Boeing WS-133B Fault Tree Analysis Program Plan 1963
Boeing WS-133B Fault Tree Analysis Program Plan 1963
Boeing WS-133B Fault Tree Analysis Program Plan 1963
for modmol *
rsrbto su~b
J-
: 1;
NUMBER D2-30207-J
PREPARED BY _. _ _ _- _ _ -
0. R._,ssbe . K- blr
APROVIED BY ~ ~ '7J 6 1 3 111/
APPROVED BY
c0C.Bo 'Sa
-. CLASS & DISTR~X'27
APPROVED BY 4 "€2"r,,*_ _ _
(DATE)
REV SYM T
T' docum nt bn y . NO.
I V.L OF 3
dtbttliwlim~cLSECT. 1 PAGE of 17
U 4287 9033 ORIG. -162
appwoi'd
-Thi docuinal~t hca b..
Ifor
pui~c rolows~ cmd M*~Lta
dwi1budo1 Is wmU m-i4047
ACTIVE PAGE RECORD
ADDED PAGES
~
I-
ADDED
i
PAGES
0 "'
'> 0 - Ln
"
U
.Z- o.n0'--. ~ c Z~ .Z o
I.0j LZ
: £ iZ.L
.81 5 d
B
B
t2
D ) Bn
B 32 > > B
5
• 9 )36 B
-" 18 B1
S a C0 12 ,.99 10 B
14- B
B - B -1 tB 1 B
2 B 5 B F 32
212 6
BB: - -
6~~~-- 2333I
~ B
B 16
SB 5.7 B
'ii
10 320 B 37 1
1322 B 391 B
12
;1 H7
33
4
5 B 9
6 E1
8 (
9
I10 -- A I
13. a
14 3
15 5B 16 B6
2 13
17 6
S18
5
ORG. 6/62
20600
SECTION B
REVS"ID) S 1P2-30207-1
SECT. PAGE 3
I
TAL OF CONTENTS
D2-30207-1
Section 1 General
D2-30207-3
Section 1 General
Section 3 Autonetics
Section 4 AVCO
Section 5 Boeing
Section 6 Hercules
Section 7 Sylvania
Section 8 Thiokol
ii
11
1
-!: i
J J
- ,SYM . RE'V
' .... . S
REV'r O P0 I °"
E T.
D2-3027-1
PAGE 4.1
. INTRDUCTION
2 PURPOSE
This volume contains the Weapon System Summary Fault Trees and
Analyses prepared by the Analysis Integration Contractor.
The contents of this volume are shown below:
SECTION 1. GENERAL
Title Page
Active Page Record Page
Revision Page
Table of Contents
References
Introduction
Summary
NO.
) REV SYM .
SECT. I 1PAGE 6
3.4 D2-30207-3 WS-133B FAULT TREE ANALYSIS - ASSOCIATE CONTRACTOR'S
DETAIL ANALYSES
SECTION 1. GENERAL
Title Page
Active Page Record Page
Revision Page
Table of Contents
References
Introduction
Summary
follows:
SECTION 3. AUTONETICS
SECTION 4. AVCO
SECTION 5. BOEING
SECTION 6. HERCULES
SECTION 7. SYLVANIA
SECTION 8. THIOKOL
/[
1 Each Associate Contractor shall use the section number assigned
as shown in the organization of contents 4bove.
into D2-30207-3.
It iSECT
PAGE692 llm l
4 CONTRACTORS' RESPONSIBILITIES
5. GROUND RULES
5.1 The Safety Constant objectives for the fault trees will be
tabulated and the values specified in the appropriate volumes
as shown typically below.
!M'aitenance
Fnuipment -
-(
I-I
SET PAG
(.
254-
U3 4288l 2000 REV. 8/62
! °" D2-3207-
RE YM & ,
SECT. . 1
P G .
6 FAULT TREE CONSTRUCTION
6.2 The basic principles for setting up and preparing Fault Tree
Analyses are given in Section VII of the BTL Report: Minute-
man Launch Control System Safety Study Report, Vol. I, included
as Sect. 4 of this document. P,
6.3 A Fault Tree Analysis shall be divided into three distinct parts,
3. Mathematical Analysis,
V D230207-1ANo.
SECT. I PAGE 10
6.3 EXAMPLE OF FAULT TRES
- :
COMBINATIONS OF
IMPROPER ENTRY
IMPROPER INITIATION INTO SOME PHASE OF RANDOM qNNOTED
OF TERMINAL TERMINAL LAUNCH CRITICAL FAILURES
LAUNCH SEQUENCE SEQUENCE WITH
RANDOM UNNOTED
CRITICAL FAILURES
-:Z7_ _ _
_c.. _ _ _ _ 7Page~o~7 FIGURE I 12
OF fERMIX&J
IMPROMI OATA
IWOPER OATA
ECCLID A DCJiXtfUHO
S "D RESO D
nSEC!
NoW11T
Cowho 111C d~rl
4cur1 LAjhC)
RUatvED
* * I
JWAW'D
aLYIITA
TIML~~AR
CH
F
I UI Pl"AM 88
I
I TI 1lC
41
3
M ONL
1hch
IECEjAO RY LAUMC'4
.. )-FIGURE?2
D2-3020?-14
RAf tsec. I Ptar 1
pri
Liis
UI
eimma
I f
COMBINATION OIF
~LAUNCHER
LAUNCER LES EQUIP.MENT
FAULTS WITH GENERATION
EQUIPMEN FAULTS & TRANSMISSION OF
ONE LES SIGNAL FAULTS
I 11511
__I
LAUNCKLR VONITOR ING
51113
LANOe OEtCTIO
OF ILS SIG 4.S FAILS OFlE S SIC.%AL
PRESENCE FA ILS
__ _ _ _ _I "_ _ _ _
11512 115141
A
___
(3 A,/
*1 ____________ I ________77__
900" OW~IVAEI
152
11521151
i= 4 ~~W~D2-30207-1 Sec.
,q, LPape 1-4
4i
'Io4 LE
7 UiS
SELECT LF'S TO TR ANSMIT RCUE LES SIr,. AL
'hICe, LES SIGNAL
15 TO BE
--
] LES SIALS TO LOCAL IF
IC -
LF
IR
LE
CRE tFSo 9
2 j ITC
RECENTE LES
S G,
ASLS
SIETC
DTT SSIAS
SVESE-V
LESAL
[ JM PIi
MON_
TCF
P
C
SiOuNALS
~ - ~.'
INHIBT TH FOLOWIN
063 UNES LOE
CLOS SC L LABIICALDAFIGES 4
WHN RDRE3ZAu2B07RY-CIVT
3.Soc(L~ERC
7. APPLICABLE MATHEMATICS
A -. Fault Tree analysis requires careful mathematical treatment.
II
A!
I-
ISCT IPE1
NO.P
ii
7.1 General
The quantitative conclusion of a fault tree analysis is numeri-
cally expressed as the safety constant. The calculations neces-
sary to obtain it require:
7.3.1 Assumption 1
%-3.2 Assumption 2
7-3.3 Assumption 3
i",
4?
SYM_
. 'REV __ ,' NO. D2-30207-1
SECT.~ P A~rE
'p
i t i
o tt+dt T
Fig. 7.4.1-1
~~ -dt,i(
." ~~~~~~~ (1 - -,",l-
o" (- Q" T ) -- • - "'A
(2) . 'n-
, , = (I
NO. D2-30207-1
SREV SYM B
- ---
, -T *- .
This expression is obtained by adding together the probab-
ilities of each way in which n events can coexistofor the
first time in the dt interval0 For example: A can happen
in the dt interval with a probability of dt. If A2 is
to coexist with A, in the dt interval, it must occur some
time in a 2 j e period prior to t; the probability of
this is (1'-2e' 2 2E~)o If A2occurs before t - .'19it
will be repaired before it ca 2 coexist with A in thdt
interval. If A occurs after t, it will not coexist with
in the particular dt interval under consideration.
:,ilarly, A must occur in a *T interval before t with
a probability of (1 - e- 3 1'3) in order to coexist with
f or the first time in the dt interval, etc. The product
these probabilities expresses their joint occurrence
and gives the first term of the above expression.
d Wft)= f(t)
and.n . (- dt)
df~t)
f(t)=-Hdt
f(t) e-Ht
M
REV-SYM 1 ISECT.
'NO. D2-30207-1
I aE
A 20
I If duration times are all equtal9 reduces to
At A '2 n
Fig. 7.4.2-1
r• ~T ...
+1 2 ...
P U3 4288 2000 REV. 8/62 2-S142-2
or .
14
+ 1+ + 00
1f 2 *then'1r 'r
reduces to
T T
A2 •
- + + -
7.4.4 Effective Duration Time (-u) at the Output of an OR Gate,,
ISECT. 4~IPAGE22 -
I A U, ,,
A, A3.-- AM
Figo 7.4o4-1.
By Boolean algebra the output of gate (1) is
The failure rate for the output . gate (1) is, therefore,
+-A n=k
+1(r.q,+ )
This must be equal to the failure rate obtained by combining
the output of gate (2), having failure rate Au and effecti-
vity time rTu with the failure rate and effectivity time of
event An+l. This is expressed as follows:
Ui +
%0~~~
q" "0 0,
+ 00*U~ rn+~nl
iYU
As with Tn , is an essential factor which enables the
,J.
2-5142-2
PAG24
NO.CT. D2-30207-1
'"",vIVrs
REV SYM _ -
"-
Jz +
+ +
pF - z- 4-
c -IAI
/<<
- KI
++
4--
1-
1N_ A- tA-
t
( - I-C4
oi N
< -A <
(K.CT
_ _A___ _ _
7.4.6 Combining Probabilities with Failure Rates at Logic Gates
7.4.6oi.l Conditionst
IC -
lee~ -
7.4.6.1.3 Derivatont
t- 7.4.6,oi.3-1 t'dt
"I rig- t+T2. t+,r,
12
a dt 5+ P \dsK 2~-
2tP d
SS 2
2.BNO.
RV SM D2-30207-1
1SECT. 1 PAC- 27
n_1.2'ri'
+ 1_ 2 " 'n-P.n+ (1)
+
1 o (2) ,
, i + + q,
Mal -~ 1
+ 2
+ 0 0 0 + -A (3)
... n+ . (4)
4 a 0 0 0
Z Sr 0 n n. . *. . .
*.1e En 1 n2
'" I I
A - -.. ~.T~.A
• rL 1, + ,.+
.2
..
Al1kb,-rD)~I
+.
S+%I
..
rr3 X'rL, -r, + .'rr
"13 ..uM, M, ..- +- - 3 4
NO. D2-30207-1.
REV SYM 3 PG2
..
\~- )\'A 1 Q.. " :
.4er "" -" °tI- --
_--~ ~ ~ L- -.
(-; +.
9 1r.. +t.
- ,7;_ L
Write I0
where -A,= A._i
Similarly, write - = )
where
Now the - output should be - This is seen by
- ?\5, ',;
by examining Equation 5 where the chains are C.' Cn "
By equation 4,
"-+ -21
"N -
A,2m
____ISECT~ PAGF-30~
i We first asoertain what the correct .
: r . ,c,.u.. --UC,) r\(1,U D U
u, U ,)
u cl i u
\ i " \D 1 U" W
n "Kn.. nA
=AnA
' 0A
n=n.f i,:1.
iho
The correct "Tby Equation 5 is seen to be
TA -a , +"
where,
°" 1 "A
Q' , T",,
A-f- + ..
| IA1j
!1 -
We have-I 2
IV
-A - -
'i ""~
~~\a:* ~ PST"A -"' ±- "'-
-AT, kt
Gner3adliaine 2
liot3 oln In-.llneywudb
te faile ratefo
thae oupu the
f ANDrec
t e isor-
But
!This
I
I II
proves thet' r formula for n items ANDed together*
-A similar argument proves the OR formula for n items and
the formula for n items ANDed togethera
- ±
I,,
7.5.1.1 Examples:
~In both cases shown below, the probability ex-,ression on
the left of the inequality sign (the probability which
would be obtained by combining probabilities directly
through logic gates) is seen to be conservative.
A + B + AC A + B
-P(A) P(B)
A B A G
b) ~-nsimplified -Simplified
AB .+ AC A(B + C)
P(A) P(B) + PCA)P(C),P(A)[P(B) + P(C) -
AB AC .-P(B) P(C ,
7.5.2 AID Gate Interaction Error -
SECT. 1 IPAGE 34
7.5.2.1 Examples:
(a Unsimplified - Simplified
(A + B) AC - AC
(A + B) (A + C) = A + BC
7.5.2.2 Remedies:
[PA) + P() i [P(A + PC,. < P(A) + P(B) P(C) - P(A) ?(B) P(C)
1
+ P(B)]
' P(A) + P(C) + P(A) P(B) + P(B) P(C) > P(A) + P(B) P(C) - PB(C)
be negligible
7-5-3 Even though the probability of a common term may
to other probabilities at an OR gate, its effect
with respect
examle,
as an interacting branch cannot be ignored. For
Examples (a)
suppose P(A) is negligible compared to P(B) in
observed
and (b) of Paragraph 7.5.2.1. It can readily be
error is induced if the A tera at the
that an unconservative
affected OR gate (gate 2) is dropped.
unity probability at
7.5.4o If failure rates are to be combined with of
an OR gate, the output of the OR gate has a probability
unity.
unity probability
7°5.4°2 If failure rates are to be combined with
the input with unIty probability is ignored
at an AND gate,
since it has no effect at this gate.
at a Logic Gatea
7.5-5 Proof of the Effect of Interacting Branches
R + S) T [N+ V (W + XY) + Z
to
which is a'union of seven chains. In the discussion
and n will be used in the
follow, the Boolean symbols U the sake of clarity. The
place of + and x respectively for form.
above equation can then be expressed in the following
2"5142-2
U3 428a 2000 REV. 8/62
No. D2-30207-1
REV SYM f
.I1 PAGE
17 2
U K 2 u 3 KU4 u u K6 u K 7 9 K,
a= F UA n ~
J=l k=
U C U D An U E U F UA U
g -_ i l J=l k -l
=U D u F u A n) U1 GL]
r J=1 k=-
IsE.C. 1 1 G"
Ej 7
Applying probability as if the terms were mutually exclusive
(a good conservative approximation when probabilities are
'mall)
we get r
ms
P (BUC) IP(D') + 2 P
PpC1) +jP p( =
g=l j=l L=i k=l
This is equal to the probability [P(C) + P(D)] which would
be obtained by combining probabilities through logic gates.
mP
4 BU C =U
g~Jl Dg U Au U F
j=!
m p
P(B U C) = -1 P(Dg) + P(A) + ; P(F ).
:jinteracting
through logic gates is either correct or conservative for
branches which unite at an OR gateo
X. Uf D nU R
C U F u A n 0 G
then
I
Applying probability assuming mutually exclusive events, we
get .J,
P(B n C) = 7 P(Dg) "P(F) + P(A) P(o,)
g=l j=l k=2 g=l
Sn + P(A) L P(E ii ) p
' P(Fj) + P(A) Lr P(Gk) Ln P(Ei)
m p r m
> P(D ) Z P(F + P(A) Y P (Gk) L P(D )
n 2 ?r r o
+ P(A) X P(E~ 2: P(F )+ rP(A) 2 P(E ) Y__ G
J= j i=l k=1
P(B) P(C) and P(B n C) are equivalent except for the last
terms.
therefore,
E .
~1
I
/ U3 4288 2000 REV. 8/62 2-5142"2
6- NO. D)2-30207-1
RSECTM. Z I PAGE 4r0
,.6 ,repai'h-1- and Short-time System Mode Analysis
7.6.1 During the missile flight or while the system is in a test mode,
the effective duration time of a failure (r) is that length of
time which begins with the event of failure and ends at the close
of the test mode or end of flight. Since this length of time depends
upon the particular event rather than upon a predictable repair
time, the method of calculation (AP) applicable to inadvertent
launch is not applicable to the faulty launch or test mode analysis.
The faulty launch tree is concerned with short-time modes and flight
events and a straight-forward probability analysis on a "per launch"
basis should be used. Similarl.y, the portions of a fault tree con-
cerning the system in a test mode or other short-time mode should
be treated on a "per test" probability basis.
T..6.2, -And"Gates •
) -, i o11
ti
7.6.5 Continred
Sa For( the
't .inadvertent
I' ) basis, launch tree where
data which calculation is done on
is acquired as a probability
of failure per cycle or per hour must be incorporated in the
mathematical treatment of the tree. Wiere the cyclical
probability of failure for an event is given, an estimated A.
in failures per hour may be derived by multiplying the
cyclical probability by the estimated number of cycles per
hour. r
is determined as the duration time of the failure.
Where one event characterized by a probability acts as a
moderator (at an "and" gate) of an event characterized by a
and a " ,the output of the gate may be represented by
the product of the input probability and the input failure
rate which is interpreted as the output failure rate, and
output = T input.
II
NO. __
Sect. 1 IFAGa 43
i 7<
7.7.3 Continued
IL
PREPARED BY
> SUPERVISED BY
A a APPROVED BY
00 Idle
APP'ROVAL
cq (DATE)
D
0o
C,
ii ."z ..
I 04(694-266
I I
VCL. 1 NO.
,%> v6 8 SEC. . PAGE oro
v
.22
u2. 0
-C-9
C
~K
0- -C-
< V)
;C-4 C L
M.G -j
2D C14 -i
-k: CV) -
E u
5N C
-o LL V
NC 10-
- LU
Cs 0
VILI
c'2 D -8
E0 U2 '2
LI) 0 Z0
9)- Z4O C -
~
z~ ~ I-zD
w
0 V- 0
z - 0 E
U <
REV
B 6.
U--f OU No I300-
Sect, Par 2~
THE BOEING COMPANY
. .
.. .,"
°. °
PREPARED BY _ t_____-__
0'4
Ll
SUPERVISED BY
a- APPROVED BY
APPR6VAL
(DATE)
Il
u,
t '--
. - -.. .,-
5* "
A "Hazard" is a condition which will lead to a potentia] or
actual occurrence of undesired or out of sequence events
-:1," wbich jeopardize life, health, property, and the interna-
tional relations of the United States0
6# The "Safety Constant" is the probability for a specified
period of time of the occurrence of a defined undesired,
unscheduled or out of sequence event which jeopardizes life,
health or property.
M , 6,REV ''SC.''
WFA19 o ll
D2- 30207-1
LOGC SYMBOLS
(~ A lgcal OR relation
~N1
THE BOEING COMPANY
(
Si
ci D2320-
_ _ _ _
WSWI _
PREPARED BY __
w4
I~l SUPERVISED BY /,/
SAPPROVED BY o.-efA
Iq APPROVAL
S * (DATE) 0
z.
CL
* S
VOL.l NO.
A SEC. , PAGE I OF 20
-i ~.
f *
* --......
-*---*-.----*-----*-*--,-- ___
~~
____
-
____
-
____ ___
. -. a.
1 INTRODUCTION
1.2 'Boe#ng - urn=nt pagd numberd are aC'ed' tofacilitate the handling
... zd release o .this section. • . , .- ,o " :
I
---
Co.
-4
0
U3 .. ... ~, -5142-2
__
__ _ _ _ _ __ _ _CT. 4 PAGE 2 -
i+ II
rI
SWIM~o VII
1. INTRODUCTION
The task of the study was an examination of a complx data transmission and
processing system, called a Launch Control System (LCS), in order to determine
its ability to provide safety against an Inadvertent, i. e., accidental, Launch (IL).
In particular, it required an identificition of those elements ef the LCS in which a
failure significantly increased the probability of IL
The "fault tree" concept wan devised to carry out this task. The fault tree serves,
first of all, to identify the events, usually undesired, that contribute to 'tn IL It
then relates these events, logicaiy, I,, order to show which events must exist at
the same time and which are required on an "either-or" basis.
After fault trees are prepred for the ajor.. pa'te of the L-CS, the next step is to
determine the probability of occurrence of the sil-nificant failures and thence the
probability of occurrence of IL in a given time interval. In performing this step,
the major contributors to an IL appear, In order to accomplish this step in the
analysis, It is desirable in prepare Boolean expreaslons that are equivalent to the
fault tree and which rake it possible to take account of multiple appearances of the
same failures in the several branches of the tree, as vell as the appropriAte fault-
detection features.
Both of these steps in the IL analysis are described in this sectio, ef the report.
1 occur, heat will be applied continuously to the water in the tank. If this happens
and event A (relief valve fails to at) has occurred, the pressure will not be relieved
as intended but will continue to rise until the tank eventually ruptures (event F).
The Boolean expression for the fault teee is F - A (B C + D), which statce thlat F
S, page
Y t7-
•
+o0 .... + + + ,
-ii
AA
Io
192300-
4Page
i
ttriieffAand(BorCrD)aretrue.
remainder of the
Notethatthefaulttre .asumesthatthe
stem fnctions properly ao that the check valve and the hot-water
faucet do not permit flow oA of the tank. The malfunction of either-to an open condi-
tion would negate event F. The fault tree can be developed further for events A
through D in terms of the p.arts making up the device referred to in each event. If
fal-ure rates for the parts were known, the probability of event F occurring in a . C
given period of time could be caic-.iLted The 4.AICu ation would have to account for
the fact Lhat, as a practical matter, event F Is more likely to occur if event A has
occurred prior to event B, C, or D. U B, C, or D occurs and the relief valve works
properly, flooding of the basement would provide warning of the malfunction in the
as control loop, which presumably would lead tu manual shutdown and repair
4 branch of the tree is for the Data Processing Equipment (DPE), the top event of
this tree being the operation of the Command Signals Decoder (CSD) switch. The
5"*1.
Ito. D2-30207-1
~ 7
............
ZA,
d1drd m~ajor branch Is for the LES, with the top event here being the arming Of
the SC&.
lh addition to the above, fault troes have bean developed for several of the cr111-
Cal electromechanical devices that are used In the LCS, !or the formation of code
groups, and for the Status Reporting System and power subsystems. Though ma!-
tunctlona In the Status Reporting System do nr contribute directly to TL, they, can
prevent the detection of malconditions In the in-line equnipment, thus permitting
thema to persist for extended periods of t~gve.
~4
4. DEFINrI'ON OF INADVERTENT LAUNCH
For purposes of the study. IL is defined ad an event charact-rized by Ignition of
the first stage of the missile. rhis event may be divided into classes, according
to what occurs or does not occur within th., Launcn Facility (LF) and mies~iA In
addition to first-stage ignition, It is useful to define three classes, as follows:
This consists of first-stage Ignition 2nd launcher closure removal and all of the
other actions essential to a proper LAUNCH sequcence.
The different branches of the fauilt tree are biased in favor of one or another of
the classes of IL as defined above. The PIG branch Is heavily biased In favor of in
In-Silo Explosion, with the protmbllity being less for a Shiort Launch and much less
for a CriticAl bunch. The DPE branch is tblai-ed ahinost completely In favor of a
Critical Laiunch. since the P1(3 would byeexpected to function rormally oncc 'he
CSD switch has operated, assuming the SC'q armed, -and the normal LALINC~f ae
quence would occur. The LFS Lranch If,not biabed one way or the other, SCS
APJAED being a necessary condition tor any ~un.,h except those generated by the
Nozle Control 'Jnlts (NCU's) or within the explosive train ltsclI
sAli-
Jo. D~-3O2O7-
1
7
J Figure
1S (1) power should be applied to one or more of the NCU's through
ftmtio of the P/t, and if ('I) the heat generated is sufficient to ignite one of the
stages, an IL of the In-Silo -xplosion class will occur. As a practical matter,
"i1-
It does not matter in this parecular case which stage ignites first. In an In-Silo
Explosion it can be expected ti.at all stages will be ignited within a short time once
a.y one of them has ignited. It ihould be noted, hat the second and third stages of
the missile were specifically excluded from the study under the terms of the con-
tract. The NCU's for these stages are included here only because t,eir effects
closely parallel those of the first-stage NCU'v, and because their relations with tht
P/G closely parallel those of the first-ttage NCU's.
In the fault tree for the P/G, two malconditiona must coextt 0i order to get an
output irm the [ault tree. These are shown In Figure 7-3. The first malcondition
is an Ignitor No. I or an Ignitor No. 2 firing signal sent by the P/G The second
malconditior is an Arm Ordnance signal sent by the P/G or Ignitor Safe and Arm
(S&A) device failing armed, or relay w-5 in the S&_A module failin,; closed The
last event asshown in a circle In that it is a malfunction describable 'nter-ns of a
specific component. The Ignitor S&A device failing armed is not,d in a hexagon,
indicating that a fault tree ,q heen developed separately for this particular electro-
me-.anical device. The oth,'r events, being describable in functional terms and
requiring furth, r development, are shown in rectangles,
The event "Ignitor No. 1 firing simnal ,ient by P/G" will be developed here ,
an illustration of the fault-tree method. Figure 7-4 is the Ioglk block diagram for
the part of the system under consideration. This chnws the circuit modules that
eznerate the firing signals to Ignitor No. I and Ignitor No. 2 of the first stage. It
also shows the final ga!e In the 1,,gic chain that trigge;gs the modules and the con-
tacts of the Launch Enable Switch ILESW) through which tie firijg signals pass.
The faul: trees for Ignitor No. I and !gnitor No. 2 are identical in form, and that
for Ignitor No. I only i given in Figure 7-5 Its development is detailed below.
OR gnte B is required.
c. LESW contact No. 211 will be in the LAUNCH position if either the individual
contact shorts or ifthe switch is driven to LAUNCH; hence. OR gate C is
required.
d. The Inadvertent driving of the LESW involves a diffarent set of gates and will
not be developed here.
Sec. PLPage 7
+, : . -...
The fault tree for the DPE was developed [n a manner sainmlar to that desc-ribed
* for the P/G. The logic diagrams for the.DPE were'studied-ln; orde- to identify and-
I relate In fault-tree form those events that contributet IL. As shown in Figure 7-3,
S -the top event of the tree is the operation of the CSD switch. This may be'caused by
No. D2-30207-1
REV SYM S Sec. 4 Page 8 1?
'5k
i
t
either of two events, opera ion by failures intern4 to the CSD itself, or operation
by baring the proper code read into the CSD. The latter in turn requires that all
at three eondlttias coexist. First, the proper code must be In the Fire Code (FC)
store of LEU No. 2. Second, the FC gate must be enableo, and third, FC shift
Wptases must be received. Each of these ev-Is requires further faui trec develop-
ment, vhich is p.esanted fuUy in Section IV ot Volume 2.
The DPE fault tree shovs a number of hexagon symbols, indicating that these
events are developed further in additionAl fault trees. One case to in the operation
of the CSD by a failure within the de!vice itself. The sev-n other cases cencern the
formation of particular code gro.ps; namely, the 18-bit FC, the "sync" group, ar,
the five Launch Control Center (LCC) addresaor cods. E.,,t such event Ss identi-
nied by the symbol Z --Ith a numerical subscript.
of relay K-2 in the Safe and Arm Module of the Main Jnction Bom to the open state,
or the condition where the output relay in the 5400-cpe detector Is not closed. The
last condition requires further fault-tree development, which ib presented fully in .
Section V of Volume 2. Arming of the SCS by internal failure, shown in a hexagon
symbol, is considered in Section XII of Volum~e 2.
informs the operator of the existence of faulty conditionas in the DPE and P/0
equipment at the LF's. If the Statua System fails to provide such indications.
the faulty condition, once having occurred, will be allowed to persist for a
prolonged period of time.
5o. D2-30207-1
Seo.. oPago 9
Th. status Luftceai of the SCS insa good example of the above point. Tto
operator Is provided with an ARMED light at the LCC when the SCS has lett
the SAFE position, provided that the Status System is functioning properly.
It certain pirticulAr maLunctions or combinations thereof have occurred in
the Status System, as shown on the fault tree for this system, the ARMED
Light at the console will fall to illuminate so that any one of a number of mal-
functions In the LES th.at results in the arming of the SCS will go undetecte~d
for a prolonged period of time.
b. Electromechanical Device Fault Trees. Section XII of Volume 2 contains th(e
fault trees for the critical electromechanical devices that are used in the U'1'.
These devices are the CSD, SCrS, S&A deviced, LESW, and the Volatile De-
coder of the DPE. FAult trees are developed separately fot thtse deN, Ices Nb-
cause 01 their mechanical aspects and the critical function that they perform
in the LCS. The outputs of the fault trees for these devices app, ar as Inp.1
at appropriate places in the PIG, DPE, and LES fault trees. They are Identi-
fled by a Z symbol, with a numerical subscript, enclosed In a hexagon.
I C. Fault Tree For Code-Greup Formation. Section X of Volume 2 uses the faul'-
tree method in order to Identify and n-late the conditions necessary for the
formation of code groups in the cable plant W~ivn P-tditfi-d by 'he probability
of having a particular code group !ormed, the cutputs of such a tree can be
used ad Inputs to the appropriate places in the fault tree for the OPE. -Such
inputs are also identified by a Z, symbol, with a nimerical subscript, en-
closed In a hexagon.
d. Power Subsystems Fault Tree Though this is developed as a part of the
LES fault tree in Section V of Volume 2, it is of interest In other respec'st
as well, inizh as in preventing an LCF from initiating an INHIBIT message
whiedn operating procedures call for it.
A__
IAI
__ _ _ __4-_-- 0 -- ~
a. Factors To Be Considered 4
(1) Simplification. The first factor is that the fault tree can be simplified im-
mediately to some extent by disregarding two types of malconditions. The first is a
malcondition that has a probability of occurrence which, though a numerical va"ue
can be assigned, is sufficiently small to be neglected in the context in which it ap-
pears. The symbol 6 denotes this value of probability. For example, if there are
three inputs to an OR gate and the probability oi one of these inputs being true is
very small compared to the probabilities of the other two inputs being true, then it
is a valid simplification to ignore the first input. The second type of malcondition
that permits simplification of the fault tree is one that has a probabilhty of failurp
which cannot be assigned an exact value but which is judged to be exceedingly small
so that it can be assumed to be zero. The symbol E is used to denote this value of
probability. For instance, if there are three inputs to a given AND gate, one of
which has a probability of E of becoming true, then the output of this gate can be
considered as having a probability of E of becoming true, and the entire branch up
to and including the AND can be ignored;
(2) Interconnections. The second factor that must be considered is that there
are interconnections that appear in intermediate areas of some of the fault trees.
An example of this appears in Figure 7-6, which shows a simplified fault tree for
the P/G i-the STRATEGIC ALERT mode. The basic events in this tree have been
designated with the letters A through H in order to permit a description here nf the
principles involved in manipulating fault trees. In the left branch of this tree there
are two intermediate events developed, Y1 and Y 2 " (Y1 is the input to the top gate
from the left branch, but it appears as well at three places in the middle branch of
the tree and at one place in the right branch; Y2 appears once in the middle branch
and once in the right branch. ) Given the probabilities of the basic events A through .4
H occurring, the problem is to calculate the probability of the output of Gate No. 1
being true, taking into account the cross-connections represented by Y1 and Y 2 "
(3) Fault-Detection Features of LCS. The third factor that must be considered
is the effect of the various fault-detection features within the LCS. Such features
include the status indications, the Alarm and No-Go indicatIons, and the automatic
1 - shutdown provisions, for the various modes of opeation such as STRATEGIC ALERT,
TEST, and CALIBRATE. The fault-detectior. features must be taken Into account in
estimating the probabilities of IL because of their effe.ts on the expected duration of
the in-line malconditions that they sense.
No. D2-30207-1.
REV SYM Sec. 4 Page 1 p1
4?r
Continuously. A fault should b* noted immedirately upon occurrence. Other fault-
detectio features operat only at discrete timcs, auch as during a Sensitive Corn-
m-nd Network Test (9CNT) or a TEST.
(c) ellability of Fault Detection Path. If a failure should occur in the fault-
&tcton path, then the duration of the in-line malfuncUon will be extended, perhaps
i- ndefinitely,
.t h.Boolean Expressions
InOrder to accommodate the factors listed above, It Is very useful to develop
a Boolean expression that describes the fault tree. Through proper algebraic man-
ipulation, multiple connections drop out and the fault-tree output can be expressed
Interms rd the basic m=dconditions. Moreover, the terms of the final expression
can be r'romped in whatever manner is most convenient to allow for fault-detection
IBefore features.
proceeding further it may be useful to discuss Boolean algebra briefly
Thiz algebra was first conceiied by George Boole and presented in his book
entitled,
"An Investigation of the Laws of Thought," published in London in 1854. (Boolean
algebra ia related to symbolic logic, algebra of classes, calculus of propositions,
algebra of log.c, and switching algebra. ) Unlike ordinary algebra, Boolean algebra
deala with variables that are permitted to assume only two different values De-
pending on the type of problem
values: on or off, go~od or bad, being treated, a Boolean variable might have the
something or nothing, true or false, yes or no,
open or closed, preset or absent, etc. For a generalized mathematical approach,
It isconvenient to assign 0 and I as the two possible values of the variable and, in
turn, to let the 0 And I represent the two possibilities of a particular problem. In
the case of the fault tree, 0 represents false and I represents true, with respect to
a given malcondition that appears in the fault tree.
Th. basic operations most commonly used In Boolean algebra are a special form
,(aegatIon, a special form of addition, and a special form of multiplication. The
special form of negation used is symbolized with an overline, as T,or with a prime,
-4i, and may be read as "not a" or Ps "a prime." Functionally, the operation may
be written as NOT (a) - a'. Since only two variable values are permissible, if a
1,then a' 0, and if a- 0, then a'- 1.
Al go.
4A
I :12
The special form of addition employed is symbolized by a plus sign, as a + b,
and may be read as "a plus b." The expression signifies a "mixing" or "inclusive
OR" process and is also read as "a OR b." Functionally, OR (a, b) = a + b.
>1
-
The special form of multiplication used i8 symbolized like a Droiuct in ordinary
algebra, as a • b, a(b), a x b, or simply ab. It may be read as "a times b" or just
"ab." The product indicates a "coincidence" or "ANDing" process, and it is also
read as "a AND b." Functionally, AND (a, b) = ab. Unlike a product in ordinary
algebra, ab = 1 if, and only if, both a = 1 and b = 1.
Table 7-1 shows some of the fundamental identities of Boolean algebra that are
relevant to the remainder of this discussion.
Table 7-1
FUNDAMENTAL IDENTITIES OF
BOOLEAN ALGEBRA
Title Identity
Elementary Propositions a + a' = I
aa = 0
4 a,+l1
a- 1a
* a+a~a
aX=a
"~f a -
-. ?~.-*
Associative Law Ilk -' c k: cb
, Commutative Lw +1 - b
-"'.". "" * " 4 e" .,.?-,,- - .b
b, 'g
'
:
RE Y . , '- - + ' No. D2-30207-1
.
Gate No. I in
An expreesioo for the output of
&4h tree to the physical system.
through if will now be developed.
utrms of thi basic events A
branch
Satrting at the bottom of the left
(14) C +D
For € nel~a lot
(13) .. Y2 + EC + D+EZ
(8) - 0 *
(0) - G(i'i +
( T1 (8) a If I (Y1I Y2 )
As before
aGYIe )
No. D2-30207-1
8~eo. a~ L.
660 Page J,
- 07
I I?
Similarl 1 M =5s17(Y
()T 1 .1+V
~ 00
S . P
A U, Alogical AND) relation.
-o€-l
A logical OR relation
11
Figure 7-2. Fault-Tree Symbols
No. D2-30207-1
r sv3I 1 Sec. 4 Page.16
'IL
TA2
, zI
' o D 3 2
m, '
I'-I
Sec. 4 ag 1
I.•-------. --
- N o* D -3 20 -
LI E jo
20
1Lit
t
ET 4o FIRST TTASLC
M50IaTE
__________L TO INIOR No
~41
No D2 YI2Y-
sS h,
; FIRMh "kGALI
SEAT sy P/0 - - 1W
U140
IE
llS LESW 2S ps-$ 250
FAIL TO DRIVEN .FAIL TO DRIVINGO
L'TO. L' SIGNAL
b'il'iA-
$A
* S-I
10 ~4
AA
1 9 e
Ito.D2-30207-1
Control Safety
Study - 9-15-62)
j SUPERVISED BY
co ;,,,I
O,,o,, t
APPROVED BY /
Mr (D AT E)
15APPROVAL ______________
0 I~
oo
VOL. 1 NO.'
SEC. PAGE 1OF 18 {
tI
1. INTRODUCTION
1.1 The following pages of this section are reprinted from Section II
Voime I of zhe Eell Telephone Laboratories' Launch Control
SafetF Study dated September 15, 1962. it contains sign-ificant
mathematical analysis aDlicable to probability comutations.
- 1.2 Boeing document page numbers are added to facilitate the handling
and release of this section.
The theory of probability forms the basis for the quantitative aspects of this
study, and this section documents the manner in which probability theory was ap-
plied. It is intended to be neither a philosophical treatise nor a rigorous mathe- ZEC
matical treatment, but rather a self-contained account of the basic probability rules
and procedures employed in the program. - i,
Before giving consideration to the development of these rules, some cautionary I
remarks are in order regarding the application of probability theory to a real prob-
lem, and the interpretation of the numbers resulting therefrom. Like all mathe-
matical disciplines, the theory of probabilit isdeveloped inrelation to specific,
*abstract, conceptual models, and the formulas derived apply with exactness only to
.-%
those models. In applying the theory to the real world, even a most carefully formu-
lated mcdel may not be a wholly adequate repreenatdon of the real situat!on. The
degree of confidence in the results must then be tempered by objective estimation of
I
the disparity between model and reality. Because, however, the formulas may be
applied mechanically, and the results of a probability analysis, even a poor one, are
usually expressed as definite numbers, there is a strong tzidency to place implicit
iaith ia the numbers once they are generated, forgetting their shaky foundations.
Thus, for example, the simple exponential failure model is used for component fail-
ure almost universally in the study. While this model is believed to be a good de-
scription of device failure behavior, it is surely not a complete one. Burn-in and
wear-out failures are not included, this simplifying omission being justified by the
inception time and duration of the operation period. In other parts of the analysis,
probabilities may be combined in a manner that is valid only for events that are
"exhaustive and exclusive." While attempts are made to insure that the proper con-
ditions apply to the problem at hand, in the actual combinations some overlapping
may be present that will impair somewhat the validit- of results. Moreover, math-
ematical approximations are made for convenience throughout the work. This should -.
not affect the more significant figures in the computations, but It will have a minor
* impact on the results. It must be emplasized that the probability figures generated
.I in this study are not sacred (they are not necessarily accurate to the two significant
figures In which they are expressed). At the same time, one must recognize their
utility in pinpointing critical areas. It should also be emphasized that meticulcus IL
No. D2-30207-1
REV SYM S Sec. 5 Page 3
All
j
care must be taken in stating a probabilistic problem and in formulating the mathe-
matical model so as to minimize errors in the derived results.
'i
In connection with the problem of interpreting probabilIty figures, it may be use-
ful to discuss an implicit meaning of a given nunm..,rical probability value. To illus-
trate, consider the operation of the random code model discussed in paragraph 2 of k
-:t= X- TU zell is
ad _t
rar.e.se a-. cd stse.
r beha'io r b. 4s. z-.'..er,
an artificial invention developed to help estimate a lower bound of system perform-
I
ance. It assumes that an arbitrary sequence of l's and O's is continuously being
I&I generated at the bit rate. The probability that a bit is a 0 is 0. 5. Under this con-
dition, and assuming each new bit initiates an independent message, the model gen-
erates a 56-bit code with probability of 5.6 x 10-5 for a Flight of ten Launch Facili-
ties (LF's) in ten years.
It is difficult to comprehend the magnitude of this nunuber, let alone its signifi- i
cance in context. To make both aspects more meaningful., the following proposition
in probability theory is used: "If an event A has prcb'abil.y p of occurring in a
single trial, the most likely number of occurrences of A inn trials is np." Using
this proposition, the illustrative probability figure can be translated to other terms
Let atria for code generation ror.6tltute exposure of ten LF's to the random
model environment for ten years. Then, for example, ten trials would mean any
one of the following exposures: 100 LF's for 10 years, or 10 LF's for 100 years,
or 25 LF's for 40 years, or any other ten-fold scaling of te product of LF-years.
Now it can be seen that the above proposition applied tothe probability in the ex-
ample implies that the most liekly number of occurrences ci code generation will be
one launch code when
k
np=1 o n x 1 trials
Thus, the probability is equivalent to stating that the most probable time to a single
cede generation for a Flight of ten LF's will be 2 x 105 yezrs; or, alternatively, the
expected number of codes will be one.in 2 x 105 years. (lit is assumed that a
j Poisson probability model applies, the probability asscciated witb this single code
getweration in 2 x 105 years can be shown to be I/e = 0.37, but it drops off quickly
| t Iii
to near-zero values in the realistic future, diminishing to$.6 x 10 "D in ten years.)
The above is one of several possible interpretations whit may help give a proba-
No. D2-30207-1
REVSyM Sec. Pare 4
[
P (A U B) -- P (A) + P (B)
This approximate result is used throughout the subsequent development and
In all computations.
b. Composite Probability from Fault Tree and Boolean Expression
Turn now briefly to the format of the fault tree for an illustration of the applica-
tion of the probability rules thereto and the reason for introducing the Boolean con-
cept. Figure 2-1 shows a typical portion of a tree. The labels on the tree are
Boolean functions which take on the value 1 when the failures or malfunctions exist
and the value 0 otherwise. The tree shows that the joint occurrence of events A and
B (A r' B) constitutes event C which together with D either singly or jointly (C u D)
produces the event E. Tpus
AI E- (C 1 1 A n R)U D
41-
No. D2-30207-I
M, .YM ,Sec..5 Page 5 g
_ -_ _ __ _ )\
E (Strictly speaking, E is not Identical to the event
[(A rl B) U D], but rather E is implied by, or always
occurs with, the indicated composite event.)
Another way to express E is in Boolean terms:
= -B+D
E=A
thus
=B(A + 1 + C
=-B+C
No. D2-30207 -,
REV SYM GSec. 5 Pabe 6
""
", -" .• "" ;. ,:- . ..
c. Reliability Function F
(1) Device Reliability. Suppose a large set of N 0 identical (with respect to nanu-
facture) devices is subjected to life test, after having eliminated "burn-in" or early-
- life failures of the substandard members. At time t, NF(t) devices have failed and
Ns(t) survive. Then the reliability of the device, R(t), may be defined as the proba-
bility of a member's survival to time t and would be given empirically by the ratio
of surviving to original members as a function of time, averaged over many such
life tests.
R -Ns(t)
NO
N O - NF(t)
No
NF(t)
Although NFM), and consequently R(t), take on only discrete values, it may be
assumed that continuous functions approximate them, and then
d R(t) I1 F(t)
dt No dt
or
d NF(t) -
dt -NO dR(t)
Now d NF(t)/dt is the failure rate at time t, while Id NF(t)/dtl dt is the number of
failures in the Interval (t, t + dt). On dividing d NF(t)/dt by N,(t), the failure
rate per surviving member is obtained, which is called the hazard function, h(t).
i i, .;,s"
h(t) = 1) d NF(t)
)N(t d
4 N .- INo.
V SYM Sec.
D2-30207-1
Page7
r!
The hazard function h(t) is in the nature of a conditional probability density o time-
to-failure, because
d KF(t)
h(t) t = Ns(t)
is the fraction of surviving members at the start of an interval (time t) which fall in
the interval (t, t + dt).
(2) Failure Density -ilunction. If d NF(t) /dt is divided by No instead of by
Ns(t), the failure rate per original member, designated f(t), is obtained as
f(t)= 1 d NFit)
No dt
This failure rate f(t) is also a probability density function of time-to-failure, since
1 f(t) dt
NFM)
_d
N o
represents the fraction of original members that fall in the interval (t, t + dt).
Some useful reliability relationships can be derived from these definitions.
Starting with h(t):
1
h(t) NONs(t) d NF(t)
d
"0 d R(t)
NS(t) dt
1 d R(t)
R(i) dt
or
h(t) dt=- d R(t)
Integrating, "
t
" I[ hW) dt =-ln Rlt) + k
fo
t Since
-11
44-
No. D2-30207-1
REVSYM Sec. Page 8
then k =O, and
t
i R't)=e
t)=e h(t) dt
This is the expression used to evaluate the fault-tree "circles" (basic circuit fall-
ures). To illustrate its use, suppose that a device failure rate X = 250 failures per
10 hours, and t= 30, 000 hours. Then
-
Q= 1 - e >t
1- l+t- I X2t2+...
2
Xt
If higher order terms may be neglected (the usual situation in this study).
250
:. Q= -109 x30,000=0.0075
An interpretation of this result (as indicated in paragraph 1) is that if 10, 000 such
circuits were run for 30, 000 hours each, about 75 failures could be expected among
them.
Returning now to f(t),
1 d NF(t)
No dt
,t° - d R(t)
0 -" dt I
dt
d-t
S=t Ae
-
-16-
No. D2-30207-1
REV SYM joSoo.5 Page9
i~m I ,i
i. iOn ),o _
inegatn fo~ P! 1W
dt f (t) dt + ( dt
=-e + -e-
0 t
- t "
= 1- e t) + eA
= Q(t) + R(t)
The preceding states that Q(t), the probability of failure by time t, may be found
by integrating the density function from 0 to t; the graphical significance is shown
in Figure 2-3a.
To obtain the probability of failure in some crucial interval subsequent to 0, say
(tl, t 2 ), f(t) must be integrated over that interval:
pt2
Q(tl, t 2 ) ff(t) dt
" 1 '
I io Xe-tdt
_e-At I e t 2
tii
-t2-
1
Xt
- (t +)
4e~
e=x
~ -[I e AXT]
R(t 1) -
Q(T)
where
=t - t I
This result states that the failure probability in ani Interval of length 'r starting
at t1 is equal to the probability that the device has survived to time tl, multiplied by
the probability of failure in an Interval of length r which starts at 0. The graphical
interpretation of Q(t,, t.) is shown in Figure 2-3b.
4-
.No. D2-30207-1
REV S Sec. 5 PaCe 10 .' .
-i -.
QMt AREA FROM 0 TO t
t~t) ....
t R(t) aAREA FROM t TO-
f W
6
(a)
tt
0 tl t2
(b)
density of time-
One additional fact is drawn from f(t). Since f(t) is a prooability
of failure probability
to-failure (which is to say that there is a time distribution
is the mean of this distribution.
densities), it is in order to inquire which value of t
density and
The answer is found by "weighting" each value of t with its associated
integrating over all t:
mt : t • f (t) dt
fCt.e tdt
A
*9-
REV SYH
Sec.,. Page i
No, D2-30207-1
, J
Jk
Vq
In
" -
That is, the mean-time-between-failure (MTBF) is the reciprocal of the failure rate.
-In the following work, m and 1/k are used interchangeably as convenience dic-
tates.
Inthe following discussion the fault detection feature associated with some
events is at once the significant element in the composite event and the complicating
part of the analysis. Fault detection enters the analysis by prescribing a necessary
sequence or order of failures ifthe composite eient is to occur. It enters the physi-
cal system through the alarm and status features, as well as through test modes.
One starts with two events, A and B, which are independent failure conditions
having constant failure rates XA, B or, alternatively, MTBF's mA, mB , respec-
tively. The composite event of interest is the combination of A and B in an AND
Gate under various conditions, resulting in event F. (In Boolean terms, F = A - B.)
* Required is the probability P(F) that F occurs under the following different circum-
stances:
CASE I. Neither A nor B is subject to detection throughout t12 entire operation
period T O -
Solution: This is the case that applies to the buik of the computations. Since A
and B are independent,
P(F) = P(A) •P(B)
)- T 0AT)(-eBTO)
En InB
x ATo XBT 0
mAmB
No, D2-30207-1
R~v sym~ Sec. 5 lage)12 R
CASE 1H. Condition A triggers a detection alarm and is corrected immediately
on occurrence. B is not subject to detection.
is to have B
Solution: Under the given hypothesis, the only way for F to occur
precede A, since if A precedes B, A is always corrected and the two events can
*
order con-
never coexist (neglecting precisely simultaneous failures). An implicit
dition is thus imposed by the detection feature.
dt which
First express the probability that B occurs in the differential interval
), given that
starts at t and is followed by the occurrence of A in the interval (t, T0
A has not occurred up to t:
t/A
PA(T 0 -t)r e-(To -
= B e t/mdt L -
P[B (dt)]
P(F)
Since F will result if the above compound event occurs for any t in (0, TO),
is obtained by integrating over t in the overall interval:
'To
~TO t m e
If mA = mB =M,
T0 To
00
T0 /m T o 0-T /m
• I =l-e - m -e
0 /m
K .=I-(l+-) eT
No. D2-30207-1
Sec. 5 Page 13
M SYM B
Iio ,'
A B
TO
PM1, I - e B - To/mA mA mB rmB mA)/(mAmB)lt
m B m B -m A
mB B
This Is the exact expression for the general case. On expanding the exponentials to
seconrt order terms,
A D
Comxparting this result with the approximation in Case I, one notes that the In-
stantaneous detection feature hae decreased the failure probability to hall the un-
checked value. This aspect is discussed more fully later.
P-"(d Jt ( P[i 0 ] - e, -t m A [ ( A]
i
A3before, F will result If this compound evwnt occurs for any t in (0,T 0 ). P(F)
f
I-{,.is
/ obta ned by W egratlon:
"( jTO
*-Vm~
6-t11 a t/
m
A
[~ -
*-(To
o/o
~f~
A] dt !
mB 0
TomB
A B + e-TdrnmA -nBIT
MA -[( f3A* B)/A ItITrO
0 00"--
mW
AA B.
B
It-0mAIt-
.iImA "e"O/m
Wm AWI A'0/ B
P(F) -, 0I
2
2m
) 0mm--
P(lr w
A InnCase 11. Apparently the order condition alone has reduced the probability c
ahlure by one hal
CASE i1. The system is examined for the occurrence c A at discrete times
T 1 , 2TO, nT I To . If A has occurred, corrective action Is taken to replaceo
4f-
Wo. D2 07-1
3".5 race 15
.....
the fImluro at the end of the Interval In which it occurred. B's >ccurrence is not
wbject to detection throughout (0, TO).
Solutioa: This case Introduces the effect of periodic testing of one critical ele-
meat In the logical AND gate. In the actual system. T1 could correspond to the
daily Sensitlve Command Network Test (SCNT) or the monthly TEST.
Y will occur if both A and B coexist at any time. Because B's failure is persist-
ent, while A's lists only for the balance of the interval in which It occurs, Fle he
event "B falls in an interval, and A falls In tIe same or a subsequent interval."
P[F(, Td)]- P[B(O, T,) PA(O, T
+1
+* +"
P[B(2TPJB[(n )] ) T,.
. 3T - 1 nT, .]Po) A[^
P[A(2T 1 .-,) ,,.°n,]
1
/P But
(tTI, nT1 )] - I - fP[A(0, T 1 )]
where
Now
T e-A B! 1I. B
Pr(I
and
ti- 9M- *
"
I1 - e k
"
-)TI
(©
M I
*1.
a- 1 )T
47(0. ~ 1~-.L
~3 1 -n~ .ae
+o] - *(n -
e 1
OAT,
Agaen th Cs 118ntd
a-hiyt
1.0
Lot'
(1 - r)-rig an-
p~(,TO
1.0. 1'0
r_)__
2z
a-r
S -rfj a V-r
ft *(I- rf- an]a-rL
a - r
*~ ~~~~~ 5
-r
?~~~~A[ - r
s-r
5-I" a-r
The reault has beez expressed In this form to exhibit the remarkable symmetry
ia r and a or, equivalently, in A and XB. This means that, if XA amd AB are inter-
chazked, the composite failure probability is not changed. Thus, if A has an MTBF
o 10 hours while B has an MTB? of 1.05 hours, the probability of F Is exactly the
same as if these attributes were reversed. An even morc arprislng interpretation
of the symmetry Is that the probability of composite fathire is the same whether one
checks the more reliable or the less reliable device at the periodic Intervals! This
tact may have significant implications on maintenance procedures.
For use in computations, P[F(O, To)] is expressed as
Thie result tell. how much protection Is ac.!eve hy checking one device n times
In the interva! (0, To). In partiuLar, If there is no chocking (n - 1),
as1 in Ca"- 1, and the probability of composite failure 13 twice as great as in the rae
of Insntaneous checking (Case 13). (The Case II result also follows by putting n -
in the above approximation for I(F].) U a check Is made once at the midpoint c
(0, TO) so that n - 2, the probability of F is reduced by 25 percent from the no-
check condition. Nine checks (n - 10) give a 45 percent reduction of the probability
of F from the no-check case. With 100 checks, the probability of F is practically
an low as in the Case Ufcondition. Thus Caie Ill otcludes Cases I and 1I as special
cues.
121
I
S -
.
F
U
H a