Fault tree construction rules, Computer Networking

FAULT TREE CONSTRUCTION RULES

(a)  Define the  undesired  fault  condition  as the  "Top"  event. The  fault  event describes the state of either the system or a component. (b) Fault events should be indicated in rectangle boxes.

(c)  Identify the possible Fault events that may individually or collectively cause the Top- undesired fault condition. These may be any one of the following type:

Primary       - failure with normal parameters,

Secondary - failure due to excessive stress,

Command  - failure due to a command event.

(d) The fault events should be linked to the higher event through the OR, AND, INHIBIT or NOT gates.

(e)   Gate to gate connections are not allowed.

(f)    Only normal fault state events are to be considered.

 

Posted Date: 9/7/2012 8:14:13 AM | Location : United States







Related Discussions:- Fault tree construction rules, Assignment Help, Ask Question on Fault tree construction rules, Get Answer, Expert's Help, Fault tree construction rules Discussions

Write discussion on Fault tree construction rules
Your posts are moderated
Related Questions
Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator

What is the function of the transport system and workbench organizer? The function of the transport system and the Workbench Organizer is to handle any changes made to objects

Q. Show the Distribution of Name Space? Distribution of Name Space --Information for domain name space must be stored on multiple servers (DNS servers) to be efficient

Question 1 Explain the TCP/IP protocol suite. List (Network Interface Layer, Internet Layer, Transport Layer, Application Layer) Question 2 Write short note on

Question: a) The Systems Administrator of Acme Company performs the backup of the website database file every day at 15:50. The original file location is database.sql. The Ad

Question 1 Brief the Fourth generation network. List its advantages and disadvantages Question 2 Explain the steps involved in component identification and call establishm

The combinational circuits use the comparators for comparing the storing and number them on the basis of minimum and maximum functions. Likewise, in the interconnection networks th

a) Used for sending e-mail. b) Uses port 25.

Database servers connected as a cluster to the main server There could be three database servers connected as a cluster to the main server to provide better connectivity and se

Question 1 Using a flowchart and appropriate annotations, describe the execution path of an Agent in JADE 2 Write down code snippets for the following in JADE a Agent A n