Fault tree construction rules, Computer Networking

Assignment Help:

FAULT TREE CONSTRUCTION RULES

(a)  Define the  undesired  fault  condition  as the  "Top"  event. The  fault  event describes the state of either the system or a component. (b) Fault events should be indicated in rectangle boxes.

(c)  Identify the possible Fault events that may individually or collectively cause the Top- undesired fault condition. These may be any one of the following type:

Primary       - failure with normal parameters,

Secondary - failure due to excessive stress,

Command  - failure due to a command event.

(d) The fault events should be linked to the higher event through the OR, AND, INHIBIT or NOT gates.

(e)   Gate to gate connections are not allowed.

(f)    Only normal fault state events are to be considered.

 


Related Discussions:- Fault tree construction rules

Describe the depth penetration method for a crt, Question: (a) What do ...

Question: (a) What do you understand by the following terms related to LCDs: Reflective LCDs Backlit LCDs (b) By using an example, explain the main steps of the B

Process management in pvm, Process Management int pvm_mytid( void ...

Process Management int pvm_mytid( void ) Returns the tid of the calling process.  tid values less than zero indicate an fault. int pvm_exit( void ) T

Network infrastructure upgrade, Network Infrastructure: This project will r...

Network Infrastructure: This project will require replacement of major networking components throughout the office. Virtualization will result in increased speed and reliability fo

Asynchronous transfer mode (atm), Telephone companies (Telco's) stated ATM ...

Telephone companies (Telco's) stated ATM to meet various goals. It gives universal service for all support and subscribers for all users for video, voice and data. It has a single

When it comes to networking what are rights, When it comes to networking, w...

When it comes to networking, what are rights? Rights refer to the authorized permission to perform exact actions on the network. Every user on the network can be assigned indiv

What is mpmm, MPMM is a Project Management Methodology which gives a comple...

MPMM is a Project Management Methodology which gives a complete "framework" for managing projects. This framework gives you with a step-by-step walkthrough of the phases, activitie

Dotted decimal notation, Dotted decimal representation is a syntactic form ...

Dotted decimal representation is a syntactic form the IP software uses to express 32-bit binary numbers when communicating with humans. Dotted decimal presents every octet in decim

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd