Parts count method calculation, Computer Networking

Assignment Help:

 

METHOD OF CALCULATION

It involves counting the number of each part type and multiplying with the generic failure rate of each part. On summing up the product, we obtain the failure rate of each functional circuit.

The information needed to apply the method is:

(1) Generic failure rate

(2) Part Quality level

(3) Equipment Environment

The equipment failure rate is obtained by looking up a generic failure rate in Table - 4.1, multiplying it by quality factor, and then summing it with failure rate obtained by other components. The general mathematical expression for equipment failure rate with this method is:

1534_PARTS COUNT METHOD Calculation.jpg

Above equation is applied, when the entire equipment is being used in one environment. If the equipment comprises several units operating in different environments, (such as avionics systems with units in airborne inhabited or uninhabited  environment), then this equation should be applied to the period of the equipment in each environment. These "environment equipment" failure rates should be added to determine total .the same values that are used in part stress analysis. Microcircuits  have  an  additional  multiplying  factor,  πL,  which  accounts  for maturity of the manufacturing process. For devices that are in production for two years or more, there is no need to apply learning factor. For those in production less than two years, λg should be multiplied by learning factor πL 

 

 


Related Discussions:- Parts count method calculation

Distribution of dns - application layer , Distribution of DNS 1.By cen...

Distribution of DNS 1.By centralized data base The information contained in the domain  name space must be stored. A simple design  or DNS would have one DNS server that co

State some security models, State some Security Models The first and f...

State some Security Models The first and foremost thing one needs to do is to chalk out a security plan and policy based on any security model. The term security policy shall

Explain about switched ethernet, Switched Ethernet In switched netw...

Switched Ethernet In switched networks a switch device identifies the destination address and routes the frame to the specific port to which the destination station is conn

Network comp. architecture, Write discussion on Associative mapping - compu...

Write discussion on Associative mapping - computer architecture

Advantages of mobile wireless network, Advantages of mobile wireless networ...

Advantages of mobile wireless network over a wired network is it is very much popular, it is very easy to set up, it requires a simple plug and the speed and reliability is very

Message passing in pvm, Message Passing The PVM communication model giv...

Message Passing The PVM communication model gives asynchronous blocking receive, asynchronous blocking send and nonblocking receive functions. In our methodology, a blocking se

Reliable data transfer over a channel bit error rdt : 20, Reliable  data...

Reliable  data  transfer over a channel bit error  rdt : 20 A more realist model  of the underlying  channel  is one  in which  bits in packet may be  computed. Such  bit erro

Create the registration request that mh sends to fa, Assume a network as de...

Assume a network as depicted below with a home agent (HA), a foreign agent (FA), a mobile host (MH), and a remote host (RH). The dotted box is the home location of MH. Assume MH's

Architecture of cisco ios software, Architecture of Cisco IOS software ...

Architecture of Cisco IOS software Cisco IOS might not  applications like ms word,multimedia softwares. It is mainly for switching data packet and concentrated on switching p

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd