Methods of reliability prediction, Computer Networking

Assignment Help:

INTRODUCTION

Reliability  prediction  is  an  important  method  for  evaluating  a  system design, right from its conceptual stage through development and manufacture and also to assist in controlling changes during the production. This also provides a rational basis for design decisions, choice between alternate concepts, application               of             component            derating         factors,           choosing                      parts                     quality  levels, possibility of redundancies, suggesting environmental control and other related factors. An accurate reliability prediction of a product at the design stage (before it is actually manufactured) is essential for accurate forecasting of supporting and service costs, maintenance planning, warranty costs, marketability etc.

At the early stages of design, reliability is predicted using the parts count method. This is an approximate method, and comparatively easy to perform. This is  generally  used  to  compare  alternate  design  concepts.  As  the  design progresses and more information becomes available, accurate predictions are made using parts stress method.

4.2       SOURCES OF DATA

Reliability prediction is accomplished by generating a reliability model for the system and using appropriate failure rates at part or component levels. The sources for these failure rates are many, such as MIL-HDBK-217 F for electronic components, Non-Electronic Part Data (NPRD), Government Industry Data Exchange Programme (GIDEP) or derivatives from tests on products, or data from devices, which are in use. Appropriate corrections should be applied for getting accurate results. These data are based on extensive in-house tests and feedback gathered by RADC, GIDEP and EXACT.GIDEP    provides     various    data    related     to    engineering,   reliability, maintainability and environment. The Exchange of Authenticated component Test Data (EXACT) mostly operates among European countries.

Major industries manufacturing components and equipment also track field failures and are capable of providing such data, while some manufacturers even conduct component / module life testing.

4.3       OTHER REQUIREMENTS

In addition to failure rate data, Reliability analysis requires the following inputs.

(a)       Part Description :Parts and their applications in the circuit need to be correctly described for any prediction based on part failure rates.

(b)       Environmental Data :These data include the associated natural and induced environments in which the device operates.

(c)        Part Operating Temperature :This includes the internal temperature rise as determined by thermal analysis, junction temperature etc.

(d)       Stress Data :In the case of parts Analysis; operating stress on each part should be analysed  and  appropriate  correction  factors  should  be  applied  to  the failure rate, to account for the effect of applied stress.

 

4.4       RELIABILITY PREDICTION METHODOLOGIES

There are different approaches of predicting the reliability of the electronic equipment or system depending on the period when the information is required and to what extent information is available. Reliability prediction can be classified into three types:

(1) Feasibility prediction

(2)  Preliminary design prediction

(3)  Detail Design Prediction

Feasibility prediction is intended for use in the conceptual phase of item development. During this phase, the level of design information is restricted to overall aspects of the unit. The configuration data are normally limited to those derived from existing components having functional and operational requirements similar to those of the item being developed.

Parts count and Parts Stress method are the most important methods followed for reliability prediction. In general, Parts Stress Method provides a higher value of equipment reliability as compared to that by the Parts Count Method. Both these techniques are discussed in following sections.

 

 


Related Discussions:- Methods of reliability prediction

Cipher password guess-cryptography, a. If a password to a cipher is exactly...

a. If a password to a cipher is exactly 8 characters long, and each character can be selected from [0-9], [a-z], and [A-Z], how many different passwords are possible? b. Suppose

What is meant by asymmetric multiprocessing, What is meant by Asymmetric Mu...

What is meant by Asymmetric Multiprocessing (AMP)? It imposes hierarchy and a division of labor between processors. Only one designated processor, the master, controls (in a ti

Explain multipurpose internet mail extensions, Q. Explain Multipurpose Inte...

Q. Explain Multipurpose Internet Mail Extensions? - The Multipurpose Internet Mail Extensions is an extension of SMTP that allows the transfer of multimedia and other non-ASCII

Create a wireless can, You are the network administrator for the City of Jo...

You are the network administrator for the City of Joshua Texas. The city government offices are located in five buildings separated by a State Highway controlled by the State of Te

What is the protocol number for tcp, Transmission Control Protocol - TCP i...

Transmission Control Protocol - TCP is a connection oriented transport layer protocol with built unreliability. It considers a large block of data and breaks it down into segments

Components of the vpn - point to point , Components of the VPN When  us...

Components of the VPN When  using  VPN we incorporate many pieces of a jigsaw puzzle each piece services its own  function to private  the interoperation and the  security  nec

What is telnet, What is Telnet It is a protocol or set of rules that us...

What is Telnet It is a protocol or set of rules that uses to connect one computer to another computer in network. It is also called as a remote login. The telnet operates on cl

What are diagrams and trigrams, What are Diagrams and Trigrams? The mos...

What are Diagrams and Trigrams? The most ordinary two letter combinations are known as diagrams. e.g. th, in, er, re and an. The most common three letter combinations are known

Define the method of encryption and decryption using by ssl, Encryption/dec...

Encryption/decryption using by SSL Once a session is established, the SSL generates a session key using public-key encryption to exchange information between the client and ser

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd