Fault tree construction rules, Computer Networking

FAULT TREE CONSTRUCTION RULES

(a)  Define the  undesired  fault  condition  as the  "Top"  event. The  fault  event describes the state of either the system or a component. (b) Fault events should be indicated in rectangle boxes.

(c)  Identify the possible Fault events that may individually or collectively cause the Top- undesired fault condition. These may be any one of the following type:

Primary       - failure with normal parameters,

Secondary - failure due to excessive stress,

Command  - failure due to a command event.

(d) The fault events should be linked to the higher event through the OR, AND, INHIBIT or NOT gates.

(e)   Gate to gate connections are not allowed.

(f)    Only normal fault state events are to be considered.

 

Posted Date: 9/7/2012 8:14:13 AM | Location : United States







Related Discussions:- Fault tree construction rules, Assignment Help, Ask Question on Fault tree construction rules, Get Answer, Expert's Help, Fault tree construction rules Discussions

Write discussion on Fault tree construction rules
Your posts are moderated
Related Questions
What are the different types of network topologies

Error Detection-- CRC Powerful error detection system Rather than addition, binary division is utilized A series of redundant bits called "CRC" or else "CRC remai

S t d "B" 9 m C-BAND EARTH STATION (2001)   This  Earth  Station  is  aligned  with  INTEL  SAT  IOR  66°  and  provide domestic connectivity. R-Sat (Regional Satellite) i

bit stuffing program in python

Addressing Complicated addressing scheme because there may be intermediate stations (APs), identified by flags

Define Character Stuffing? In byte stuffing (or character stuffing), a particular byte is added to the data section of the frame when there is a character with the same pattern

What is the difference between a straight-through and crossover cable? A straight-through cable is used to connect computers to a hub, switch, or router. A crossover cable is u

The three ways to give login access to the router are by the Console port, auxiliary port, and virtual terminal (Telnet)

modern technology in world of 21 century

Dual Homed Host Architecture This setup consists of a host machine with two or more IP addresses for each of its physical port. One port is connected to intranet and other to the