Parts count method calculation, Computer Networking

Assignment Help:

 

METHOD OF CALCULATION

It involves counting the number of each part type and multiplying with the generic failure rate of each part. On summing up the product, we obtain the failure rate of each functional circuit.

The information needed to apply the method is:

(1) Generic failure rate

(2) Part Quality level

(3) Equipment Environment

The equipment failure rate is obtained by looking up a generic failure rate in Table - 4.1, multiplying it by quality factor, and then summing it with failure rate obtained by other components. The general mathematical expression for equipment failure rate with this method is:

1534_PARTS COUNT METHOD Calculation.jpg

Above equation is applied, when the entire equipment is being used in one environment. If the equipment comprises several units operating in different environments, (such as avionics systems with units in airborne inhabited or uninhabited  environment), then this equation should be applied to the period of the equipment in each environment. These "environment equipment" failure rates should be added to determine total .the same values that are used in part stress analysis. Microcircuits  have  an  additional  multiplying  factor,  πL,  which  accounts  for maturity of the manufacturing process. For devices that are in production for two years or more, there is no need to apply learning factor. For those in production less than two years, λg should be multiplied by learning factor πL 

 

 


Related Discussions:- Parts count method calculation

Wideband digital cross connects, Wideband Digital Cross Connects A SONE...

Wideband Digital Cross Connects A SONET  cross  connect  accepts  various  optical  carries  rates accesses the  STS signals  and switches at this level . it  is idally used at

Explain in detail about wireless network, Explain in detail about wireless ...

Explain in detail about wireless network Think about unseen terminal problem. Imagine a wireless network consist of five stations, A through E, such that each one them is in r

Research, I have a research in this topic " Mitigating DoS Attacks against ...

I have a research in this topic " Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks " with simulation

DHCP, Describe DHCP concept

Describe DHCP concept

Explain different protocols of internet, WEB TECHNOLOGY 1. Explain diff...

WEB TECHNOLOGY 1. Explain different protocols of internet. 2. Differentiate between DHTML and HTML. 3. What do you understand by Event-driven Programming? Classify differ

What is border gateway protocol, What is BGP (Border Gateway Protocol)? ...

What is BGP (Border Gateway Protocol)? It is a protocol used to promote the set of networks that can be reached within an autonomous system. BGP enable this information to be c

System deadlock in shared programme structures, System Deadlock A dead...

System Deadlock A deadlock refers to the situation when simultaneous processes are holding resources and preventing each other from completing their implementation. The fol

Thrift Towne, what role would you assign for Pentium iii, 500 MHz processor...

what role would you assign for Pentium iii, 500 MHz processor, 256 MB memory, 1o GB hard drive

What are the advantages of star topology, What are the advantages of Star T...

What are the advantages of Star Topology? The advantages of star topology are: a. Relatively easy to configure. b. Simple to troubleshoot c. Media faults are automatic

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd