Parts count method calculation, Computer Networking



It involves counting the number of each part type and multiplying with the generic failure rate of each part. On summing up the product, we obtain the failure rate of each functional circuit.

The information needed to apply the method is:

(1) Generic failure rate

(2) Part Quality level

(3) Equipment Environment

The equipment failure rate is obtained by looking up a generic failure rate in Table - 4.1, multiplying it by quality factor, and then summing it with failure rate obtained by other components. The general mathematical expression for equipment failure rate with this method is:

1534_PARTS COUNT METHOD Calculation.jpg

Above equation is applied, when the entire equipment is being used in one environment. If the equipment comprises several units operating in different environments, (such as avionics systems with units in airborne inhabited or uninhabited  environment), then this equation should be applied to the period of the equipment in each environment. These "environment equipment" failure rates should be added to determine total .the same values that are used in part stress analysis. Microcircuits  have  an  additional  multiplying  factor,  πL,  which  accounts  for maturity of the manufacturing process. For devices that are in production for two years or more, there is no need to apply learning factor. For those in production less than two years, λg should be multiplied by learning factor πL 



Posted Date: 9/7/2012 8:34:52 AM | Location : United States

Related Discussions:- Parts count method calculation, Assignment Help, Ask Question on Parts count method calculation, Get Answer, Expert's Help, Parts count method calculation Discussions

Write discussion on Parts count method calculation
Your posts are moderated
Related Questions
DNS spoofing This process is generally refers to the process of responding a DNS request that was supposed to implement for another server. This can be in the case where the s

What is Piggy Backing? A process called piggybacking is used to get better the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also

Explain what are the External Threats External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated

ENTERPRISE NETWORKING 1. Explain that what is a cable? Classify different types of cables. 2. Elaborate switch? Write down the functionalities of switch. 3. Describe rout

a)  Assume that the time required to transmit one packet (i.e. the packet length divided by link data rate) is 10ms and the Round Trip Time (from Source to Destination and back) is

Importace of Clientsin intranet server The most interesting thing is that almost every computer can be connected as a client to the Intranet server. The client could be based

Q. Show the Application Layer Responsibilities? - Make possible user access to the network - User interfaces as well as support for services such as E-Mail File

MPI contains hundreds of functions, a small subset of which is enough for most practical purposes. We shall talk about some of them in this unit. Functions for MPI Environment:

Components of the VPN When  using  VPN we incorporate many pieces of a jigsaw puzzle each piece services its own  function to private  the interoperation and the  security  nec

Question: a) (i) Describe the entire process of credit card processing, identifying the different steps and parties involved. (ii) What are the roles of the acquiring ban