Fault tree construction rules, Computer Networking


(a)  Define the  undesired  fault  condition  as the  "Top"  event. The  fault  event describes the state of either the system or a component. (b) Fault events should be indicated in rectangle boxes.

(c)  Identify the possible Fault events that may individually or collectively cause the Top- undesired fault condition. These may be any one of the following type:

Primary       - failure with normal parameters,

Secondary - failure due to excessive stress,

Command  - failure due to a command event.

(d) The fault events should be linked to the higher event through the OR, AND, INHIBIT or NOT gates.

(e)   Gate to gate connections are not allowed.

(f)    Only normal fault state events are to be considered.


Posted Date: 9/7/2012 8:14:13 AM | Location : United States

Related Discussions:- Fault tree construction rules, Assignment Help, Ask Question on Fault tree construction rules, Get Answer, Expert's Help, Fault tree construction rules Discussions

Write discussion on Fault tree construction rules
Your posts are moderated
Related Questions
VLAN - Virtual Local Area Network Vlan is a logical grouping or segmenting a network linked to administratively described ports on a switch, they give Broadcast control, Securit

What are all the Base services provided by the OS? Interprocess communications (IPC) Task preemption Task priority Local/Remote Interprocess communication Semaphor

Explain everything you can tell from the following: a. 00-01-00-01-13-FD-F4-C0-00-1E-33-92-CE-99 b. fe80::2c1e:18af:749b:91c5%12 c. 2002:8b64:6e3a::8b64:6e3a d. ::0

Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is known as path.

What is the major issue with routing by rumor?

Satellite Radio Channels A communication  satellite links two or more  earth  microwave transmitter receiver, know  as ground  stations. The satellite receives transmission on

implementation of energy aided shortest path routing protocol???

Responsibility of Application Layer

Q. What is Authentication ? - Verification of sender's identity. - Accomplished through a digital signature, which is based on public key encryption/decryption. - Uses re

Company Access Company  access is that in which  end systems are connected in connecting end  systems in a organization or educational  institution into the network. On  co