Parts count method calculation, Computer Networking

 

METHOD OF CALCULATION

It involves counting the number of each part type and multiplying with the generic failure rate of each part. On summing up the product, we obtain the failure rate of each functional circuit.

The information needed to apply the method is:

(1) Generic failure rate

(2) Part Quality level

(3) Equipment Environment

The equipment failure rate is obtained by looking up a generic failure rate in Table - 4.1, multiplying it by quality factor, and then summing it with failure rate obtained by other components. The general mathematical expression for equipment failure rate with this method is:

1534_PARTS COUNT METHOD Calculation.jpg

Above equation is applied, when the entire equipment is being used in one environment. If the equipment comprises several units operating in different environments, (such as avionics systems with units in airborne inhabited or uninhabited  environment), then this equation should be applied to the period of the equipment in each environment. These "environment equipment" failure rates should be added to determine total .the same values that are used in part stress analysis. Microcircuits  have  an  additional  multiplying  factor,  πL,  which  accounts  for maturity of the manufacturing process. For devices that are in production for two years or more, there is no need to apply learning factor. For those in production less than two years, λg should be multiplied by learning factor πL 

 

 

Posted Date: 9/7/2012 8:34:52 AM | Location : United States







Related Discussions:- Parts count method calculation, Assignment Help, Ask Question on Parts count method calculation, Get Answer, Expert's Help, Parts count method calculation Discussions

Write discussion on Parts count method calculation
Your posts are moderated
Related Questions
Configure a Wireless MAC Filter Step: Add a Mac filter. Navigate back to the web utility page of the router (http://172.17.30.1). Navigate to the Wireless section a

Time  out Timers  are used to protect  against  lost packet. Each  packet  must have its own logical  timers since  only  a single  packet  will be retransmitted  after timeou

The science and art of manipulating messages in order to create them secure is known as cryptography..... Two types are:- Symmetric key cryptography and Asymmetric key crypto

What is Star topology Each station is directly connected to a common central node. Typically, each station attaches to a central node via two point-to-point links, one for tran

Q. Explain Dynamic Domain Name System? DDNS - Dynamic Domain Name System automatically updates the DNS master file - Sent by DHCP to a primary DNS server; secondary se

Q. Mechanical Characteristics of RS232 interface? - 9-pin connector - 9-pin connector is more usually found in IBM-PC but it covers signals for asynchronous serial com

Layers, Massages, Segments, Datagram's and Frames Figure 2.15 show the physical  path data takes down a  sending  end  systems  protocol  stack up and  down the  protocol stac

a)  A host is sending a HTTP request to a HTTP server. In the table below, propose a correct set of source and destination port numbers for segments sent from host to server and fr


Q. Show the Distribution of Name Space? Distribution of Name Space --Information for domain name space must be stored on multiple servers (DNS servers) to be efficient