

How to perform basic switch configurations-ccna, How to Perform Basic Switc...

How to Perform Basic Switch Configurations Step : Complete basic configuration of switches S1, S2, and S3. Configure the S1, S2, and S3 switches according to the following

Show the model for network access security, Q. Show the Model for Network A...

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

Distributed system, You should develop a system consisting of an applicatio...

You should develop a system consisting of an application acting as a broker and several agents that need to communicate between them. The agents can only communicate in pairs (i.e.

Intrinsic functions, Intrinsic Functions HPF introduces some new intri...

Intrinsic Functions HPF introduces some new intrinsic functions in addition to those defined in F90. The two most regularly used in parallel programming are the system inquiry

Factor causing parallel overheads, Factor Causing Parallel Overheads F...

Factor Causing Parallel Overheads Figure clearly explains that the performance metrics are not able to achieve a linear curve in comparison to the enhance in number of process

Firewall, confiriguration,capabilities,implementation

confiriguration,capabilities,implementation

Explain the diffrent types of security attacks, Q. Explain the diffrent typ...

Q. Explain the diffrent types of Security Attacks? Types of Security Attacks Passive Threats: - Traffic Analysis and - Release of Message Contents Active

What are the trends in network security, Q. What are the trends in Network ...

Q. What are the trends in Network Security ? Trends in Network Security Improved vigilance for virus infections Continual maturation of firewall technologies

Illustrate the bus backbone network, Q. Illustrate the Bus Backbone network...

Q. Illustrate the Bus Backbone network? - Topology is a bus - Utilized in networks such as 10Base5 or 10Base2 - Normally utilized to connect different buildings or to con

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd